] "
+ if(int(@a)-3 < 0);
+
+ delete($hash->{HELPER}{EVNTLOG});
+ delete($hash->{HELPER}{FHEMLOG});
+ delete($hash->{HELPER}{IDENT});
+
+ Log2Syslog_setidrex($hash,$a[3]) if($a[3]);
+ Log2Syslog_setidrex($hash,$a[4]) if($a[4]);
+ Log2Syslog_setidrex($hash,$a[5]) if($a[5]);
+
+ return "Bad regexp: starting with *"
+ if((defined($hash->{HELPER}{EVNTLOG}) && $hash->{HELPER}{EVNTLOG} =~ m/^\*/) || (defined($hash->{HELPER}{FHEMLOG}) && $hash->{HELPER}{FHEMLOG} =~ m/^\*/));
+ eval { "Hallo" =~ m/^$hash->{HELPER}{EVNTLOG}$/ } if($hash->{HELPER}{EVNTLOG});
+ return "Bad regexp: $@" if($@);
+ eval { "Hallo" =~ m/^$hash->{HELPER}{FHEMLOG}$/ } if($hash->{HELPER}{FHEMLOG});
+ return "Bad regexp: $@" if($@);
+
+ $hash->{PEERHOST} = $a[2]; # Destination Host (Syslog Server)
+ $hash->{MYHOST} = hostfqdn (); # FQDN eigener Host
+ $hash->{SEQNO} = 1; # PROCID in IETF, wird kontinuierlich hochgezählt
+ $hash->{VERSION} = $Log2SyslogVn;
+ $logInform{$hash->{NAME}} = "Log2Syslog_fhemlog"; # Funktion die in hash %loginform für $name eingetragen wird
+ $hash->{HELPER}{SSLVER} = "n.a."; # Initialisierung
+ $hash->{HELPER}{SSLALGO} = "n.a."; # Initialisierung
+ $hash->{HELPER}{LTIME} = time(); # Init Timestmp f. Ratenbestimmung
+ $hash->{HELPER}{OLDSEQNO} = $hash->{SEQNO}; # Init Sequenznummer f. Ratenbestimmung
+
+ readingsBeginUpdate($hash);
+ readingsBulkUpdate($hash, "SSL_Version", "n.a.");
+ readingsBulkUpdate($hash, "SSL_Algorithm", "n.a.");
+ readingsBulkUpdate($hash, "Transfered_logs_per_minute", 0);
+ readingsBulkUpdate($hash, "state", "initialized");
+ readingsEndUpdate($hash,1);
+
+ Log2Syslog_trate($hash); # regelm. Berechnung Transfer Rate starten
+
+return undef;
+}
+
+sub Log2Syslog_Undef($$) {
+ my ($hash, $name) = @_;
+ RemoveInternalTimer($hash);
+return undef;
+}
+
+sub Log2Syslog_Delete($$) {
+ my ($hash, $arg) = @_;
+ delete $logInform{$hash->{NAME}};
+return undef;
+}
+
+###############################################################################
+sub Log2Syslog_Attr {
+ my ($cmd,$name,$aName,$aVal) = @_;
+ my $hash = $defs{$name};
+ my $do;
+
+ # $cmd can be "del" or "set"
+ # $name is device name
+ # aName and aVal are Attribute name and value
+
+ if ($aName eq "disable") {
+ if($cmd eq "set") {
+ $do = ($aVal) ? 1 : 0;
+ }
+ $do = 0 if($cmd eq "del");
+ my $val = ($do == 1 ? "disabled" : "active");
+
+ readingsSingleUpdate($hash, "state", $val, 1);
+ }
+
+ if ($aName eq "TLS") {
+ if($cmd eq "set") {
+ $do = ($aVal) ? 1 : 0;
+ }
+ $do = 0 if($cmd eq "del");
+ if ($do == 0) {
+ $hash->{HELPER}{SSLVER} = "n.a.";
+ $hash->{HELPER}{SSLALGO} = "n.a.";
+ readingsSingleUpdate($hash, "SSL_Version", "n.a.", 1);
+ readingsSingleUpdate($hash, "SSL_Algorithm", "n.a.", 1);
+ }
+ }
+
+ if ($cmd eq "set" && $aName =~ /port|timeout|rateCalcRerun/) {
+ if($aVal !~ m/^\d+$/) { return " The Value of \"$aName\" is not valid. Use only figures !";}
+ }
+
+return undef;
+}
+
+#################################################################################
+# Eventlogging
