diff --git a/fhem/CHANGED b/fhem/CHANGED index 84c9050a5..14eb9b64f 100644 --- a/fhem/CHANGED +++ b/fhem/CHANGED @@ -1,5 +1,6 @@ # Add changes at the top of the list. Keep it in ASCII, and 80-char wide. # Do not insert empty lines here, update check depends on it. + - new: 93_Log2Syslog: V3.0.0, first release - bugfix: 93_DbRep: V5.6.2, commandref revised - feature: 00_MQTT: OnMessageFn, last-will, onConnect/onDisconnect - feature: 10_MQTT_DEVICE: improved publishSet, retain, subscribeReadings diff --git a/fhem/FHEM/93_Log2Syslog.pm b/fhem/FHEM/93_Log2Syslog.pm new file mode 100644 index 000000000..be97c9126 --- /dev/null +++ b/fhem/FHEM/93_Log2Syslog.pm @@ -0,0 +1,1000 @@ +###################################################################################################################### +# $Id$ +###################################################################################################################### +# 93_Log2Syslog.pm +# +# (c) 2017 by Heiko Maaz +# e-mail: Heiko dot Maaz at t-online dot de +# +# This script is part of fhem. +# +# Fhem is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 2 of the License, or +# (at your option) any later version. +# +# Fhem is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with fhem. If not, see . +# +# The module based on idea and input from betateilchen 92_rsyslog.pm +# +# Implements the Syslog Protocol of RFC 5424 https://tools.ietf.org/html/rfc5424 +# and RFC 3164 https://tools.ietf.org/html/rfc3164 and +# TLS Transport according to RFC5425 https://tools.ietf.org/pdf/rfc5425.pdf as well +# +###################################################################################################################### +# Versions History: +# +# 3.0.0 27.08.2017 change attr type to protocol, ready to check in +# 2.6.0 26.08.2017 more than one Log2Syslog device can be created +# 2.5.2 26.08.2018 fix in splitting timestamp, change Log2Syslog_trate using internaltimer with attr +# rateCalcRerun, function Log2Syslog_closesock +# 2.5.1 24.08.2017 some fixes +# 2.5.0 23.08.2017 TLS encryption available, new readings, $readingFnAttributes +# 2.4.1 21.08.2017 changes in sub Log2Syslog_charfilter, change PROCID to $hash->{SEQNO} +# switch to non-blocking in subs event/Log2Syslog_fhemlog +# 2.4.0 20.08.2017 new sub Log2Syslog_Log3slog for entries in local fhemlog only -> verbose support +# 2.3.1 19.08.2017 commandref revised +# 2.3.0 18.08.2017 new parameter "ident" in DEF, sub setidex, Log2Syslog_charfilter +# 2.2.0 17.08.2017 set BSD data length, set only acceptable characters (USASCII) in payload +# commandref revised +# 2.1.0 17.08.2017 sub Log2Syslog_setsock created +# 2.0.0 16.08.2017 create syslog without SYS::SYSLOG +# 1.1.1 13.08.2017 registrate Log2Syslog_fhemlog to %loginform in case of sending fhem-log +# attribute timeout, commandref revised +# 1.1.0 26.07.2017 add regex search to sub Log2Syslog_fhemlog +# 1.0.0 25.07.2017 initial version + +package main; + +use strict; +use warnings; +eval "use IO::Socket::INET;1" or my $MissModulSocket = "IO::Socket::INET"; +eval "use Net::Domain qw(hostfqdn);1" or my $MissModulNDom = "Net::Domain"; + +############################################################################### +# Forward declarations +# +sub Log2Syslog_Log3slog($$$); + +my $Log2SyslogVn = "3.0.0"; + +# Mappinghash BSD-Formatierung Monat +my %Log2Syslog_BSDMonth = ( + "01" => "Jan", + "02" => "Feb", + "03" => "Mar", + "04" => "Apr", + "05" => "May", + "06" => "Jun", + "07" => "Jul", + "08" => "Aug", + "09" => "Sep", + "10" => "Oct", + "11" => "Nov", + "12" => "Dec" +); + +# Längenvorgaben nach RFC3164 +my %RFC3164len = ("TAG" => 32, # max. Länge TAG-Feld + "DL" => 1024 # max. Lange Message insgesamt + ); + +# Längenvorgaben nach RFC5425 +my %RFC5425len = ("DL" => 8192 # max. Lange Message insgesamt mit TLS + ); + +############################################################################### +sub Log2Syslog_Initialize($) { + my ($hash) = @_; + + $hash->{DefFn} = "Log2Syslog_Define"; + $hash->{UndefFn} = "Log2Syslog_Undef"; + $hash->{DeleteFn} = "Log2Syslog_Delete"; + $hash->{AttrFn} = "Log2Syslog_Attr"; + $hash->{NotifyFn} = "Log2Syslog_eventlog"; + + $hash->{AttrList} = "addStateEvent:1,0 ". + "disable:1,0 ". + "addTimestamp:0,1 ". + "logFormat:BSD,IETF ". + "TLS:1,0 ". + "timeout ". + "protocol:UDP,TCP ". + "port ". + "rateCalcRerun ". + $readingFnAttributes + ; +return undef; +} + +############################################################################### +sub Log2Syslog_Define($@) { + my ($hash, $def) = @_; + my @a = split("[ \t][ \t]*", $def); + + return "Error: Perl module ".