93_Log2Syslog.pm 40 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065
  1. ######################################################################################################################
  2. # $Id: 93_Log2Syslog.pm 15486 2017-11-23 20:35:07Z DS_Starter $
  3. ######################################################################################################################
  4. # 93_Log2Syslog.pm
  5. #
  6. # (c) 2017 by Heiko Maaz
  7. # e-mail: Heiko dot Maaz at t-online dot de
  8. #
  9. # This script is part of fhem.
  10. #
  11. # Fhem is free software: you can redistribute it and/or modify
  12. # it under the terms of the GNU General Public License as published by
  13. # the Free Software Foundation, either version 2 of the License, or
  14. # (at your option) any later version.
  15. #
  16. # Fhem is distributed in the hope that it will be useful,
  17. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  18. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  19. # GNU General Public License for more details.
  20. #
  21. # You should have received a copy of the GNU General Public License
  22. # along with fhem. If not, see <http://www.gnu.org/licenses/>.
  23. #
  24. # The module is based on idea and input from betateilchen 92_rsyslog.pm
  25. #
  26. # Implements the Syslog Protocol of RFC 5424 https://tools.ietf.org/html/rfc5424
  27. # and RFC 3164 https://tools.ietf.org/html/rfc3164 and
  28. # TLS Transport according to RFC5425 https://tools.ietf.org/pdf/rfc5425.pdf as well
  29. #
  30. ######################################################################################################################
  31. # Versions History:
  32. #
  33. # 3.2.0 22.11.2017 add NOTIFYDEV if possible
  34. # 3.1.0 28.08.2017 get-function added, commandref revised, $readingFnAttributes deleted
  35. # 3.0.0 27.08.2017 change attr type to protocol, ready to check in
  36. # 2.6.0 26.08.2017 more than one Log2Syslog device can be created
  37. # 2.5.2 26.08.2018 fix in splitting timestamp, change Log2Syslog_trate using internaltimer with attr
  38. # rateCalcRerun, function Log2Syslog_closesock
  39. # 2.5.1 24.08.2017 some fixes
  40. # 2.5.0 23.08.2017 TLS encryption available, new readings, $readingFnAttributes
  41. # 2.4.1 21.08.2017 changes in sub Log2Syslog_charfilter, change PROCID to $hash->{SEQNO}
  42. # switch to non-blocking in subs event/Log2Syslog_fhemlog
  43. # 2.4.0 20.08.2017 new sub Log2Syslog_Log3slog for entries in local fhemlog only -> verbose support
  44. # 2.3.1 19.08.2017 commandref revised
  45. # 2.3.0 18.08.2017 new parameter "ident" in DEF, sub setidex, Log2Syslog_charfilter
  46. # 2.2.0 17.08.2017 set BSD data length, set only acceptable characters (USASCII) in payload
  47. # commandref revised
  48. # 2.1.0 17.08.2017 sub Log2Syslog_setsock created
  49. # 2.0.0 16.08.2017 create syslog without SYS::SYSLOG
  50. # 1.1.1 13.08.2017 registrate Log2Syslog_fhemlog to %loginform in case of sending fhem-log
  51. # attribute timeout, commandref revised
  52. # 1.1.0 26.07.2017 add regex search to sub Log2Syslog_fhemlog
  53. # 1.0.0 25.07.2017 initial version
  54. package main;
  55. use strict;
  56. use warnings;
  57. eval "use IO::Socket::INET;1" or my $MissModulSocket = "IO::Socket::INET";
  58. eval "use Net::Domain qw(hostname hostfqdn hostdomain domainname);1" or my $MissModulNDom = "Net::Domain";
  59. ###############################################################################
  60. # Forward declarations
  61. #
  62. sub Log2Syslog_Log3slog($$$);
  63. my $Log2SyslogVn = "3.2.0";
  64. # Mappinghash BSD-Formatierung Monat
  65. my %Log2Syslog_BSDMonth = (
  66. "01" => "Jan",
  67. "02" => "Feb",
  68. "03" => "Mar",
  69. "04" => "Apr",
  70. "05" => "May",
  71. "06" => "Jun",
  72. "07" => "Jul",
  73. "08" => "Aug",
  74. "09" => "Sep",
  75. "10" => "Oct",
  76. "11" => "Nov",
  77. "12" => "Dec"
  78. );
  79. # Längenvorgaben nach RFC3164
  80. my %RFC3164len = ("TAG" => 32, # max. Länge TAG-Feld
  81. "DL" => 1024 # max. Lange Message insgesamt
  82. );
  83. # Längenvorgaben nach RFC5425
  84. my %RFC5425len = ("DL" => 8192 # max. Lange Message insgesamt mit TLS
  85. );
  86. ###############################################################################
  87. sub Log2Syslog_Initialize($) {
  88. my ($hash) = @_;
  89. $hash->{DefFn} = "Log2Syslog_Define";
  90. $hash->{UndefFn} = "Log2Syslog_Undef";
  91. $hash->{DeleteFn} = "Log2Syslog_Delete";
  92. $hash->{GetFn} = "Log2Syslog_Get";
  93. $hash->{AttrFn} = "Log2Syslog_Attr";
  94. $hash->{NotifyFn} = "Log2Syslog_eventlog";
  95. $hash->{AttrList} = "addStateEvent:1,0 ".