+#################################################################################
+sub Log2Syslog_eventlog($$) {
+ # $hash is my entry, $dev is the entry of the changed device
+ my ($hash,$dev) = @_;
+ my $name = $hash->{NAME};
+ my $rex = $hash->{HELPER}{EVNTLOG};
+ my ($prival,$sock,$data,$pid);
+
+ return if(IsDisabled($name) || !$rex);
+ my $events = deviceEvents($dev, AttrVal($name, "addStateEvent", 0));
+ return if(!$events);
+
+ my $n = $dev->{NAME};
+ my $max = int(@{$events});
+ my $tn = $dev->{NTFY_TRIGGERTIME};
+ my $ct = $dev->{CHANGETIME};
+
+ $sock = Log2Syslog_setsock($hash);
+
+ if(defined($sock)) {
+ for (my $i = 0; $i < $max; $i++) {
+ my $txt = $events->[$i];
+ $txt = "" if(!defined($txt));
+ $txt = Log2Syslog_charfilter($hash,$txt);
+
+ my $tim = (($ct && $ct->[$i]) ? $ct->[$i] : $tn);
+ my ($date,$time) = split(" ",$tim);
+
+ if($n =~ m/^$rex$/ || "$n:$txt" =~ m/^$rex$/ || "$tim:$n:$txt" =~ m/^$rex$/) {
+ my $otp = "$n $txt";
+ $otp = "$tim $otp" if AttrVal($name,'addTimestamp',0);
+ $prival = Log2Syslog_setprival($txt);
+
+ ($data,$pid) = Log2Syslog_setpayload($hash,$prival,$date,$time,$otp,"event");
+ next if(!$data);
+
+ my $ret = syswrite $sock, $data."\n";
+ if($ret && $ret > 0) {
+ Log2Syslog_Log3slog($name, 4, "$name - Payload sequence $pid sent\n");
+ } else {
+ my $err = $!;
+ Log2Syslog_Log3slog($name, 4, "$name - Warning - Payload sequence $pid NOT sent: $err\n");
+ readingsSingleUpdate($hash, "state", "write error: $err", 1) if($err ne OldValue($name));
+ }
+ }
+ }
+
+ Log2Syslog_closesock($hash,$sock);
+ }
+
+return "";
+}
+
+#################################################################################
+# FHEM system logging
+#################################################################################
+sub Log2Syslog_fhemlog($$) {
+ my ($name,$raw) = @_;
+ my $hash = $defs{$name};
+ my $rex = $hash->{HELPER}{FHEMLOG};
+ my ($prival,$sock,$err,$ret,$data,$pid);
+
+ return if(IsDisabled($name) || !$rex);
+
+ my ($date,$time,$vbose,undef,$txt) = split(" ",$raw,5);
+ $txt = Log2Syslog_charfilter($hash,$txt);
+ $date =~ s/\./-/g;
+ my $tim = $date." ".$time;
+
+ if($txt =~ m/^$rex$/ || "$vbose: $txt" =~ m/^$rex$/) {
+ my $otp = "$vbose: $txt";
+ $otp = "$tim $otp" if AttrVal($name,'addTimestamp',0);
+ $prival = Log2Syslog_setprival($txt,$vbose);
+
+ ($data,$pid) = Log2Syslog_setpayload($hash,$prival,$date,$time,$otp,"fhem");
+ return if(!$data);
+
+ $sock = Log2Syslog_setsock($hash);
+
+ if (defined($sock)) {
+ $ret = syswrite $sock, $data."\n" if($data);
+ if($ret && $ret > 0) {
+ Log2Syslog_Log3slog($name, 4, "$name - Payload sequence $pid sent\n");
+ } else {
+ my $err = $!;
+ Log2Syslog_Log3slog($name, 4, "$name - Warning - Payload sequence $pid NOT sent: $err\n");
+ readingsSingleUpdate($hash, "state", "write error: $err", 1) if($err ne OldValue($name));
+ }
+
+ Log2Syslog_closesock($hash,$sock);
+ }
+ }
+
+return;
+}
+
+###############################################################################