$MissModulSocket." is missing. Install it on Debian with: sudo apt-get install libio-socket-multicast-perl" if($MissModulSocket); + return "Error: Perl module ".$MissModulNDom." is missing." if($MissModulNDom); + + # Example: define splunklog Log2Syslog splunk.myds.me ident event:.* fhem:.* + return "wrong syntax, use: define Log2Syslog [ident:] [event:] [fhem:] " + if(int(@a)-3 < 0); + + delete($hash->{HELPER}{EVNTLOG}); + delete($hash->{HELPER}{FHEMLOG}); + delete($hash->{HELPER}{IDENT}); + + Log2Syslog_setidrex($hash,$a[3]) if($a[3]); + Log2Syslog_setidrex($hash,$a[4]) if($a[4]); + Log2Syslog_setidrex($hash,$a[5]) if($a[5]); + + return "Bad regexp: starting with *" + if((defined($hash->{HELPER}{EVNTLOG}) && $hash->{HELPER}{EVNTLOG} =~ m/^\*/) || (defined($hash->{HELPER}{FHEMLOG}) && $hash->{HELPER}{FHEMLOG} =~ m/^\*/)); + eval { "Hallo" =~ m/^$hash->{HELPER}{EVNTLOG}$/ } if($hash->{HELPER}{EVNTLOG}); + return "Bad regexp: $@" if($@); + eval { "Hallo" =~ m/^$hash->{HELPER}{FHEMLOG}$/ } if($hash->{HELPER}{FHEMLOG}); + return "Bad regexp: $@" if($@); + + $hash->{PEERHOST} = $a[2]; # Destination Host (Syslog Server) + $hash->{MYHOST} = hostfqdn (); # FQDN eigener Host + $hash->{SEQNO} = 1; # PROCID in IETF, wird kontinuierlich hochgezählt + $hash->{VERSION} = $Log2SyslogVn; + $logInform{$hash->{NAME}} = "Log2Syslog_fhemlog"; # Funktion die in hash %loginform für $name eingetragen wird + $hash->{HELPER}{SSLVER} = "n.a."; # Initialisierung + $hash->{HELPER}{SSLALGO} = "n.a."; # Initialisierung + $hash->{HELPER}{LTIME} = time(); # Init Timestmp f. Ratenbestimmung + $hash->{HELPER}{OLDSEQNO} = $hash->{SEQNO}; # Init Sequenznummer f. Ratenbestimmung + + readingsBeginUpdate($hash); + readingsBulkUpdate($hash, "SSL_Version", "n.a."); + readingsBulkUpdate($hash, "SSL_Algorithm", "n.a."); + readingsBulkUpdate($hash, "Transfered_logs_per_minute", 0); + readingsBulkUpdate($hash, "state", "initialized"); + readingsEndUpdate($hash,1); + + Log2Syslog_trate($hash); # regelm. Berechnung Transfer Rate starten + +return undef; +} + +sub Log2Syslog_Undef($$) { + my ($hash, $name) = @_; + RemoveInternalTimer($hash); +return undef; +} + +sub Log2Syslog_Delete($$) { + my ($hash, $arg) = @_; + delete $logInform{$hash->{NAME}}; +return undef; +} + +############################################################################### +sub Log2Syslog_Attr { + my ($cmd,$name,$aName,$aVal) = @_; + my $hash = $defs{$name}; + my $do; + + # $cmd can be "del" or "set" + # $name is device name + # aName and aVal are Attribute name and value + + if ($aName eq "disable") { + if($cmd eq "set") { + $do = ($aVal) ? 1 : 0; + } + $do = 0 if($cmd eq "del"); + my $val = ($do == 1 ? "disabled" : "active"); + + readingsSingleUpdate($hash, "state", $val, 1); + } + + if ($aName eq "TLS") { + if($cmd eq "set") { + $do = ($aVal) ? 1 : 0; + } + $do = 0 if($cmd eq "del"); + if ($do == 0) { + $hash->{HELPER}{SSLVER} = "n.a."; + $hash->{HELPER}{SSLALGO} = "n.a."; + readingsSingleUpdate($hash, "SSL_Version", "n.a.", 1); + readingsSingleUpdate($hash, "SSL_Algorithm", "n.a.", 1); + } + } + + if ($cmd eq "set" && $aName =~ /port|timeout|rateCalcRerun/) { + if($aVal !~ m/^\d+$/) { return " The Value of \"$aName\" is not valid. Use only figures !";} + } + +return undef; +} + +################################################################################# +# Eventlogging +################################################################################# +sub Log2Syslog_eventlog($$) { + # $hash is my entry, $dev is the entry of the changed device + my ($hash,$dev) = @_; + my $name = $hash->{NAME}; + my $rex = $hash->{HELPER}{EVNTLOG}; + my ($prival,$sock,$data,$pid); + + return if(IsDisabled($name) || !