  96. "disable:1,0 ".
  97. "addTimestamp:0,1 ".
  98. "logFormat:BSD,IETF ".
  99. "TLS:1,0 ".
  100. "timeout ".
  101. "protocol:UDP,TCP ".
  102. "port ".
  103. "rateCalcRerun "
  104. ;
  105. return undef;
  106. }
  107. ###############################################################################
  108. sub Log2Syslog_Define($@) {
  109. my ($hash, $def) = @_;
  110. my @a = split("[ \t][ \t]*", $def);
  111. return "Error: Perl module ".$MissModulSocket." is missing. Install it on Debian with: sudo apt-get install libio-socket-multicast-perl" if($MissModulSocket);
  112. return "Error: Perl module ".$MissModulNDom." is missing." if($MissModulNDom);
  113. # Example: define splunklog Log2Syslog splunk.myds.me ident event:.* fhem:.*
  114. return "wrong syntax, use: define <name> Log2Syslog <host> [ident:<ident>] [event:<regexp>] [fhem:<regexp>] "
  115. if(int(@a)-3 < 0);
  116. delete($hash->{HELPER}{EVNTLOG});
  117. delete($hash->{HELPER}{FHEMLOG});
  118. delete($hash->{HELPER}{IDENT});
  119. Log2Syslog_setidrex($hash,$a[3]) if($a[3]);
  120. Log2Syslog_setidrex($hash,$a[4]) if($a[4]);
  121. Log2Syslog_setidrex($hash,$a[5]) if($a[5]);
  122. return "Bad regexp: starting with *"
  123. if((defined($hash->{HELPER}{EVNTLOG}) && $hash->{HELPER}{EVNTLOG} =~ m/^\*/) || (defined($hash->{HELPER}{FHEMLOG}) && $hash->{HELPER}{FHEMLOG} =~ m/^\*/));
  124. eval { "Hallo" =~ m/^$hash->{HELPER}{EVNTLOG}$/ } if($hash->{HELPER}{EVNTLOG});
  125. return "Bad regexp: $@" if($@);
  126. eval { "Hallo" =~ m/^$hash->{HELPER}{FHEMLOG}$/ } if($hash->{HELPER}{FHEMLOG});
  127. return "Bad regexp: $@" if($@);
  128. # nur Events dieser Devices an NotifyFn weiterleiten, NOTIFYDEV wird gesetzt wenn möglich
  129. notifyRegexpChanged($hash, $hash->{HELPER}{EVNTLOG}) if($hash->{HELPER}{EVNTLOG});
  130. $hash->{PEERHOST} = $a[2]; # Destination Host (Syslog Server)
  131. $hash->{MYHOST} = hostfqdn(); # FQDN eigener Host
  132. $hash->{SEQNO} = 1; # PROCID in IETF, wird kontinuierlich hochgezählt
  133. $hash->{VERSION} = $Log2SyslogVn;
  134. $logInform{$hash->{NAME}} = "Log2Syslog_fhemlog"; # Funktion die in hash %loginform für $name eingetragen wird
  135. $hash->{HELPER}{SSLVER} = "n.a."; # Initialisierung
  136. $hash->{HELPER}{SSLALGO} = "n.a."; # Initialisierung
  137. $hash->{HELPER}{LTIME} = time(); # Init Timestmp f. Ratenbestimmung
  138. $hash->{HELPER}{OLDSEQNO} = $hash->{SEQNO}; # Init Sequenznummer f. Ratenbestimmung
  139. readingsBeginUpdate($hash);
  140. readingsBulkUpdate($hash, "SSL_Version", "n.a.");
  141. readingsBulkUpdate($hash, "SSL_Algorithm", "n.a.");
  142. readingsBulkUpdate($hash, "Transfered_logs_per_minute", 0);
  143. readingsBulkUpdate($hash, "state", "initialized");
  144. readingsEndUpdate($hash,1);
  145. Log2Syslog_trate($hash); # regelm. Berechnung Transfer Rate starten
  146. return undef;
  147. }
  148. sub Log2Syslog_Undef($$) {
  149. my ($hash, $name) = @_;
  150. RemoveInternalTimer($hash);
  151. return undef;
  152. }
  153. sub Log2Syslog_Delete($$) {
  154. my ($hash, $arg) = @_;
  155. delete $logInform{$hash->{NAME}};
  156. return undef;
  157. }
  158. ###################################################################################
  159. sub Log2Syslog_Get($@) {
  160. my ($hash, @a) = @_;
  161. return "\"get X\" needs at least an argument" if ( @a < 2 );
  162. my $name = $a[0];
  163. my $opt = $a[1];
  164. my $prop = $a[2];
  165. my $getlist = "Unknown argument $opt, choose one of ".