+# Helper für ident & Regex setzen
+###############################################################################
+sub Log2Syslog_setidrex ($$) {
+ my ($hash,$a) = @_;
+
+ $hash->{HELPER}{EVNTLOG} = (split("event:",$a))[1] if(lc($a) =~ m/^event:.*/);
+ $hash->{HELPER}{FHEMLOG} = (split("fhem:",$a))[1] if(lc($a) =~ m/^fhem:.*/);
+ $hash->{HELPER}{IDENT} = (split("ident:",$a))[1] if(lc($a) =~ m/^ident:.*/);
+
+return;
+}
+
+###############################################################################
+# Zeichencodierung für Payload filtern
+###############################################################################
+sub Log2Syslog_charfilter ($$) {
+ my ($hash,$txt) = @_;
+ my $name = $hash->{NAME};
+
+ # nur erwünschte Zeichen in payload, ASCII %d32-126
+ $txt =~ s/ß/ss/g;
+ $txt =~ s/ä/ae/g;
+ $txt =~ s/ö/oe/g;
+ $txt =~ s/ü/ue/g;
+ $txt =~ s/Ä/Ae/g;
+ $txt =~ s/Ö/Oe/g;
+ $txt =~ s/Ü/Ue/g;
+ $txt =~ s/€/EUR/g;
+ $txt =~ tr/ A-Za-z0-9!"#$%&'()*+,-.\/:;<=>?@[\]^_`{|}~//cd;
+
+return($txt);
+}
+
+###############################################################################
+# erstelle Socket
+###############################################################################
+sub Log2Syslog_setsock ($) {
+ my ($hash) = @_;
+ my $name = $hash->{NAME};
+ my $host = $hash->{PEERHOST};
+ my $port = AttrVal($name, "TLS", 0)?AttrVal($name, "port", 6514):AttrVal($name, "port", 514);
+ my $protocol = lc(AttrVal($name, "protocol", "udp"));
+ my $st = "active";
+ my $timeout = AttrVal($name, "timeout", 0.5);
+ my ($sock,$lo,$sslver,$sslalgo);
+
+ if(AttrVal($name, "TLS", 0)) {
+ # TLS gesicherte Verbindung
+ # TLS Transport nach RFC5425 https://tools.ietf.org/pdf/rfc5425.pdf
+ $attr{$name}{protocol} = "TCP" if(AttrVal($name, "protocol", "UDP") ne "TCP");
+ $sslver = "n.a.";
+ $sslalgo = "n.a.";
+ eval "use IO::Socket::SSL";
+ if($@) {
+ $st = "$@";
+ } else {
+ $sock = IO::Socket::INET->new(PeerHost => $host, PeerPort => $port, Proto => 'tcp', Blocking => 0);
+ if (!$sock) {
+ $st = "unable open socket for $host, $protocol, $port";
+ } else {
+ $sock->blocking(1);
+ eval { IO::Socket::SSL->start_SSL($sock,
+ SSL_verify_mode => "SSL_VERIFY_PEER",
+ SSL_version => "TLSv12",
+ SSL_hostname => $host,
+ SSL_veriycn_scheme => "rfc5425",
+ SSL_veriycn_publicsuffix => '',
+ Timeout => $timeout
+ ) || undef $sock; };
+ if (!$sock) {
+ undef $sock;
+ $st = "SSL error: ".IO::Socket::SSL::errstr();
+ } else {
+ $sslver = $sock->get_sslversion();
+ $sslalgo = $sock->get_fingerprint();
+ $sslalgo = (split("\\\$",$sslalgo))[0];
+ $lo = "Socket opened for Host: $host, Protocol: $protocol, Port: $port, TLS: 0";
+ }
+ }
+ }
+ } else {
+ # erstellt ungesicherte Socket Verbindung
+ $sslver = "n.a.";
+ $sslalgo = "n.a.";
+ $sock = new IO::Socket::INET (PeerHost => $host, PeerPort => $port, Proto => $protocol, Timeout => $timeout );
+
+ if (!$sock) {
+ undef $sock;
+ $st = "unable open socket for $host, $protocol, $port";
+ } else {
+ $sock->blocking(0);
+ # Logausgabe (nur in das fhem Logfile !)