$rex); + my $events = deviceEvents($dev, AttrVal($name, "addStateEvent", 0)); + return if(!$events); + + my $n = $dev->{NAME}; + my $max = int(@{$events}); + my $tn = $dev->{NTFY_TRIGGERTIME}; + my $ct = $dev->{CHANGETIME}; + + $sock = Log2Syslog_setsock($hash); + + if(defined($sock)) { + for (my $i = 0; $i < $max; $i++) { + my $txt = $events->[$i]; + $txt = "" if(!defined($txt)); + $txt = Log2Syslog_charfilter($hash,$txt); + + my $tim = (($ct && $ct->[$i]) ? $ct->[$i] : $tn); + my ($date,$time) = split(" ",$tim); + + if($n =~ m/^$rex$/ || "$n:$txt" =~ m/^$rex$/ || "$tim:$n:$txt" =~ m/^$rex$/) { + my $otp = "$n $txt"; + $otp = "$tim $otp" if AttrVal($name,'addTimestamp',0); + $prival = Log2Syslog_setprival($txt); + + ($data,$pid) = Log2Syslog_setpayload($hash,$prival,$date,$time,$otp,"event"); + next if(!$data); + + my $ret = syswrite $sock, $data."\n"; + if($ret && $ret > 0) { + Log2Syslog_Log3slog($name, 4, "$name - Payload sequence $pid sent\n"); + } else { + my $err = $!; + Log2Syslog_Log3slog($name, 4, "$name - Warning - Payload sequence $pid NOT sent: $err\n"); + readingsSingleUpdate($hash, "state", "write error: $err", 1) if($err ne OldValue($name)); + } + } + } + + Log2Syslog_closesock($hash,$sock); + } + +return ""; +} + +################################################################################# +# FHEM system logging +################################################################################# +sub Log2Syslog_fhemlog($$) { + my ($name,$raw) = @_; + my $hash = $defs{$name}; + my $rex = $hash->{HELPER}{FHEMLOG}; + my ($prival,$sock,$err,$ret,$data,$pid); + + return if(IsDisabled($name) || !$rex); + + my ($date,$time,$vbose,undef,$txt) = split(" ",$raw,5); + $txt = Log2Syslog_charfilter($hash,$txt); + $date =~ s/\./-/g; + my $tim = $date." ".$time; + + if($txt =~ m/^$rex$/ || "$vbose: $txt" =~ m/^$rex$/) { + my $otp = "$vbose: $txt"; + $otp = "$tim $otp" if AttrVal($name,'addTimestamp',0); + $prival = Log2Syslog_setprival($txt,$vbose); + + ($data,$pid) = Log2Syslog_setpayload($hash,$prival,$date,$time,$otp,"fhem"); + return if(!$data); + + $sock = Log2Syslog_setsock($hash); + + if (defined($sock)) { + $ret = syswrite $sock, $data."\n" if($data); + if($ret && $ret > 0) { + Log2Syslog_Log3slog($name, 4, "$name - Payload sequence $pid sent\n"); + } else { + my $err = $!; + Log2Syslog_Log3slog($name, 4, "$name - Warning - Payload sequence $pid NOT sent: $err\n"); + readingsSingleUpdate($hash, "state", "write error: $err", 1) if($err ne OldValue($name)); + } + + Log2Syslog_closesock($hash,$sock); + } + } + +return; +} + +############################################################################### +# Helper für ident & Regex setzen +############################################################################### +sub Log2Syslog_setidrex ($$) { + my ($hash,$a) = @_; + + $hash->{HELPER}{EVNTLOG} = (split("event:",$a))[1] if(lc($a) =~ m/^event:.*/); + $hash->{HELPER}{FHEMLOG} = (split("fhem:",$a))[1] if(lc($a) =~ m/^fhem:.*/); + $hash->{HELPER}{IDENT} = (split("ident:",$a))[1] if(lc($a) =~ m/^ident:.*/); + +return; +} + +############################################################################### +# Zeichencodierung für Payload filtern +############################################################################### +sub Log2Syslog_charfilter ($$) { + my ($hash,$txt) = @_; + my $name = $hash->{NAME}; + + # nur erwünschte Zeichen in payload, ASCII %d32-126 + $txt =~ s/ß/ss/g; + $txt =~ s/ä/ae/g; + $txt =~ s/ö/oe/g; + $txt =~ s/ü/ue/g; + $txt =~ s/Ä/Ae/g; + $txt =~ s/Ö/Oe/g; + $txt =~ s/Ü/Ue/g; + $txt =~ s/€/EUR/g; + $txt =~ tr/ A-Za-z0-9!"#$%&'()*+,-.\/:;<=>?