  166. "certinfo:noArg "
  167. ;
  168. return if(IsDisabled($name));
  169. my($sock,$cert,@certs);
  170. if ($opt =~ /certinfo/) {
  171. if(ReadingsVal($name,"SSL_Version","n.a.") ne "n.a.") {
  172. $sock = Log2Syslog_setsock($hash);
  173. if(defined($sock)) {
  174. $cert = $sock->dump_peer_certificate();
  175. Log2Syslog_closesock($hash,$sock);
  176. }
  177. }
  178. return $cert if($cert);
  179. return "no SSL session has been created";
  180. } else {
  181. return "$getlist";
  182. }
  183. return undef;
  184. }
  185. ###############################################################################
  186. sub Log2Syslog_Attr {
  187. my ($cmd,$name,$aName,$aVal) = @_;
  188. my $hash = $defs{$name};
  189. my $do;
  190. # $cmd can be "del" or "set"
  191. # $name is device name
  192. # aName and aVal are Attribute name and value
  193. if ($aName eq "disable") {
  194. if($cmd eq "set") {
  195. $do = ($aVal) ? 1 : 0;
  196. }
  197. $do = 0 if($cmd eq "del");
  198. my $val = ($do == 1 ? "disabled" : "active");
  199. readingsSingleUpdate($hash, "state", $val, 1);
  200. }
  201. if ($aName eq "TLS") {
  202. if($cmd eq "set") {
  203. $do = ($aVal) ? 1 : 0;
  204. }
  205. $do = 0 if($cmd eq "del");
  206. if ($do == 0) {
  207. $hash->{HELPER}{SSLVER} = "n.a.";
  208. $hash->{HELPER}{SSLALGO} = "n.a.";
  209. readingsSingleUpdate($hash, "SSL_Version", "n.a.", 1);
  210. readingsSingleUpdate($hash, "SSL_Algorithm", "n.a.", 1);
  211. }
  212. }
  213. if ($cmd eq "set" && $aName =~ /port|timeout|rateCalcRerun/) {
  214. if($aVal !~ m/^\d+$/) { return " The Value of \"$aName\" is not valid. Use only figures !";}
  215. }
  216. return undef;
  217. }
  218. #################################################################################
  219. # Eventlogging
  220. #################################################################################
  221. sub Log2Syslog_eventlog($$) {
  222. # $hash is my entry, $dev is the entry of the changed device
  223. my ($hash,$dev) = @_;
  224. my $name = $hash->{NAME};
  225. my $rex = $hash->{HELPER}{EVNTLOG};
  226. my ($prival,$sock,$data,$pid);
  227. return if(IsDisabled($name) || !$rex);
  228. my $events = deviceEvents($dev, AttrVal($name, "addStateEvent", 0));
  229. return if(!$events);
  230. my $n = $dev->{NAME};
  231. my $max = int(@{$events});
  232. my $tn = $dev->{NTFY_TRIGGERTIME};
  233. my $ct = $dev->{CHANGETIME};
  234. $sock = Log2Syslog_setsock($hash);
  235. if(defined($sock)) {
  236. for (my $i = 0; $i < $max; $i++) {
  237. my $txt = $events->[$i];
  238. $txt = "" if(!defined($txt));
  239. $txt = Log2Syslog_charfilter($hash,$txt);
  240. my $tim = (($ct && $ct->[$i]) ? $ct->[$i] : $tn);
  241. my ($date,$time) = split(" ",$tim);
  242. if($n =~ m/^$rex$/ || "$n:$txt" =~ m/^$rex$/ || "$tim:$n:$txt" =~ m/^$rex$/) {
  243. my $otp = "$n $txt";
  244. $otp = "$tim $otp" if AttrVal($name,'addTimestamp',0);
  245. $prival = Log2Syslog_setprival($txt);
  246. ($data,$pid) = Log2Syslog_setpayload($hash,$prival,$date,$time,$otp,"event");
  247. next if(!$data);
  248. my $ret = syswrite $sock, $data."\n";
  249. if($ret && $ret > 0) {
  250. Log2Syslog_Log3slog($name, 4, "$name - Payload sequence $pid sent\n");
  251. } else {
  252. my $err = $!;
  253. Log2Syslog_Log3slog($name, 4, "$name - Warning - Payload sequence $pid NOT sent: $err\n");
  254. readingsSingleUpdate($hash, "state", "write error: $err", 1) if($err ne OldValue($name));
  255. }
  256. }
  257. }
  258. Log2Syslog_closesock($hash,$sock);
  259. }
  260. return "";
  261. }
  262. #################################################################################
  263. # FHEM system logging
  264. #################################################################################