+ $lo = "Socket opened for Host: $host, Protocol: $protocol, Port: $port, TLS: 0";
+ }
+ }
+
+ readingsSingleUpdate($hash, "state", $st, 1) if($st ne OldValue($name));
+
+ if($sslver ne $hash->{HELPER}{SSLVER}) {
+ readingsSingleUpdate($hash, "SSL_Version", $sslver, 1);
+ $hash->{HELPER}{SSLVER} = $sslver;
+ }
+ if($sslalgo ne $hash->{HELPER}{SSLALGO}) {
+ readingsSingleUpdate($hash, "SSL_Algorithm", $sslalgo, 1);
+ $hash->{HELPER}{SSLALGO} = $sslalgo;
+ }
+
+ Log2Syslog_Log3slog($name, 5, "$name - $lo") if($lo);
+
+return($sock);
+}
+
+###############################################################################
+# Socket schließen
+###############################################################################
+sub Log2Syslog_closesock($$) {
+ my ($hash,$sock) = @_;
+
+ shutdown($sock, 1);
+ if(AttrVal($hash->{NAME}, "TLS", 0)) {
+ $sock->close(SSL_no_shutdown => 1);
+ } else {
+ $sock->close();
+ }
+
+return;
+}
+
+###############################################################################
+# set PRIVAL (severity & facility)
+###############################################################################
+sub Log2Syslog_setprival ($;$$) {
+ my ($txt,$vbose) = @_;
+ my $prival;
+
+ # Priority = (facility * 8) + severity
+ # https://tools.ietf.org/pdf/rfc5424.pdf
+
+ # determine facility
+ my $fac = 5; # facility by syslogd
+
+ # calculate severity
+ # mapping verbose level to severity
+ # 0: Critical -> 2
+ # 1: Error -> 3
+ # 2: Warning -> 4
+ # 3: Notice -> 5
+ # 4: Informational -> 6
+ # 5: Debug -> 7
+
+ my $sv = 5; # notice (default)
+
+ if ($vbose) {
+ # map verbose to severity
+ $sv = 2 if ($vbose == 0);
+ $sv = 3 if ($vbose == 1);
+ $sv = 4 if ($vbose == 2);
+ $sv = 5 if ($vbose == 3);
+ $sv = 6 if ($vbose == 4);
+ $sv = 7 if ($vbose == 5);
+ }
+
+ $sv = 3 if (lc($txt) =~ m/error/); # error condition
+ $sv = 4 if (lc($txt) =~ m/warning/); # warning conditions
+
+ $prival = ($fac*8)+$sv;
+
+return($prival);
+}
+
+###############################################################################
+# erstellen Payload für Syslog
+###############################################################################
+sub Log2Syslog_setpayload ($$$$$$) {
+ my ($hash,$prival,$date,$time,$otp,$lt) = @_;
+ my $name = $hash->{NAME};
+ my $ident = ($hash->{HELPER}{IDENT}?$hash->{HELPER}{IDENT}:$name)."_".$lt;
+ my $myhost = $hash->{MYHOST}?$hash->{MYHOST}:"0.0.0.0";
+ my $lf = AttrVal($name, "logFormat", "IETF");
+ my $data;
+
+ return undef,undef if(!$otp);
+ my $pid = $hash->{SEQNO}; # PayloadID zur Nachverfolgung der Eventabfolge
+ $hash->{SEQNO}++;
+
+ my ($year,$month,$day) = split("-",$date);
+
+ if ($lf eq "BSD") {
+ # BSD Protokollformat https://tools.ietf.org/html/rfc3164
+ $time = (split(/\./,$time))[0] if($time =~ m/\./); # msec ist nicht erlaubt
+ $month = $Log2Syslog_BSDMonth{$month}; # Monatsmapping, z.B. 01 -> Jan
+ $day =~ s/0/ / if($day =~ m/^0.*$/); # in Tagen < 10 muss 0 durch Space ersetzt werden
+ $ident = substr($ident,0, $RFC3164len{TAG}); # Länge TAG Feld begrenzen
+ no warnings 'uninitialized';
+ $data = "<$prival>$month $day $time $myhost $ident: : $otp";
+ use warnings;
+ $data = substr($data,0, $RFC3164len{DL}); # Länge Total begrenzen
+ }
+
+ if ($lf eq "IETF") {
+ # IETF Protokollformat https://tools.ietf.org/html/rfc5424
+ my $mid = "FHEM"; # message ID, identify protocol of message, e.g. for firewall filter
+ my $tim = $date."T".$time;
+ no warnings 'uninitialized';
+ $data = "<$prival>1 $tim $myhost $ident $pid $mid - : $otp";
+ use warnings;
+ }
+
+ if($data =~ /\s$/){$data =~ s/\s$//;}
+ my $dl = length($data)+1; # Länge muss ! für TLS stimmen, sonst keine Ausgabe !