@[\]^_`{|}~//cd; + +return($txt); +} + +############################################################################### +# erstelle Socket +############################################################################### +sub Log2Syslog_setsock ($) { + my ($hash) = @_; + my $name = $hash->{NAME}; + my $host = $hash->{PEERHOST}; + my $port = AttrVal($name, "TLS", 0)?AttrVal($name, "port", 6514):AttrVal($name, "port", 514); + my $protocol = lc(AttrVal($name, "protocol", "udp")); + my $st = "active"; + my $timeout = AttrVal($name, "timeout", 0.5); + my ($sock,$lo,$sslver,$sslalgo); + + if(AttrVal($name, "TLS", 0)) { + # TLS gesicherte Verbindung + # TLS Transport nach RFC5425 https://tools.ietf.org/pdf/rfc5425.pdf + $attr{$name}{protocol} = "TCP" if(AttrVal($name, "protocol", "UDP") ne "TCP"); + $sslver = "n.a."; + $sslalgo = "n.a."; + eval "use IO::Socket::SSL"; + if($@) { + $st = "$@"; + } else { + $sock = IO::Socket::INET->new(PeerHost => $host, PeerPort => $port, Proto => 'tcp', Blocking => 0); + if (!$sock) { + $st = "unable open socket for $host, $protocol, $port"; + } else { + $sock->blocking(1); + eval { IO::Socket::SSL->start_SSL($sock, + SSL_verify_mode => "SSL_VERIFY_PEER", + SSL_version => "TLSv12", + SSL_hostname => $host, + SSL_veriycn_scheme => "rfc5425", + SSL_veriycn_publicsuffix => '', + Timeout => $timeout + ) || undef $sock; }; + if (!$sock) { + undef $sock; + $st = "SSL error: ".IO::Socket::SSL::errstr(); + } else { + $sslver = $sock->get_sslversion(); + $sslalgo = $sock->get_fingerprint(); + $sslalgo = (split("\\\$",$sslalgo))[0]; + $lo = "Socket opened for Host: $host, Protocol: $protocol, Port: $port, TLS: 0"; + } + } + } + } else { + # erstellt ungesicherte Socket Verbindung + $sslver = "n.a."; + $sslalgo = "n.a."; + $sock = new IO::Socket::INET (PeerHost => $host, PeerPort => $port, Proto => $protocol, Timeout => $timeout ); + + if (!$sock) { + undef $sock; + $st = "unable open socket for $host, $protocol, $port"; + } else { + $sock->blocking(0); + # Logausgabe (nur in das fhem Logfile !) + $lo = "Socket opened for Host: $host, Protocol: $protocol, Port: $port, TLS: 0"; + } + } + + readingsSingleUpdate($hash, "state", $st, 1) if($st ne OldValue($name)); + + if($sslver ne $hash->{HELPER}{SSLVER}) { + readingsSingleUpdate($hash, "SSL_Version", $sslver, 1); + $hash->{HELPER}{SSLVER} = $sslver; + } + if($sslalgo ne $hash->{HELPER}{SSLALGO}) { + readingsSingleUpdate($hash, "SSL_Algorithm", $sslalgo, 1); + $hash->{HELPER}{SSLALGO} = $sslalgo; + } + + Log2Syslog_Log3slog($name, 5, "$name - $lo") if($lo); + +return($sock); +} + +############################################################################### +# Socket schließen +############################################################################### +sub Log2Syslog_closesock($$) { + my ($hash,$sock) = @_; + + shutdown($sock, 1); + if(AttrVal($hash->{NAME}, "TLS", 0)) { + $sock->close(SSL_no_shutdown => 1); + } else { + $sock->close(); + } + +return; +} + +############################################################################### +# set PRIVAL (severity & facility) +############################################################################### +sub Log2Syslog_setprival ($;$$) { + my ($txt,$vbose) = @_; + my $prival; + + # Priority = (facility * 8) + severity + # https://tools.ietf.org/pdf/rfc5424.pdf + + # determine facility + my $fac = 5; # facility by syslogd + + # calculate severity + # mapping verbose level to severity + # 0: Critical -> 2 + # 1: Error -> 3 + # 2: Warning -> 4 + # 3: Notice -> 5 + # 4: Informational -> 6 + # 5: Debug -> 7 + + my $sv = 5; # notice (default) + + if ($vbose) { + # map verbose to severity + $sv = 2 if ($vbose == 0); + $sv = 3 if ($vbose == 1); + $sv = 4 if ($vbose == 2); + $sv = 5 if ($vbose == 3); + $sv = 6 if ($vbose == 4); + $sv = 7 if ($vbose == 5); + } + + $sv = 3 if (lc($txt) =~ m/error/); # error condition + $sv = 4 if (lc($txt) =~ m/warning/); # warning conditions + + $prival = ($fac*8)+$sv; + +return($prival); +} + +############################################################################### +# erstellen Payload für Syslog +############################################################################### +sub Log2Syslog_setpayload ($$$$$$) { + my ($hash,$prival,$date,$time,$otp,$lt) = @_; + my $name = $hash->{NAME}; + my $ident = ($hash->{HELPER}{IDENT}?$hash->{HELPER}{IDENT}:$name)."_".$lt; + my $myhost = $hash->{MYHOST}?