  265. sub Log2Syslog_fhemlog($$) {
  266. my ($name,$raw) = @_;
  267. my $hash = $defs{$name};
  268. my $rex = $hash->{HELPER}{FHEMLOG};
  269. my ($prival,$sock,$err,$ret,$data,$pid);
  270. return if(IsDisabled($name) || !$rex);
  271. my ($date,$time,$vbose,undef,$txt) = split(" ",$raw,5);
  272. $txt = Log2Syslog_charfilter($hash,$txt);
  273. $date =~ s/\./-/g;
  274. my $tim = $date." ".$time;
  275. if($txt =~ m/^$rex$/ || "$vbose: $txt" =~ m/^$rex$/) {
  276. my $otp = "$vbose: $txt";
  277. $otp = "$tim $otp" if AttrVal($name,'addTimestamp',0);
  278. $prival = Log2Syslog_setprival($txt,$vbose);
  279. ($data,$pid) = Log2Syslog_setpayload($hash,$prival,$date,$time,$otp,"fhem");
  280. return if(!$data);
  281. $sock = Log2Syslog_setsock($hash);
  282. if (defined($sock)) {
  283. $ret = syswrite $sock, $data."\n" if($data);
  284. if($ret && $ret > 0) {
  285. Log2Syslog_Log3slog($name, 4, "$name - Payload sequence $pid sent\n");
  286. } else {
  287. my $err = $!;
  288. Log2Syslog_Log3slog($name, 4, "$name - Warning - Payload sequence $pid NOT sent: $err\n");
  289. readingsSingleUpdate($hash, "state", "write error: $err", 1) if($err ne OldValue($name));
  290. }
  291. Log2Syslog_closesock($hash,$sock);
  292. }
  293. }
  294. return;
  295. }
  296. ###############################################################################
  297. # Helper für ident & Regex setzen
  298. ###############################################################################
  299. sub Log2Syslog_setidrex ($$) {
  300. my ($hash,$a) = @_;
  301. $hash->{HELPER}{EVNTLOG} = (split("event:",$a))[1] if(lc($a) =~ m/^event:.*/);
  302. $hash->{HELPER}{FHEMLOG} = (split("fhem:",$a))[1] if(lc($a) =~ m/^fhem:.*/);
  303. $hash->{HELPER}{IDENT} = (split("ident:",$a))[1] if(lc($a) =~ m/^ident:.*/);
  304. return;
  305. }
  306. ###############################################################################
  307. # Zeichencodierung für Payload filtern
  308. ###############################################################################
  309. sub Log2Syslog_charfilter ($$) {
  310. my ($hash,$txt) = @_;
  311. my $name = $hash->{NAME};
  312. # nur erwünschte Zeichen in payload, ASCII %d32-126
  313. $txt =~ s/ß/ss/g;
  314. $txt =~ s/ä/ae/g;
  315. $txt =~ s/ö/oe/g;
  316. $txt =~ s/ü/ue/g;
  317. $txt =~ s/Ä/Ae/g;
  318. $txt =~ s/Ö/Oe/g;
  319. $txt =~ s/Ü/Ue/g;
  320. $txt =~ s/€/EUR/g;
  321. $txt =~ tr/ A-Za-z0-9!"#$%&'()*+,-.\/:;<=>?@[\]^_`{|}~//cd;
  322. return($txt);
  323. }
  324. ###############################################################################
  325. # erstelle Socket
  326. ###############################################################################
  327. sub Log2Syslog_setsock ($) {
  328. my ($hash) = @_;
  329. my $name = $hash->{NAME};
  330. my $host = $hash->{PEERHOST};
  331. my $port = AttrVal($name, "TLS", 0)?AttrVal($name, "port", 6514):AttrVal($name, "port", 514);
  332. my $protocol = lc(AttrVal($name, "protocol", "udp"));
  333. my $st = "active";
  334. my $timeout = AttrVal($name, "timeout", 0.5);
  335. my ($sock,$lo,$sslver,$sslalgo);
  336. return undef if($init_done != 1);
  337. if(AttrVal($name, "TLS", 0)) {
  338. # TLS gesicherte Verbindung
  339. # TLS Transport nach RFC5425 https://tools.ietf.org/pdf/rfc5425.pdf
  340. $attr{$name}{protocol} = "TCP" if(AttrVal($name, "protocol", "UDP") ne "TCP");
  341. $sslver = "n.a.";
  342. $sslalgo = "n.a.";
  343. eval "use IO::Socket::SSL";
  344. if($@) {
  345. $st = "$@";
  346. } else {
  347. $sock = IO::Socket::INET->new(PeerHost => $host, PeerPort => $port, Proto => 'tcp', Blocking => 0);
  348. if (!$sock) {
  349. $st = "unable open socket for $host, $protocol, $port";
  350. } else {
  351. $sock->blocking(1);