+
+ # wenn Transport Layer Security (TLS) -> Transport Mapping for Syslog https://tools.ietf.org/pdf/rfc5425.pdf
+ if(AttrVal($name, "TLS", 0)) {
+ $data = "$dl $data";
+ $data = substr($data,0, $RFC5425len{DL}); # Länge Total begrenzen
+ Log2Syslog_Log3slog($name, 4, "$name - SSL-Payload created with length: ".(($dl>$RFC5425len{DL})?$RFC5425len{DL}:$dl) );
+ }
+
+ my $ldat = ($dl>130)?(substr($data,0, 130)." ..."):$data;
+ Log2Syslog_Log3slog($name, 4, "$name - Payload sequence $pid created:\n$ldat");
+
+return($data,$pid);
+}
+
+###############################################################################
+# eigene Log3-Ableitung - Schleife vermeiden
+###############################################################################
+sub Log2Syslog_Log3slog($$$) {
+ my ($dev, $loglevel, $text) = @_;
+ our ($logopened,$currlogfile);
+
+ $dev = $dev->{NAME} if(defined($dev) && ref($dev) eq "HASH");
+
+ if(defined($dev) &&
+ defined($attr{$dev}) &&
+ defined (my $devlevel = $attr{$dev}{verbose})) {
+ return if($loglevel > $devlevel);
+
+ } else {
+ return if($loglevel > $attr{global}{verbose});
+
+ }
+
+ my ($seconds, $microseconds) = gettimeofday();
+ my @t = localtime($seconds);
+ my $nfile = ResolveDateWildcards($attr{global}{logfile}, @t);
+ OpenLogfile($nfile) if(!$currlogfile || $currlogfile ne $nfile);
+
+ my $tim = sprintf("%04d.%02d.%02d %02d:%02d:%02d",
+ $t[5]+1900,$t[4]+1,$t[3], $t[2],$t[1],$t[0]);
+ if($attr{global}{mseclog}) {
+ $tim .= sprintf(".%03d", $microseconds/1000);
+ }
+
+ if($logopened) {
+ print LOG "$tim $loglevel: $text\n";
+ } else {
+ print "$tim $loglevel: $text\n";
+ }
+
+return undef;
+}
+
+###############################################################################
+# Bestimmung Übertragungsrate
+###############################################################################
+sub Log2Syslog_trate($) {
+ my ($hash) = @_;
+ my $name = $hash->{NAME};
+ my $rerun = AttrVal($name, "rateCalcRerun", 60);
+
+ if ($hash->{HELPER}{LTIME}+60 <= time()) {
+ my $div = (time()-$hash->{HELPER}{LTIME})/60;
+ my $spm = sprintf "%.0f", ($hash->{SEQNO} - $hash->{HELPER}{OLDSEQNO})/$div;
+ $hash->{HELPER}{OLDSEQNO} = $hash->{SEQNO};
+ $hash->{HELPER}{LTIME} = time();
+
+ my $ospm = ReadingsVal($name, "Transfered_logs_per_minute", 0);
+ if($spm != $ospm) {
+ readingsSingleUpdate($hash, "Transfered_logs_per_minute", $spm, 1);
+ } else {
+ readingsSingleUpdate($hash, "Transfered_logs_per_minute", $spm, 0);
+ }
+ }
+
+RemoveInternalTimer($hash, "Log2Syslog_trate");
+InternalTimer(gettimeofday()+$rerun, "Log2Syslog_trate", $hash, 0);
+return;
+}
+
+1;
+
+=pod
+=item helper
+=item summary forwards FHEM system logs and/or events to a syslog server
+=item summary_DE leitet FHEM Systemlogs und/oder Events an einen Syslog-Server weiter
+
+=begin html
+
+
+Log2Syslog
+
+ Send FHEM system log entries and/or FHEM events to an external syslog server.