$hash->{MYHOST}:"0.0.0.0"; + my $lf = AttrVal($name, "logFormat", "IETF"); + my $data; + + return undef,undef if(!$otp); + my $pid = $hash->{SEQNO}; # PayloadID zur Nachverfolgung der Eventabfolge + $hash->{SEQNO}++; + + my ($year,$month,$day) = split("-",$date); + + if ($lf eq "BSD") { + # BSD Protokollformat https://tools.ietf.org/html/rfc3164 + $time = (split(/\./,$time))[0] if($time =~ m/\./); # msec ist nicht erlaubt + $month = $Log2Syslog_BSDMonth{$month}; # Monatsmapping, z.B. 01 -> Jan + $day =~ s/0/ / if($day =~ m/^0.*$/); # in Tagen < 10 muss 0 durch Space ersetzt werden + $ident = substr($ident,0, $RFC3164len{TAG}); # Länge TAG Feld begrenzen + no warnings 'uninitialized'; + $data = "<$prival>$month $day $time $myhost $ident: : $otp"; + use warnings; + $data = substr($data,0, $RFC3164len{DL}); # Länge Total begrenzen + } + + if ($lf eq "IETF") { + # IETF Protokollformat https://tools.ietf.org/html/rfc5424 + my $mid = "FHEM"; # message ID, identify protocol of message, e.g. for firewall filter + my $tim = $date."T".$time; + no warnings 'uninitialized'; + $data = "<$prival>1 $tim $myhost $ident $pid $mid - : $otp"; + use warnings; + } + + if($data =~ /\s$/){$data =~ s/\s$//;} + my $dl = length($data)+1; # Länge muss ! für TLS stimmen, sonst keine Ausgabe ! + + # wenn Transport Layer Security (TLS) -> Transport Mapping for Syslog https://tools.ietf.org/pdf/rfc5425.pdf + if(AttrVal($name, "TLS", 0)) { + $data = "$dl $data"; + $data = substr($data,0, $RFC5425len{DL}); # Länge Total begrenzen + Log2Syslog_Log3slog($name, 4, "$name - SSL-Payload created with length: ".(($dl>$RFC5425len{DL})?$RFC5425len{DL}:$dl) ); + } + + my $ldat = ($dl>130)?(substr($data,0, 130)." ..."):$data; + Log2Syslog_Log3slog($name, 4, "$name - Payload sequence $pid created:\n$ldat"); + +return($data,$pid); +} + +############################################################################### +# eigene Log3-Ableitung - Schleife vermeiden +############################################################################### +sub Log2Syslog_Log3slog($$$) { + my ($dev, $loglevel, $text) = @_; + our ($logopened,$currlogfile); + + $dev = $dev->{NAME} if(defined($dev) && ref($dev) eq "HASH"); + + if(defined($dev) && + defined($attr{$dev}) && + defined (my $devlevel = $attr{$dev}{verbose})) { + return if($loglevel > $devlevel); + + } else { + return if($loglevel > $attr{global}{verbose}); + + } + + my ($seconds, $microseconds) = gettimeofday(); + my @t = localtime($seconds); + my $nfile = ResolveDateWildcards($attr{global}{logfile}, @t); + OpenLogfile($nfile) if(!$currlogfile || $currlogfile ne $nfile); + + my $tim = sprintf("%04d.%02d.%02d %02d:%02d:%02d", + $t[5]+1900,$t[4]+1,$t[3], $t[2],$t[1],$t[0]); + if($attr{global}{mseclog}) { + $tim .= sprintf(".%03d", $microseconds/1000); + } + + if($logopened) { + print LOG "$tim $loglevel: $text\n"; + } else { + print "$tim $loglevel: $text\n"; + } + +return undef; +} + +############################################################################### +# Bestimmung Übertragungsrate +############################################################################### +sub Log2Syslog_trate($) { + my ($hash) = @_; + my $name = $hash->{NAME}; + my $rerun = AttrVal($name, "rateCalcRerun", 60); + + if ($hash->{HELPER}{LTIME}+60 <= time()) { + my $div = (time()-$hash->{HELPER}{LTIME})/60; + my $spm = sprintf "%.0f", ($hash->{SEQNO} - $hash->{HELPER}{OLDSEQNO})/$div; + $hash->{HELPER}{OLDSEQNO} = $hash->{SEQNO}; + $hash->{HELPER}{LTIME} = time(); + + my $ospm = ReadingsVal($name, "Transfered_logs_per_minute", 0); + if($spm != $ospm) { + readingsSingleUpdate($hash, "Transfered_logs_per_minute", $spm, 1); + } else { + readingsSingleUpdate($hash, "Transfered_logs_per_minute", $spm, 0); + } + } + +RemoveInternalTimer($hash, "Log2Syslog_trate"); +InternalTimer(gettimeofday()+$rerun, "Log2Syslog_trate", $hash, 0); +return; +} + +1; + +=pod +=item helper +=item summary forwards FHEM system logs and/or events to a syslog server +=item summary_DE leitet FHEM Systemlogs und/oder Events an einen Syslog-Server weiter + +=begin html + + +