  352. eval { IO::Socket::SSL->start_SSL($sock,
  353. SSL_verify_mode => "SSL_VERIFY_PEER",
  354. SSL_version => "TLSv12",
  355. SSL_hostname => $host,
  356. SSL_veriycn_scheme => "rfc5425",
  357. SSL_veriycn_publicsuffix => '',
  358. Timeout => $timeout
  359. ) || undef $sock; };
  360. if (!$sock) {
  361. undef $sock;
  362. $st = "SSL error: ".IO::Socket::SSL::errstr();
  363. } else {
  364. $sslver = $sock->get_sslversion();
  365. $sslalgo = $sock->get_fingerprint();
  366. $sslalgo = (split("\\\$",$sslalgo))[0];
  367. $lo = "Socket opened for Host: $host, Protocol: $protocol, Port: $port, TLS: 0";
  368. }
  369. }
  370. }
  371. } else {
  372. # erstellt ungesicherte Socket Verbindung
  373. $sslver = "n.a.";
  374. $sslalgo = "n.a.";
  375. $sock = new IO::Socket::INET (PeerHost => $host, PeerPort => $port, Proto => $protocol, Timeout => $timeout );
  376. if (!$sock) {
  377. undef $sock;
  378. $st = "unable open socket for $host, $protocol, $port";
  379. } else {
  380. $sock->blocking(0);
  381. # Logausgabe (nur in das fhem Logfile !)
  382. $lo = "Socket opened for Host: $host, Protocol: $protocol, Port: $port, TLS: 0";
  383. }
  384. }
  385. readingsSingleUpdate($hash, "state", $st, 1) if($st ne OldValue($name));
  386. if($sslver ne $hash->{HELPER}{SSLVER}) {
  387. readingsSingleUpdate($hash, "SSL_Version", $sslver, 1);
  388. $hash->{HELPER}{SSLVER} = $sslver;
  389. }
  390. if($sslalgo ne $hash->{HELPER}{SSLALGO}) {
  391. readingsSingleUpdate($hash, "SSL_Algorithm", $sslalgo, 1);
  392. $hash->{HELPER}{SSLALGO} = $sslalgo;
  393. }
  394. Log2Syslog_Log3slog($name, 5, "$name - $lo") if($lo);
  395. return($sock);
  396. }
  397. ###############################################################################
  398. # Socket schließen
  399. ###############################################################################
  400. sub Log2Syslog_closesock($$) {
  401. my ($hash,$sock) = @_;
  402. shutdown($sock, 1);
  403. if(AttrVal($hash->{NAME}, "TLS", 0)) {
  404. $sock->close(SSL_no_shutdown => 1);
  405. } else {
  406. $sock->close();
  407. }
  408. return;
  409. }
  410. ###############################################################################
  411. # set PRIVAL (severity & facility)
  412. ###############################################################################
  413. sub Log2Syslog_setprival ($;$$) {
  414. my ($txt,$vbose) = @_;
  415. my $prival;
  416. # Priority = (facility * 8) + severity
  417. # https://tools.ietf.org/pdf/rfc5424.pdf
  418. # determine facility
  419. my $fac = 5; # facility by syslogd
  420. # calculate severity
  421. # mapping verbose level to severity
  422. # 0: Critical -> 2
  423. # 1: Error -> 3
  424. # 2: Warning -> 4
  425. # 3: Notice -> 5
  426. # 4: Informational -> 6
  427. # 5: Debug -> 7
  428. my $sv = 5; # notice (default)
  429. if ($vbose) {
  430. # map verbose to severity
  431. $sv = 2 if ($vbose == 0);
  432. $sv = 3 if ($vbose == 1);
  433. $sv = 4 if ($vbose == 2);
  434. $sv = 5 if ($vbose == 3);
  435. $sv = 6 if ($vbose == 4);
  436. $sv = 7 if ($vbose == 5);
  437. }
  438. $sv = 3 if (lc($txt) =~ m/error/); # error condition
  439. $sv = 4 if (lc($txt) =~ m/warning/); # warning conditions
  440. $prival = ($fac*8)+$sv;
  441. return($prival);
  442. }
  443. ###############################################################################
  444. # erstellen Payload für Syslog
  445. ###############################################################################
  446. sub Log2Syslog_setpayload ($$$$$$) {
  447. my ($hash,$prival,$date,$time,$otp,$lt) = @_;
  448. my $name = $hash->{NAME};
  449. my $ident = ($hash->{HELPER}{IDENT}?$hash->{HELPER}{IDENT}:$name)."_".$lt;
  450. my $myhost = $hash->{MYHOST}?$hash->{MYHOST}:"0.0.0.0";
