aboutsummaryrefslogtreecommitdiffstats
path: root/src/vnet/syslog/sylog_doc.md
blob: 0b48d4db57315235f7d795c7cdea6cf614ff6760 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
# Syslog protocol support {#syslog_doc}

VPP provides [RFC5424](https://tools.ietf.org/html/rfc5424) syslog protocol
logging, which is used to transport event messages across network. VPP
currently suports UDP transport based on
[RFC5426](https://tools.ietf.org/html/rfc5426).

The syslog message has the following format:
* header
* structured data
* free-form message

The header contains, priority, version, timestamp, hostname, application,
process id and message id. It is followed by structured data, which  provides
a mechanism to express event data in easily parsable format. Structured data
can contain zero, one or multiple structured data elements. Structured data
element contains name-value pairs. Structured data can by followed by free-form
message.

Following example explains how to use the internal APIs to genrate syslog
message:
```{.c}
   #include <vnet/syslog/syslog.h>

   ...

   syslog_msg_t syslog_msg;

   /* Check if syslog logging is enabled */
   if (!syslog_is_enabled ())
     return;

   /* Severity filer test */
   if (syslog_severity_filter_block (severity))
     return;

   /* Initialize syslog message header */
   syslog_msg_init (&syslog_msg, facility, severity, "NAT", "SADD");

   /* Create structured data element */
   syslog_msg_sd_init (&syslog_msg, "nsess");
   /* Add structured data element parameters (name-value pairs) */
   syslog_msg_add_sd_param (&syslog_msg, "SSUBIX", "%d", ssubix);
   syslog_msg_add_sd_param (&syslog_msg, "SVLAN", "%d", svlan);
   syslog_msg_add_sd_param (&syslog_msg, "IATYP", "IPv4");
   syslog_msg_add_sd_param (&syslog_msg, "ISADDR", "%U",
                            format_ip4_address, isaddr);
   syslog_msg_add_sd_param (&syslog_msg, "ISPORT", "%d", isport);
   syslog_msg_add_sd_param (&syslog_msg, "XATYP", "IPv4");
   syslog_msg_add_sd_param (&syslog_msg, "XSADDR", "%U",
                            format_ip4_address, xsaddr);
   syslog_msg_add_sd_param (&syslog_msg, "XSPORT", "%d", xsport);
   syslog_msg_add_sd_param (&syslog_msg, "PROTO", "%d", proto);

   /* Send syslog message */
   syslog_msg_send (&syslog_msg);
```

Example above produces following syslog message:
   <134>1 2018-11-12T11:25:30.252715Z 172.16.4.1 NAT 5901 SADD [nsess SSUBIX="0" SVLAN="0" IATYP="IPv4" ISADDR="172.16.1.2" ISPORT="6303" XATYP="IPv4" XSADDR="10.0.0.3" XSPORT="16253" PROTO="6"]

To add free-form message use:
```{.c}
   syslog_msg_add_msg (&syslog_msg, "event log entry");
```
* Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include <vnet/vnet.h> #include <vnet/api_errno.h> #include <vnet/ip/ip.h> #include <vnet/ipsec/ipsec.h> /* Statistics (not really errors) */ #define foreach_ipsec_if_output_error \ _(TX, "good packets transmitted") static char *ipsec_if_output_error_strings[] = { #define _(sym,string) string, foreach_ipsec_if_output_error #undef _ }; typedef enum { #define _(sym,str) IPSEC_IF_OUTPUT_ERROR_##sym, foreach_ipsec_if_output_error #undef _ IPSEC_IF_OUTPUT_N_ERROR, } ipsec_if_output_error_t; typedef struct { u32 spi; u32 seq; } ipsec_if_output_trace_t; u8 * format_ipsec_if_output_trace (u8 * s, va_list * args) { CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *); CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *); ipsec_if_output_trace_t *t = va_arg (*args, ipsec_if_output_trace_t *); s = format (s, "IPSec: spi %u seq %u", t->spi, t->seq); return s; } static uword ipsec_if_output_node_fn (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * from_frame) { ipsec_main_t *im = &ipsec_main; vnet_main_t *vnm = im->vnet_main; vnet_interface_main_t *vim = &vnm->interface_main; u32 *from, *to_next = 0, next_index; u32 n_left_from, sw_if_index0, last_sw_if_index = ~0; u32 thread_index = vlib_get_thread_index (); u32 n_bytes = 0, n_packets = 0; from = vlib_frame_vector_args (from_frame); n_left_from = from_frame->n_vectors; next_index = node->cached_next_index; while (n_left_from > 0) { u32 n_left_to_next; vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next); while (n_left_from > 0 && n_left_to_next > 0) { u32 bi0, next0, len0; vlib_buffer_t *b0; ipsec_tunnel_if_t *t0; vnet_hw_interface_t *hi0; bi0 = to_next[0] = from[0]; from += 1; n_left_from -= 1; to_next += 1; n_left_to_next -= 1; b0 = vlib_get_buffer (vm, bi0); sw_if_index0 = vnet_buffer (b0)->sw_if_index[VLIB_TX]; hi0 = vnet_get_sup_hw_interface (vnm, sw_if_index0); t0 = pool_elt_at_index (im->tunnel_interfaces, hi0->dev_instance); vnet_buffer (b0)->ipsec.sad_index = t0->output_sa_index; next0 = im->esp_encrypt_next_index; len0 = vlib_buffer_length_in_chain (vm, b0); if (PREDICT_TRUE (sw_if_index0 == last_sw_if_index)) { n_packets++; n_bytes += len0; } else { vlib_increment_combined_counter (vim->combined_sw_if_counters + VNET_INTERFACE_COUNTER_TX, thread_index, sw_if_index0, n_packets, n_bytes); last_sw_if_index = sw_if_index0; n_packets = 1; n_bytes = len0; } if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED)) { ipsec_if_output_trace_t *tr = vlib_add_trace (vm, node, b0, sizeof (*tr)); ipsec_sa_t *sa0 = pool_elt_at_index (im->sad, t0->output_sa_index); tr->spi = sa0->spi; tr->seq = sa0->seq; } vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next, n_left_to_next, bi0, next0); } vlib_put_next_frame (vm, node, next_index, n_left_to_next); } if (last_sw_if_index != ~0) { vlib_increment_combined_counter (vim->combined_sw_if_counters + VNET_INTERFACE_COUNTER_TX, thread_index, last_sw_if_index, n_packets, n_bytes); } vlib_node_increment_counter (vm, ipsec_if_output_node.index, IPSEC_IF_OUTPUT_ERROR_TX, from_frame->n_vectors); return from_frame->n_vectors; } /* *INDENT-OFF* */ VLIB_REGISTER_NODE (ipsec_if_output_node) = { .function = ipsec_if_output_node_fn, .name = "ipsec-if-output", .vector_size = sizeof (u32), .format_trace = format_ipsec_if_output_trace, .type = VLIB_NODE_TYPE_INTERNAL, .n_errors = ARRAY_LEN(ipsec_if_output_error_strings), .error_strings = ipsec_if_output_error_strings, .sibling_of = "ipsec-output-ip4", }; /* *INDENT-ON* */ VLIB_NODE_FUNCTION_MULTIARCH (ipsec_if_output_node, ipsec_if_output_node_fn) /* * fd.io coding-style-patch-verification: ON * * Local Variables: * eval: (c-set-style "gnu") * End: */