Log2Syslog

+
    + Send FHEM system log entries and/or FHEM events to an external syslog server.
    + The syslog protocol has been implemented according the specifications of RFC5424 (IETF), + RFC3164 (BSD) and the TLS transport protocol according the + RFC5425.
    +
    + + Prerequisits +
      +
      + The additional perl module "IO::Socket::INET" must be installed on your system.
      + Install this package from cpan or by

      + + apt-get install libio-socket-multicast-perl (only on Debian based installations)
      +
    +
    + + + Define +
      +
      + define <name> Log2Syslog <destination host> [ident:<ident>] [event:<regexp>] [fhem:<regexp>]
      +
      + + <destination host> = host where the syslog server is running
      + [ident:<ident>] = optional program identifier. If not set the device name will be used as default
      + [event:<regexp>] = optional regex to filter events for logging
      + [fhem:<regexp>] = optional regex to filter fhem system log for logging

      + + After definition the new device sends all new appearing fhem systemlog entries and events to the destination host, + port=514/UDP format:IETF, immediately without further settings if the regex for fhem or event were set.
      + Without setting regex no fhem system log or event log will be forwarded.

      + + The verbose level of FHEM system logs will convert into equivalent syslog severity level.
      + Thurthermore the message text will be scanned for signal terms "warning" and "error" (with case insensitivity). + Dependent off the severity will be set equivalent as well. If a severity is already set by verbose level, it wil be overwritten + by the level according to the signal term found in the message text.

      + + Lookup table Verbose-Level to Syslog severity level:

      +
        + + + + + + + + + +
        verbose-Level Schweregrad in Syslog
        0 Critical
        1 Error
        2 Warning
        3 Notice
        4 Informational
        5 Debug
        +
      +
      + +
      + Example to log anything:
      +
      + define splunklog Log2Syslog fhemtest 192.168.2.49 ident:Test event:.* fhem:.*
      +
      + will produce output like this raw example of a splunk syslog server:
      +
      Aug 18 21:06:46 fhemtest.myds.me 1 2017-08-18T21:06:46 fhemtest.myds.me Test_event 13339 FHEM - : LogDB sql_processing_time: 0.2306
      +Aug 18 21:06:46 fhemtest.myds.me 1 2017-08-18T21:06:46 fhemtest.myds.me Test_event 13339 FHEM - : LogDB background_processing_time: 0.2397
      +Aug 18 21:06:45 fhemtest.myds.me 1 2017-08-18T21:06:45 fhemtest.myds.me Test_event 13339 FHEM - : LogDB CacheUsage: 21
      +Aug 18 21:08:27 fhemtest.myds.me 1 2017-08-18T21:08:27.760 fhemtest.myds.me Test_fhem 13339 FHEM - : 4: CamTER - Informations of camera Terrasse retrieved
      +Aug 18 21:08:27 fhemtest.myds.me 1 2017-08-18T21:08:27.095 fhemtest.myds.me Test_fhem 13339 FHEM - : 4: CamTER - CAMID already set - ignore get camid
      +    
      + + The structure of the payload differs dependent of the used logFormat.

      + + logFormat IETF:

      + "<PRIVAL>1 TIME MYHOST IDENT PID MID - : MESSAGE"

      + +
        + + + + + + + + + +
        PRIVAL priority value (coded from "facility" and "severity")
        TIME timestamp according to RFC5424
        MYHOST Internal MYHOST
        IDENT ident-Tag from DEF if set, or else the own device name. The statement will be completed by "_fhem" (FHEM-Log) respectively "_event" (Event-Log).
        PID sequential Payload-ID
        MID fix value "FHEM"
        MESSAGE the dataset to transfer
        +
      +
      + + logFormat BSD:

      + "<PRIVAL>MONAT TAG TIME MYHOST IDENT: : MESSAGE"

      + +
        + + + + + + + + + +
        PRIVAL priority value (coded from "facility" and "severity")
        MONAT month according to RFC3164
        TAG day of month according to RFC3164
        TIME timestamp according to RFC3164
        MYHOST Internal MYHOST
        IDENT ident-Tag from DEF if set, or else the own device name. The statement will be completed by "_fhem" (FHEM-Log) respectively "_event" (Event-Log).
        MESSAGE the dataset to transfer
        +
      +
      + +
    +
    + + + + Attributes +
      +
      + +
    • addTimestamp [0|1]
      +
      + If set to 1, fhem timestamps will be logged too.
      + Default behavior is to not log these timestamps, because syslog uses own timestamps.
      + Maybe useful if mseclog is activated in fhem.
      +
      + Example output (raw) of a Splunk syslog server:
      +
      Aug 18 21:26:55 fhemtest.myds.me 1 2017-08-18T21:26:55 fhemtest.myds.me Test_event 13339 FHEM - : 2017-08-18 21:26:55 USV state: OL
      +Aug 18 21:26:54 fhemtest.myds.me 1 2017-08-18T21:26:54 fhemtest.myds.me Test_event 13339 FHEM - : 2017-08-18 21:26:54 Bezug state: done
      +Aug 18 21:26:54 fhemtest.myds.me 1 2017-08-18T21:26:54 fhemtest.myds.me Test_event 13339 FHEM - : 2017-08-18 21:26:54 recalc_Bezug state: Next: 21:31:59
      +        
      +

    • + +
    • addStateEvent [0|1]
      +
      + If set to 1, events will be completed with "state" if a state-event appears.
      + Default behavior is without getting "state". +

    • + +
    • disable [0|1]
      +
      + disables the device. +

    • + +
    • logFormat [BSD|IETF]
      +
      + Set the syslog protocol format.
      + Default value is "IETF" if not specified. +

    • + +
    • protocol [TCP|UDP]
      +
      + Sets the socket protocol which should be used. You can choose UDP or TCP.
      + Default value is "UDP" if not specified. +

    • + +
    • port
      +
      + The port of the syslog server is listening. Default port is 514 if not specified. +

    • + +
    • rateCalcRerun
      +
      + Rerun cycle for calculation of log transfer rate (Reading "Transfered_logs_per_minute") in seconds. + Default is 60 seconds. +

    • + +
    • timeout
      +
      + Timeout for connection to the syslog server (TCP). +

    • + +
    • verbose
      +
      + To avoid loops, the output of verbose level of the Log2Syslog-Devices will only be reported into the local FHEM Logfile and + no forwarded. +

