This chapter discusses some special examples and recommendations.
This is the multi-page printable view of this section. Click here to print.
Best practices and examples
- 1: General recommendations
- 2: Handling large message load
- 3: Using name resolution in syslog-ng
- 4: Collecting logs from chroot
- 5: Configuring log rotation
- 6: Load balancing logs between multiple destinations
1 - General recommendations
This section provides general tips and recommendations on using syslog-ng
. Some of the recommendations are detailed in the sections below:
-
Do not base the separation of log messages in different files on the
facility
parameter. As several applications and processes can use the same facility, the facility does not identify the application that sent the message. By default, thefacility
parameter is not even included in the log message itself. In general, sorting the log messages into several different files can make finding specific log messages difficult. If you must create separate log files, use the application name. -
Standard log messages include the local time of the sending host, without any time zone information. It is recommended to replace this timestamp with an ISODATE timestamp, because the ISODATE format includes the year and timezone as well. To convert all timestamps to the ISODATE format, include the following line in the
syslog-ng.conf
configuration file:options {ts-format(iso) ; };
-
Resolving the IP addresses of the clients to domain names can decrease the performance. For details, see Using name resolution in syslog-ng.
2 - Handling large message load
This section provides tips on optimizing the performance of syslog-ng
. Optimizing the performance is important for AxoSyslog hosts that handle large traffic.
-
Disable DNS resolution, or resolve hostnames locally. For details, see Using name resolution in syslog-ng.
-
Enable flow-control for the TCP sources. For details, see Managing incoming and outgoing messages with flow-control.
-
Do not use the
usertty()
destination driver. Under heavy load, the users are not be able to read the messages from the console, and it slows downsyslog-ng
. -
Do not use regular expressions in our filters. Evaluating general regular expressions puts a high load on the CPU. Use simple filter functions and logical operators instead. For details, see Regular expressions.
-
Warning
When receiving messages using the UDP protocol, increase the size of the UDP receive buffer on the receiver host (that is, the AxoSyslog server or relay receiving the messages). Note that on certain platforms, for example, on Red Hat Enterprise Linux 5, even low message load (~200 messages per second) can result in message loss, unless the
so-rcvbuf()
option of the source is increased. In this cases, you will need to increase thenet.core.rmem_max
parameter of the host (for example, to1024000
), but do not modifynet.core.rmem_default
parameter.As a general rule, increase the
so-rcvbuf()
so that the buffer size in kilobytes is higher than the rate of incoming messages per second. For example, to receive 2000 messages per second, set theso-rcvbuf()
at least to2 097 152
bytes. -
Increase the value of the
flush-lines()
parameter. Increasingflush-lines()
from0
to100
can increase the performance of AxoSyslog by 100%.
3 - Using name resolution in syslog-ng
The AxoSyslog application can resolve the hostnames of the clients and include them in the log messages. However, the performance of AxoSyslog is severely degraded if the domain name server is unaccessible or slow. Therefore, it is not recommended to resolve hostnames in syslog-ng
. If you must use name resolution from syslog-ng
, consider the following:
-
Use DNS caching. Verify that the DNS cache is large enough to store all important hostnames. (By default, the AxoSyslog DNS cache stores
1007
entries.)options { dns-cache-size(2000); };
-
If the IP addresses of the clients change only rarely, set the expiry of the DNS cache large.
options { dns-cache-expire(87600); };
-
If possible, resolve the hostnames locally. For details, see Resolving hostnames locally.
3.1 - Resolving hostnames locally
Purpose:
Resolving hostnames locally enables you to display hostnames in the log files for frequently used hosts, without having to rely on a DNS server. The known IP address - hostname pairs are stored locally in a file. In the log messages, AxoSyslog will replace the IP addresses of known hosts with their hostnames. To configure local name resolution, complete the following steps:
Steps:
-
Add the hostnames and the respective IP addresses to the file used for local name resolution. On Linux and UNIX systems, this is the
/etc/hosts
file. Consult the documentation of your operating system for details. -
Instruct AxoSyslog to resolve hostnames locally. Set the
use-dns()
option topersist_only
. -
Set the
dns-cache-hosts()
option to point to the file storing the hostnames.options { use-dns(persist_only); dns-cache-hosts(/etc/hosts); };
4 - Collecting logs from chroot
Purpose:
To collect logs from a chroot using an AxoSyslog client running on the host, complete the following steps:
Steps:
-
Create a
/dev
directory within the chroot. The applications running in the chroot send their log messages here. -
Create a local source in the configuration file of the AxoSyslog application running outside the chroot. This source should point to the
/dev/log
file within the chroot (for example, to the/chroot/dev/log
directory). -
Include the source in a log statement.
Note You need to set up timezone information within your chroot as well. This usually means creating a symlink to/etc/localtime
.