  451. my $lf = AttrVal($name, "logFormat", "IETF");
  452. my $data;
  453. return undef,undef if(!$otp);
  454. my $pid = $hash->{SEQNO}; # PayloadID zur Nachverfolgung der Eventabfolge
  455. $hash->{SEQNO}++;
  456. my ($year,$month,$day) = split("-",$date);
  457. if ($lf eq "BSD") {
  458. # BSD Protokollformat https://tools.ietf.org/html/rfc3164
  459. $time = (split(/\./,$time))[0] if($time =~ m/\./); # msec ist nicht erlaubt
  460. $month = $Log2Syslog_BSDMonth{$month}; # Monatsmapping, z.B. 01 -> Jan
  461. $day =~ s/0/ / if($day =~ m/^0.*$/); # in Tagen < 10 muss 0 durch Space ersetzt werden
  462. $ident = substr($ident,0, $RFC3164len{TAG}); # Länge TAG Feld begrenzen
  463. no warnings 'uninitialized';
  464. $data = "<$prival>$month $day $time $myhost $ident: : $otp";
  465. use warnings;
  466. $data = substr($data,0, $RFC3164len{DL}); # Länge Total begrenzen
  467. }
  468. if ($lf eq "IETF") {
  469. # IETF Protokollformat https://tools.ietf.org/html/rfc5424
  470. my $mid = "FHEM"; # message ID, identify protocol of message, e.g. for firewall filter
  471. my $tim = $date."T".$time;
  472. no warnings 'uninitialized';
  473. $data = "<$prival>1 $tim $myhost $ident $pid $mid - : $otp";
  474. use warnings;
  475. }
  476. if($data =~ /\s$/){$data =~ s/\s$//;}
  477. my $dl = length($data)+1; # Länge muss ! für TLS stimmen, sonst keine Ausgabe !
  478. # wenn Transport Layer Security (TLS) -> Transport Mapping for Syslog https://tools.ietf.org/pdf/rfc5425.pdf
  479. if(AttrVal($name, "TLS", 0)) {
  480. $data = "$dl $data";
  481. $data = substr($data,0, $RFC5425len{DL}); # Länge Total begrenzen
  482. Log2Syslog_Log3slog($name, 4, "$name - SSL-Payload created with length: ".(($dl>$RFC5425len{DL})?$RFC5425len{DL}:$dl) );
  483. }
  484. my $ldat = ($dl>130)?(substr($data,0, 130)." ..."):$data;
  485. Log2Syslog_Log3slog($name, 4, "$name - Payload sequence $pid created:\n$ldat");
  486. return($data,$pid);
  487. }
  488. ###############################################################################
  489. # eigene Log3-Ableitung - Schleife vermeiden
  490. ###############################################################################
  491. sub Log2Syslog_Log3slog($$$) {
  492. my ($dev, $loglevel, $text) = @_;
  493. our ($logopened,$currlogfile);
  494. $dev = $dev->{NAME} if(defined($dev) && ref($dev) eq "HASH");
  495. if(defined($dev) &&
  496. defined($attr{$dev}) &&
  497. defined (my $devlevel = $attr{$dev}{verbose})) {
  498. return if($loglevel > $devlevel);
  499. } else {
  500. return if($loglevel > $attr{global}{verbose});
  501. }
  502. my ($seconds, $microseconds) = gettimeofday();
  503. my @t = localtime($seconds);
  504. my $nfile = ResolveDateWildcards($attr{global}{logfile}, @t);
  505. OpenLogfile($nfile) if(!$currlogfile || $currlogfile ne $nfile);
  506. my $tim = sprintf("%04d.%02d.%02d %02d:%02d:%02d",
  507. $t[5]+1900,$t[4]+1,$t[3], $t[2],$t[1],$t[0]);
  508. if($attr{global}{mseclog}) {
  509. $tim .= sprintf(".%03d", $microseconds/1000);
  510. }
  511. if($logopened) {
  512. print LOG "$tim $loglevel: $text\n";
  513. } else {
  514. print "$tim $loglevel: $text\n";
  515. }
  516. return undef;
  517. }
  518. ###############################################################################
  519. # Bestimmung Übertragungsrate
  520. ###############################################################################
  521. sub Log2Syslog_trate($) {
  522. my ($hash) = @_;
  523. my $name = $hash->{NAME};
  524. my $rerun = AttrVal($name, "rateCalcRerun", 60);
  525. if ($hash->{HELPER}{LTIME}+60 <= time()) {
  526. my $div = (time()-$hash->{HELPER}{LTIME})/60;
  527. my $spm = sprintf "%.0f", ($hash->{SEQNO} - $hash->{HELPER}{OLDSEQNO})/$div;