    • + +
    +
    + + + Readings +
      +
      + + + + + +
      SSL_Algorithm used SSL algorithm if SSL is enabled and active
      SSL_Version the used TLS-version if encryption is enabled and is active
      Transfered_logs_per_minute the average number of forwarded logs/events per minute
      +
      +
    + +
+ +=end html +=begin html_DE + + +

Log2Syslog

+
    + Sendet FHEM Systemlog Einträge und/oder Events an einen externen Syslog-Server weiter.
    + Die Implementierung des Syslog-Protokolls erfolgte entsprechend den Vorgaben von RFC5424 (IETF), + RFC3164 (BSD) sowie dem TLS Transport Protokoll nach + RFC5425.
    +
    + + Voraussetzungen +
      +
      + Es wird das Perl Modul "IO::Socket::INET" benötigt und muss installiert sein.
      + Das Modul kann über CPAN oder mit

      + + apt-get install libio-socket-multicast-perl (auf Debian Linux Systemen)

      + + installiert werden. +
    +
    + + + Definition +
      +
      + define <name> Log2Syslog <Zielhost> [ident:<ident>] [event:<regexp>] [fhem:<regexp>]
      +
      + + <Zielhost> = Host (Name oder IP-Adresse) auf dem der Syslog-Server läuft
      + [ident:<ident>] = optionaler Programm Identifier. Wenn nicht gesetzt wird per default der Devicename benutzt.
      + [event:<regexp>] = optionaler regulärer Ausdruck zur Filterung von Events zur Weiterleitung
      + [fhem:<regexp>] = optionaler regulärer Ausdruck zur Filterung von FHEM Logs zur Weiterleitung

      + + Direkt nach der Definition sendet das neue Device alle neu auftretenden FHEM Systemlog Einträge und Events ohne weitere + Einstellungen an den Zielhost, Port=514/UDP Format=IETF, wenn reguläre Ausdrücke für Events/FHEM angegeben wurden.
      + Wurde kein Regex gesetzt, erfolgt keine Weiterleitung von Events oder FHEM Systemlogs.

      + + Die Verbose-Level der FHEM Systemlogs werden in entsprechende Schweregrade der Syslog-Messages umgewandelt.
      + Weiterhin wird der Meldungstext der FHEM Systemlogs und Events nach den Signalwörtern "warning" und "error" durchsucht + (Groß- /Kleinschreibung wird nicht beachtet). Davon abhängig wird der Schweregrad ebenfalls äquivalent gesetzt und überschreibt + einen eventuell bereits durch Verbose-Level gesetzten Schweregrad.

      + + Umsetzungstabelle Verbose-Level in Syslog-Schweregrad Stufe:

      +
        + + + + + + + + + +
        Verbose-Level Schweregrad in Syslog
        0 Critical
        1 Error
        2 Warning
        3 Notice
        4 Informational
        5 Debug
        +
      +
      + +
      + Beispiel:
      +
      + define splunklog Log2Syslog fhemtest 192.168.2.49 ident:Test event:.* fhem:.*
      +
      + Es werden alle Events weitergeleitet wie deses Beispiel der raw-Ausgabe eines Splunk Syslog Servers zeigt::
      +
      Aug 18 21:06:46 fhemtest.myds.me 1 2017-08-18T21:06:46 fhemtest.myds.me Test_event 13339 FHEM - : LogDB sql_processing_time: 0.2306
      +Aug 18 21:06:46 fhemtest.myds.me 1 2017-08-18T21:06:46 fhemtest.myds.me Test_event 13339 FHEM - : LogDB background_processing_time: 0.2397
      +Aug 18 21:06:45 fhemtest.myds.me 1 2017-08-18T21:06:45 fhemtest.myds.me Test_event 13339 FHEM - : LogDB CacheUsage: 21
      +Aug 18 21:08:27 fhemtest.myds.me 1 2017-08-18T21:08:27.760 fhemtest.myds.me Test_fhem 13339 FHEM - : 4: CamTER - Informations of camera Terrasse retrieved
      +Aug 18 21:08:27 fhemtest.myds.me 1 2017-08-18T21:08:27.095 fhemtest.myds.me Test_fhem 13339 FHEM - : 4: CamTER - CAMID already set - ignore get camid
      +    
      + + Der Aufbau der Payload unterscheidet sich je nach verwendeten logFormat.

      + + logFormat IETF:

      + "<PRIVAL>1 TIME MYHOST IDENT PID MID - : MESSAGE"

      + +
        + + + + + + + + + +
        PRIVAL Priority Wert (kodiert aus "facility" und "severity")
        TIME Timestamp nach RFC5424
        MYHOST Internal MYHOST
        IDENT Ident-Tag aus DEF wenn angegeben, sonst der eigene Devicename. Die Angabe wird mit "_fhem" (FHEM-Log) bzw. "_event" (Event-Log) ergänzt.
        PID fortlaufende Payload-ID
        MID fester Wert "FHEM"
        MESSAGE der zu übertragende Datensatz
        +
      +
      + + logFormat BSD:

      + "<PRIVAL>MONAT TAG TIME MYHOST IDENT: : MESSAGE"