+ The syslog protocol has been implemented according the specifications of RFC5424 (IETF),
+ RFC3164 (BSD) and the TLS transport protocol according the
+ RFC5425.
+
+
+ Prerequisits
+
+
+ The additional perl module "IO::Socket::INET" must be installed on your system.
+ Install this package from cpan or by
+
+ apt-get install libio-socket-multicast-perl (only on Debian based installations)
+
+
+
+
+ Define
+
+
+ define <name> Log2Syslog <destination host> [ident:<ident>] [event:<regexp>] [fhem:<regexp>]
+
+
+ <destination host> = host where the syslog server is running
+ [ident:<ident>] = optional program identifier. If not set the device name will be used as default
+ [event:<regexp>] = optional regex to filter events for logging
+ [fhem:<regexp>] = optional regex to filter fhem system log for logging
+
+ After definition the new device sends all new appearing fhem systemlog entries and events to the destination host,
+ port=514/UDP format:IETF, immediately without further settings if the regex for fhem or event were set.
+ Without setting regex no fhem system log or event log will be forwarded.
+
+ The verbose level of FHEM system logs will convert into equivalent syslog severity level.
+ Thurthermore the message text will be scanned for signal terms "warning" and "error" (with case insensitivity).
+ Dependent off the severity will be set equivalent as well. If a severity is already set by verbose level, it wil be overwritten
+ by the level according to the signal term found in the message text.
+
+ Lookup table Verbose-Level to Syslog severity level:
+
+
+
+ verbose-Level | Schweregrad in Syslog |
+ 0 | Critical |
+ 1 | Error |
+ 2 | Warning |
+ 3 | Notice |
+ 4 | Informational |
+ 5 | Debug |
+
+
+
+
+
+ Example to log anything:
+
+ define splunklog Log2Syslog fhemtest 192.168.2.49 ident:Test event:.* fhem:.*
+
+ will produce output like this raw example of a splunk syslog server:
+
Aug 18 21:06:46 fhemtest.myds.me 1 2017-08-18T21:06:46 fhemtest.myds.me Test_event 13339 FHEM - : LogDB sql_processing_time: 0.2306
+Aug 18 21:06:46 fhemtest.myds.me 1 2017-08-18T21:06:46 fhemtest.myds.me Test_event 13339 FHEM - : LogDB background_processing_time: 0.2397
+Aug 18 21:06:45 fhemtest.myds.me 1 2017-08-18T21:06:45 fhemtest.myds.me Test_event 13339 FHEM - : LogDB CacheUsage: 21
+Aug 18 21:08:27 fhemtest.myds.me 1 2017-08-18T21:08:27.760 fhemtest.myds.me Test_fhem 13339 FHEM - : 4: CamTER - Informations of camera Terrasse retrieved
+Aug 18 21:08:27 fhemtest.myds.me 1 2017-08-18T21:08:27.095 fhemtest.myds.me Test_fhem 13339 FHEM - : 4: CamTER - CAMID already set - ignore get camid
+
+
+ The structure of the payload differs dependent of the used logFormat.
+
+ logFormat IETF:
+ "<PRIVAL>1 TIME MYHOST IDENT PID MID - : MESSAGE"
+
+
+
+
+ PRIVAL | priority value (coded from "facility" and "severity") |
+ TIME | timestamp according to RFC5424 |
+ MYHOST | Internal MYHOST |
+ IDENT | ident-Tag from DEF if set, or else the own device name. The statement will be completed by "_fhem" (FHEM-Log) respectively "_event" (Event-Log). |
+ PID | sequential Payload-ID |
+ MID | fix value "FHEM" |
+ MESSAGE | the dataset to transfer |
+
+
+
+
+ logFormat BSD:
+ "<PRIVAL>MONAT TAG TIME MYHOST IDENT: : MESSAGE"
+
+
+
+
+ PRIVAL | priority value (coded from "facility" and "severity") |
+ MONAT | month according to RFC3164 |
+ TAG | day of month according to RFC3164 |
+ TIME | timestamp according to RFC3164 |
+ MYHOST | Internal MYHOST |
+ IDENT | ident-Tag from DEF if set, or else the own device name. The statement will be completed by "_fhem" (FHEM-Log) respectively "_event" (Event-Log). |
+ MESSAGE | the dataset to transfer |
+
+
+
+
+
+
+
+
+
+ Attributes
+
+
+
+
+ Readings
+
+
+
+
+ SSL_Algorithm | used SSL algorithm if SSL is enabled and active |
+ SSL_Version | the used TLS-version if encryption is enabled and is active |
+ Transfered_logs_per_minute | the average number of forwarded logs/events per minute |
+
+
+
+
+
+
+=end html
+=begin html_DE
+
+
+Log2Syslog
+
+ Sendet FHEM Systemlog Einträge und/oder Events an einen externen Syslog-Server weiter.