  528. $hash->{HELPER}{OLDSEQNO} = $hash->{SEQNO};
  529. $hash->{HELPER}{LTIME} = time();
  530. my $ospm = ReadingsVal($name, "Transfered_logs_per_minute", 0);
  531. if($spm != $ospm) {
  532. readingsSingleUpdate($hash, "Transfered_logs_per_minute", $spm, 1);
  533. } else {
  534. readingsSingleUpdate($hash, "Transfered_logs_per_minute", $spm, 0);
  535. }
  536. }
  537. RemoveInternalTimer($hash, "Log2Syslog_trate");
  538. InternalTimer(gettimeofday()+$rerun, "Log2Syslog_trate", $hash, 0);
  539. return;
  540. }
  541. 1;
  542. =pod
  543. =item helper
  544. =item summary forwards FHEM system logs and/or events to a syslog server
  545. =item summary_DE leitet FHEM Systemlogs und/oder Events an einen Syslog-Server weiter
  546. =begin html
  547. <a name="Log2Syslog"></a>
  548. <h3>Log2Syslog</h3>
  549. <ul>
  550. Send FHEM system log entries and/or FHEM events to an external syslog server. <br>
  551. The syslog protocol has been implemented according the specifications of <a href="https://tools.ietf.org/html/rfc5424"> RFC5424 (IETF)</a>,
  552. <a href="https://tools.ietf.org/html/rfc3164"> RFC3164 (BSD)</a> and the TLS transport protocol according to
  553. <a href="https://tools.ietf.org/pdf/rfc5425.pdf"> RFC5425</a>. <br>
  554. <br>
  555. <b>Prerequisits</b>
  556. <ul>
  557. <br/>
  558. The additional perl module "IO::Socket::INET" must be installed on your system. <br>
  559. Install this package from cpan or by <br><br>
  560. <code>apt-get install libio-socket-multicast-perl (only on Debian based installations) </code><br>
  561. </ul>
  562. <br>
  563. <a name="Log2Syslogdefine"></a>
  564. <b>Define</b>
  565. <ul>
  566. <br>
  567. <code>define &lt;name&gt; Log2Syslog &lt;destination host&gt; [ident:&lt;ident&gt;] [event:&lt;regexp&gt;] [fhem:&lt;regexp&gt;]</code><br>
  568. <br>
  569. &lt;destination host&gt; = host where the syslog server is running <br>
  570. [ident:&lt;ident&gt;] = optional program identifier. If not set the device name will be used as default <br>
  571. [event:&lt;regexp&gt;] = optional regex to filter events for logging <br>
  572. [fhem:&lt;regexp&gt;] = optional regex to filter fhem system log for logging <br><br>
  573. After definition the new device sends all new appearing fhem systemlog entries and events to the destination host,
  574. port=514/UDP format:IETF, immediately without further settings if the regex for fhem or event were set. <br>
  575. Without setting regex no fhem system log or event log will be forwarded. <br><br>
  576. The verbose level of FHEM system logs will convert into equivalent syslog severity level. <br>
  577. Thurthermore the message text will be scanned for signal terms "warning" and "error" (with case insensitivity).
  578. Dependent off the severity will be set equivalent as well. If a severity is already set by verbose level, it wil be overwritten
  579. by the level according to the signal term found in the message text. <br><br>
  580. <b>Lookup table Verbose-Level to Syslog severity level: </b><br><br>
  581. <ul>
  582. <table>
  583. <colgroup> <col width=40%> <col width=60%> </colgroup>
  584. <tr><td> <b>verbose-Level</b> </td><td> <b>Severity in Syslog</b> </td></tr>
  585. <tr><td> 0 </td><td> Critical </td></tr>
  586. <tr><td> 1 </td><td> Error </td></tr>
  587. <tr><td> 2 </td><td> Warning </td></tr>
  588. <tr><td> 3 </td><td> Notice </td></tr>
  589. <tr><td> 4 </td><td> Informational </td></tr>
  590. <tr><td> 5 </td><td> Debug </td></tr>
  591. </table>
  592. </ul>
  593. <br>
  594. <br>
  595. Example to log anything: <br>
  596. <br/>
  597. <code>define splunklog Log2Syslog fhemtest 192.168.2.49 ident:Test event:.* fhem:.* </code><br>
  598. <br/>
  599. will produce output like this raw example of a splunk syslog server:<br/>