      + +
        + + + + + + + + + +
        PRIVAL Priority Wert (kodiert aus "facility" und "severity")
        MONAT Monatsangabe nach RFC3164
        TAG Tag des Monats nach RFC3164
        TIME Zeitangabe nach RFC3164
        MYHOST Internal MYHOST
        IDENT Ident-Tag aus DEF wenn angegeben, sonst der eigene Devicename. Die Angabe wird mit "_fhem" (FHEM-Log) bzw. "_event" (Event-Log) ergänzt.
        MESSAGE der zu übertragende Datensatz
        +
      +
      + +
    +

    + + + + Attribute +
      +
      + + +
    • addTimestamp [0|1]
      +
      + Wenn gesetzt, werden FHEM Timestamps im Datensatz mit übertragen.
      + Per default werden die Timestamps nicht mit übertragen, da der Syslog-Server eigene Timestamps verwendet.
      + Die Einstellung kann hilfeich sein wenn mseclog in FHEM aktiviert ist.
      +
      + + Beispielausgabe (raw) eines Splunk Syslog Servers:
      +
      Aug 18 21:26:55 fhemtest.myds.me 1 2017-08-18T21:26:55 fhemtest.myds.me Test_event 13339 FHEM - : 2017-08-18 21:26:55 USV state: OL
      +Aug 18 21:26:54 fhemtest.myds.me 1 2017-08-18T21:26:54 fhemtest.myds.me Test_event 13339 FHEM - : 2017-08-18 21:26:54 Bezug state: done
      +Aug 18 21:26:54 fhemtest.myds.me 1 2017-08-18T21:26:54 fhemtest.myds.me Test_event 13339 FHEM - : 2017-08-18 21:26:54 recalc_Bezug state: Next: 21:31:59
      +        
      +

    • + +
    • addStateEvent [0|1]
      +
      + Wenn gesetzt, werden state-events mit dem Reading "state" ergänzt.
      + Die Standardeinstellung ist ohne state-Ergänzung. +

    • + +
    • disable [0|1]
      +
      + Das Device wird aktiviert | aktiviert. +

    • + +
    • logFormat [BSD|IETF]
      +
      + Stellt das Protokollformat ein.
      + Der Standardwert ist "IETF".
      +

    • + +
    • protocol [TCP|UDP]
      +
      + Setzt den Protokolltyp der verwendet werden soll. Es kann UDP oder TCP gewählt werden.
      + Standard ist "UDP" wenn nichts spezifiziert ist. +

    • + +
    • port
      +
      + Der verwendete Port des Syslog-Servers. Default Port ist 514 wenn nicht gesetzt. +

    • + +
    • rateCalcRerun
      +
      + Wiederholungszyklus für die Bestimmung der Log-Transferrate (Reading "Transfered_logs_per_minute") in Sekunden. + Default sind 60 Sekunden. +

    • + +
    • timeout
      +
      + Timeout für die Verbindung zum Syslog-Server (TCP). +

    • + +
    • verbose
      +
      + Die Ausgaben der Verbose-Level von Log2Syslog-Devices werden ausschließlich im lokalen FHEM Logfile ausgegeben und + nicht weitergeleitet um Schleifen zu vermeiden. +

    • + +
    +
    + + + Readings +
      +
      + + + + + +
      SSL_Algorithm der verwendete SSL Algorithmus wenn SSL eingeschaltet und aktiv ist
      SSL_Version die verwendete TLS-Version wenn die Veschlüsselung aktiv ist
      Transfered_logs_per_minute die durchschnittliche Anzahl der übertragenen Logs/Events pro Minute
      +
      +
    + +
+=end html_DE +=cut diff --git a/fhem/MAINTAINER.txt b/fhem/MAINTAINER.txt index 3c521a6d9..fe5a84371 100644 --- a/fhem/MAINTAINER.txt +++ b/fhem/MAINTAINER.txt @@ -362,6 +362,7 @@ FHEM/92_FileLog.pm rudolfkoenig http://forum.fhem.de Automatis FHEM/92_SingleFileLog.pm rudolfkoenig http://forum.fhem.de Automatisierung FHEM/93_DbLog.pm Tobias http://forum.fhem.de Automatisierung FHEM/93_DbRep.pm DS_Starter http://forum.fhem.de Sonstiges +FHEM/93_Log2Syslog.pm DS_Starter http://forum.fhem.de Automatisierung FHEM/93_FHEM2FHEM.pm rudolfkoenig http://forum.fhem.de Automatisierung FHEM/95_FLOORPLAN.pm ulimaass http://forum.fhem.de Frontends/FLOORPLAN FHEM/95_Alarm.pm pahenning http://forum.fhem.de Unterstützende Dienste @@ -499,7 +500,6 @@ FHEM/GPUtils.pm ntruchsess http://forum.fhem.de FHEM Deve contrib/23_WEBTHERM.pm betateilchen/sachag http://forum.fhem.de Sonstiges contrib/70_ONKYO_AVR_PULL.pm loredo http://forum.fhem.de Multimedia contrib/92_rsyslog.pm DS_Starter http://forum.fhem.de Automatisierung -contrib/93_Log2Syslog.pm DS_Starter http://forum.fhem.de Automatisierung contrib/98_exportdevice.pm loredo http://forum.fhem.de Sonstiges contrib/betateilchen/* betateilchen http://forum.fhem.de Sonstiges contrib/holiday betateilchen http://forum.fhem.de Sonstiges