+ Die Implementierung des Syslog-Protokolls erfolgte entsprechend den Vorgaben von RFC5424 (IETF),
+ RFC3164 (BSD) sowie dem TLS Transport Protokoll nach
+ RFC5425.
+
+
+ Voraussetzungen
+
+
+ Es wird das Perl Modul "IO::Socket::INET" benötigt und muss installiert sein.
+ Das Modul kann über CPAN oder mit
+
+ apt-get install libio-socket-multicast-perl (auf Debian Linux Systemen)
+
+ installiert werden.
+
+
+
+
+ Definition
+
+
+ define <name> Log2Syslog <Zielhost> [ident:<ident>] [event:<regexp>] [fhem:<regexp>]
+
+
+ <Zielhost> = Host (Name oder IP-Adresse) auf dem der Syslog-Server läuft
+ [ident:<ident>] = optionaler Programm Identifier. Wenn nicht gesetzt wird per default der Devicename benutzt.
+ [event:<regexp>] = optionaler regulärer Ausdruck zur Filterung von Events zur Weiterleitung
+ [fhem:<regexp>] = optionaler regulärer Ausdruck zur Filterung von FHEM Logs zur Weiterleitung
+
+ Direkt nach der Definition sendet das neue Device alle neu auftretenden FHEM Systemlog Einträge und Events ohne weitere
+ Einstellungen an den Zielhost, Port=514/UDP Format=IETF, wenn reguläre Ausdrücke für Events/FHEM angegeben wurden.
+ Wurde kein Regex gesetzt, erfolgt keine Weiterleitung von Events oder FHEM Systemlogs.
+
+ Die Verbose-Level der FHEM Systemlogs werden in entsprechende Schweregrade der Syslog-Messages umgewandelt.
+ Weiterhin wird der Meldungstext der FHEM Systemlogs und Events nach den Signalwörtern "warning" und "error" durchsucht
+ (Groß- /Kleinschreibung wird nicht beachtet). Davon abhängig wird der Schweregrad ebenfalls äquivalent gesetzt und überschreibt
+ einen eventuell bereits durch Verbose-Level gesetzten Schweregrad.
+
+ Umsetzungstabelle Verbose-Level in Syslog-Schweregrad Stufe:
+
+
+
+ Verbose-Level | Schweregrad in Syslog |
+ 0 | Critical |
+ 1 | Error |
+ 2 | Warning |
+ 3 | Notice |
+ 4 | Informational |
+ 5 | Debug |
+
+
+
+
+
+ Beispiel:
+
+ define splunklog Log2Syslog fhemtest 192.168.2.49 ident:Test event:.* fhem:.*
+
+ Es werden alle Events weitergeleitet wie deses Beispiel der raw-Ausgabe eines Splunk Syslog Servers zeigt::
+
Aug 18 21:06:46 fhemtest.myds.me 1 2017-08-18T21:06:46 fhemtest.myds.me Test_event 13339 FHEM - : LogDB sql_processing_time: 0.2306
+Aug 18 21:06:46 fhemtest.myds.me 1 2017-08-18T21:06:46 fhemtest.myds.me Test_event 13339 FHEM - : LogDB background_processing_time: 0.2397
+Aug 18 21:06:45 fhemtest.myds.me 1 2017-08-18T21:06:45 fhemtest.myds.me Test_event 13339 FHEM - : LogDB CacheUsage: 21
+Aug 18 21:08:27 fhemtest.myds.me 1 2017-08-18T21:08:27.760 fhemtest.myds.me Test_fhem 13339 FHEM - : 4: CamTER - Informations of camera Terrasse retrieved
+Aug 18 21:08:27 fhemtest.myds.me 1 2017-08-18T21:08:27.095 fhemtest.myds.me Test_fhem 13339 FHEM - : 4: CamTER - CAMID already set - ignore get camid
+
+
+ Der Aufbau der Payload unterscheidet sich je nach verwendeten logFormat.