5 - Configuring log rotation
The AxoSyslog application does not rotate logs by itself. To use AxoSyslog for log rotation, consider the following approaches:
Use logrotate together with AxoSyslog:
-
It is ideal for workstations or when processing fewer logs.
-
It is included in most distributions by default.
-
Less scripting is required, only
logrotate
has to be configured correctly. -
Requires frequent restart (AxoSyslog must be reloaded/restarted when the files are rotated). After rotating the log files, reload AxoSyslog using the
syslog-ng-ctl reload
command, or use another method to send a SIGHUP to AxoSyslog. -
The statistics collected by AxoSyslog, and the correlation information gathered with Pattern Database, are lost with each restart.
Separate incoming logs based on time, host or other information:
-
It is ideal for central log servers, where regular restart of AxoSyslog is unfavorable.
-
Requires shell scripts or cron jobs to remove old logs.
-
It can be done by using macros in the destination name (in the filename, directory name, or the database table name). (For details on using macros, see Templates and macros.)
Example: File destination for log rotation
This sample file destination configuration stores incoming logs in files that are named based on the current year, month and day, and places these files in directories that are named based on the hostname:
destination d_sorted {
file(
"/var/log/remote/${HOST}/${YEAR}_${MONTH}_${DAY}.log"
create-dirs(yes)
);
};
Example: Logstore destination for log rotation
This sample logstore destination configuration stores incoming logs in logstores that are named based on the current year, month and day, and places these logstores in directories that are named based on the hostname:
destination d_logstore {
logstore(
"/var/log/remote/${HOST}/${YEAR}_${MONTH}_${DAY}.lgs"
compress(9)
create-dirs(yes)
);
};
Example: Command for cron for log rotation
This sample command for cron
removes files older than two weeks from the /var/log/remote
directory:
find /var/log/remote/ -daystart -mtime +14 -type f -exec rm {} \;
6 - Load balancing logs between multiple destinations
These sections describe a method of load balancing logs between multiple AxoSyslog destinations. The first subsection describes the round robin load balancing method based on the R_MSEC
macro of AxoSyslog, while the second subsection describes a configuration generator that you can use as an alternative to using the example configuration described in the first subsection.
For more information about the R_MSEC
macro and further macros of AxoSyslog, see Macros of AxoSyslog.
6.1 - Load balancing with a round robin load balancing method based on the R_MSEC macro of syslog-ng OSE
This section describes a round robin load balancing method based on the R_MSEC
macro of AxoSyslog to load balance your logs between multiple AxoSyslog destinations.
R_MSEC
is not precise enough, you can replace it with R_USEC
(which uses microseconds instead of milliseconds).
For more information about the R_MSEC
macro and further macros of AxoSyslog, see Macros of AxoSyslog.
Example: round robin load balancing between multiple destinations
The following example is a round-robin load balancing method, based on AxoSyslog’s R_MSEC
macro.
destination d_lb_network {
channel {
channel {
filter {
"0" == "$(% ${R_MSEC} 2)"
};
destination {
network("myhost1"
disk-buffer(flow-control-window-size(10000) capacity-bytes(2000000)));
};
flags(final);
};
channel {
filter {
"1" == "$(% ${R_MSEC} 2)"
};
destination {
network("myhost2"
disk-buffer(flow-control-window-size(10000) capacity-bytes(2000000)));
};
flags(final);
};
};
};
The filter {" <return value >" == "$(% ${R_MSEC} 2)"};
code snippets (in bold) serve as the basis of the method. This filter separates incoming log messages’ timestamp values based on the R_MSEC
macro, using a division with remainder method, and distributes the log messages equally between two destinations based on the return value (in this case, 0
or 1
).
If you need a file instead of a network destination, replace the network destination with the file in the example (and use the same analogy for any other AxoSyslog destinations).
For an alternative method to use the round robin load balancing method based on the R_MSEC
macro, see Configuration generator for the load balancing method based on MSEC hashing.
6.2 - Configuration generator for the load balancing method based on MSEC hashing
This section describes a configuration generator for the load balancing method based on MSEC hashing to load balance your logs between multiple AxoSyslog destinations.
Consider that network-load-balancer()
is not a destination, only a script that generates the example configuration described in Load balancing with a round robin load balancing method based on the R_MSEC macro of syslog-ng OSE.
Also consider that the configuration generator script may change incompatibly in the future. As a result, Axoflow does not officially support using this script, and recommends that you only use this script at your own risk.
As an alternative to using the example configuration described in Load balancing with a round robin load balancing method based on the R_MSEC macro of syslog-ng OSE, a configuration generator script is also available in AxoSyslog:
destination d_lb {network-load-balancer(targets(myhost1 myhost2 myhost3))};
Where destinations share the same configuration except for the destination address, balancing is based on MSEC hashing.