1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
|
<html>
<head>
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<meta http-equiv="Content-Language" content="en" />
<title>s6: the ucspilogd program</title>
<meta name="Description" content="s6: the ucspilogd program" />
<meta name="Keywords" content="s6 command ucspilogd log logging UCSPI" />
<!-- <link rel="stylesheet" type="text/css" href="//skarnet.org/default.css" /> -->
</head>
<body>
<p>
<a href="../">s6</a><br />
<a href="//skarnet.org/software/">Software</a><br />
<a href="//skarnet.org/">skarnet.org</a>
</p>
<h1> The <tt>ucspilogd</tt> program </h1>
<p>
<tt>ucspilogd</tt> acts as a filter, converting syslog facility
numbers and alert levels into names.
</p>
<h2> Interface </h2>
<pre>
ucspilogd [ -d <em>undef</em> ] [ <em>var</em> ... ]
</pre>
<ul>
<li> ucspilogd reads a stream of syslog-like messages on stdin.
Those messages can be newline-terminated or null-terminated. </li>
<li> For every line it reads: if it has been given <em>var</em>
arguments, it writes the value of every <em>var</em> environment
variable, followed by a colon and a space. </li>
<li> If the line begins with a syslog facility number and/or
alert level in the syslog format, it converts them into a
human-readable name in the syslogd fashion. </li>
<li> It then writes the processed line to stdout. </li>
</ul>
<h2> Options </h2>
<ul>
<li> <tt>-d <em>undef</em></tt> : when a variable
<em>var</em> given on the command line is actually undefined at
ucspilogd execution time, print <em>undef</em> in place of what
would be the variable's value on every line. Default is the
string <tt><undefined></tt>. </li>
</ul>
<h2> Common use </h2>
<p>
You can emulate the whole <em>syslogd</em> behaviour by combining the following
components:
</p>
<ul>
<li> A Unix stream super-server such as
<a href="s6-ipcserver.html">s6-ipcserver</a>
listening to the Unix domain socket <tt>/dev/log</tt>, to connect to
the kernel log-reading interface. </li>
<li> <tt>ucspilogd</tt> running under that super-server, to read the
logs and perform adequate transformations. </li>
<li> A logger such as
<a href="s6-log.html">s6-log</a>
to store the logs into the filesystem. </li>
<li> A supervision mechanism such as s6,
to ensure ease of use and reliability of the whole chain. </li>
</ul>
<p>
The resulting suite of programs is still smaller, and way more reliable,
than a standard <em>syslogd</em>.
</p>
<p>
In the <tt>examples/syslogd-linux</tt> subdirectory of the s6 package, you will
find a suitable ucspilogd <a href="servicedir.html">service directory</a>.
The run scripts are written in the
<a href="//skarnet.org/software/execline/">execline</a>
language.
</p>
<h2> Using <tt>ucspilogd</tt> as a <em>klogd</em> replacement </h2>
<p>
Certain Unix kernels offer a nice interface to the kernel logs.
For instance, the Linux kernel provides the <tt>/proc/kmsg</tt> fake
file, that can be opened and read like a normal file, excepts that
it gives the kernel logs when they are available and blocks otherwise.
You can use <tt>ucspilogd</tt> to process data from those interfaces.
</p>
<p>
The <tt>examples/klogd-linux</tt> subdirectory of the s6 package
is a <a href="servicedir.html">service directory</a> providing such a <em>klogd</em> service
for Linux, using the <tt>/proc/kmsg</tt> interface.
</p>
</body>
</html>
|