+
+ logFormat IETF:
+ "<PRIVAL>1 TIME MYHOST IDENT PID MID - : MESSAGE"
+
+
+
+
+ PRIVAL | Priority Wert (kodiert aus "facility" und "severity") |
+ TIME | Timestamp nach RFC5424 |
+ MYHOST | Internal MYHOST |
+ IDENT | Ident-Tag aus DEF wenn angegeben, sonst der eigene Devicename. Die Angabe wird mit "_fhem" (FHEM-Log) bzw. "_event" (Event-Log) ergänzt. |
+ PID | fortlaufende Payload-ID |
+ MID | fester Wert "FHEM" |
+ MESSAGE | der zu übertragende Datensatz |
+
+
+
+
+ logFormat BSD:
+ "<PRIVAL>MONAT TAG TIME MYHOST IDENT: : MESSAGE"
+
+
+
+
+ PRIVAL | Priority Wert (kodiert aus "facility" und "severity") |
+ MONAT | Monatsangabe nach RFC3164 |
+ TAG | Tag des Monats nach RFC3164 |
+ TIME | Zeitangabe nach RFC3164 |
+ MYHOST | Internal MYHOST |
+ IDENT | Ident-Tag aus DEF wenn angegeben, sonst der eigene Devicename. Die Angabe wird mit "_fhem" (FHEM-Log) bzw. "_event" (Event-Log) ergänzt. |
+ MESSAGE | der zu übertragende Datensatz |
+
+
+
+
+
+
+
+
+
+ Attribute
+
+
+
+
+ Readings
+
+
+
+
+ SSL_Algorithm | der verwendete SSL Algorithmus wenn SSL eingeschaltet und aktiv ist |
+ SSL_Version | die verwendete TLS-Version wenn die Veschlüsselung aktiv ist |
+ Transfered_logs_per_minute | die durchschnittliche Anzahl der übertragenen Logs/Events pro Minute |
+
+
+
+
+
+=end html_DE
+=cut
diff --git a/fhem/MAINTAINER.txt b/fhem/MAINTAINER.txt
index 3c521a6d9..fe5a84371 100644
--- a/fhem/MAINTAINER.txt
+++ b/fhem/MAINTAINER.txt
@@ -362,6 +362,7 @@ FHEM/92_FileLog.pm rudolfkoenig http://forum.fhem.de Automatis
FHEM/92_SingleFileLog.pm rudolfkoenig http://forum.fhem.de Automatisierung
FHEM/93_DbLog.pm Tobias http://forum.fhem.de Automatisierung
FHEM/93_DbRep.pm DS_Starter http://forum.fhem.de Sonstiges
+FHEM/93_Log2Syslog.pm DS_Starter http://forum.fhem.de Automatisierung
FHEM/93_FHEM2FHEM.pm rudolfkoenig http://forum.fhem.de Automatisierung
FHEM/95_FLOORPLAN.pm ulimaass http://forum.fhem.de Frontends/FLOORPLAN
FHEM/95_Alarm.pm pahenning http://forum.fhem.de Unterstützende Dienste
@@ -499,7 +500,6 @@ FHEM/GPUtils.pm ntruchsess http://forum.fhem.de FHEM Deve
contrib/23_WEBTHERM.pm betateilchen/sachag http://forum.fhem.de Sonstiges
contrib/70_ONKYO_AVR_PULL.pm loredo http://forum.fhem.de Multimedia
contrib/92_rsyslog.pm DS_Starter http://forum.fhem.de Automatisierung
-contrib/93_Log2Syslog.pm DS_Starter http://forum.fhem.de Automatisierung
contrib/98_exportdevice.pm loredo http://forum.fhem.de Sonstiges
contrib/betateilchen/* betateilchen http://forum.fhem.de Sonstiges
contrib/holiday betateilchen http://forum.fhem.de Sonstiges