  600. <pre>Aug 18 21:06:46 fhemtest.myds.me 1 2017-08-18T21:06:46 fhemtest.myds.me Test_event 13339 FHEM - : LogDB sql_processing_time: 0.2306
  601. Aug 18 21:06:46 fhemtest.myds.me 1 2017-08-18T21:06:46 fhemtest.myds.me Test_event 13339 FHEM - : LogDB background_processing_time: 0.2397
  602. Aug 18 21:06:45 fhemtest.myds.me 1 2017-08-18T21:06:45 fhemtest.myds.me Test_event 13339 FHEM - : LogDB CacheUsage: 21
  603. Aug 18 21:08:27 fhemtest.myds.me 1 2017-08-18T21:08:27.760 fhemtest.myds.me Test_fhem 13339 FHEM - : 4: CamTER - Informations of camera Terrasse retrieved
  604. Aug 18 21:08:27 fhemtest.myds.me 1 2017-08-18T21:08:27.095 fhemtest.myds.me Test_fhem 13339 FHEM - : 4: CamTER - CAMID already set - ignore get camid
  605. </pre>
  606. The structure of the payload differs dependent of the used logFormat. <br><br>
  607. <b>logFormat IETF:</b> <br><br>
  608. "&lt;PRIVAL&gt;1 TIME MYHOST IDENT PID MID - : MESSAGE" <br><br>
  609. <ul>
  610. <table>
  611. <colgroup> <col width=10%> <col width=90%> </colgroup>
  612. <tr><td> PRIVAL </td><td> priority value (coded from "facility" and "severity") </td></tr>
  613. <tr><td> TIME </td><td> timestamp according to RFC5424 </td></tr>
  614. <tr><td> MYHOST </td><td> Internal MYHOST </td></tr>
  615. <tr><td> IDENT </td><td> ident-Tag from DEF if set, or else the own device name. The statement will be completed by "_fhem" (FHEM-Log) respectively "_event" (Event-Log). </td></tr>
  616. <tr><td> PID </td><td> sequential Payload-ID </td></tr>
  617. <tr><td> MID </td><td> fix value "FHEM" </td></tr>
  618. <tr><td> MESSAGE </td><td> the dataset to transfer </td></tr>
  619. </table>
  620. </ul>
  621. <br>
  622. <b>logFormat BSD:</b> <br><br>
  623. "&lt;PRIVAL&gt;MONAT TAG TIME MYHOST IDENT: : MESSAGE" <br><br>
  624. <ul>
  625. <table>
  626. <colgroup> <col width=10%> <col width=90%> </colgroup>
  627. <tr><td> PRIVAL </td><td> priority value (coded from "facility" and "severity") </td></tr>
  628. <tr><td> MONAT </td><td> month according to RFC3164 </td></tr>
  629. <tr><td> TAG </td><td> day of month according to RFC3164 </td></tr>
  630. <tr><td> TIME </td><td> timestamp according to RFC3164 </td></tr>
  631. <tr><td> MYHOST </td><td> Internal MYHOST </td></tr>
  632. <tr><td> IDENT </td><td> ident-Tag from DEF if set, or else the own device name. The statement will be completed by "_fhem" (FHEM-Log) respectively "_event" (Event-Log). </td></tr>
  633. <tr><td> MESSAGE </td><td> the dataset to transfer </td></tr>
  634. </table>
  635. </ul>
  636. <br>
  637. </ul>
  638. <br>
  639. <a name="Log2SyslogGet"></a>
  640. <b>Get</b>
  641. <ul>
  642. <br>
  643. <li><code>certinfo</code><br>
  644. <br>
  645. Show informations about the server certificate if a TLS-session was created (Reading "SSL_Version" isn't "n.a.").
  646. </li><br>
  647. </ul>
  648. <br>
  649. <a name="Log2Syslogattr"></a>
  650. <b>Attributes</b>
  651. <ul>
  652. <br/>
  653. <a name="addTimestamp"></a>
  654. <li><code>addTimestamp [0|1]</code><br>
  655. <br/>
  656. If set to 1, fhem timestamps will be logged too.<br/>
  657. Default behavior is to not log these timestamps, because syslog uses own timestamps.<br/>
  658. Maybe useful if mseclog is activated in fhem.<br/>
  659. <br/>
  660. Example output (raw) of a Splunk syslog server: <br>
  661. <pre>Aug 18 21:26:55 fhemtest.myds.me 1 2017-08-18T21:26:55 fhemtest.myds.me Test_event 13339 FHEM - : 2017-08-18 21:26:55 USV state: OL
  662. Aug 18 21:26:54 fhemtest.myds.me 1 2017-08-18T21:26:54 fhemtest.myds.me Test_event 13339 FHEM - : 2017-08-18 21:26:54 Bezug state: done
  663. Aug 18 21:26:54 fhemtest.myds.me 1 2017-08-18T21:26:54 fhemtest.myds.me Test_event 13339 FHEM - : 2017-08-18 21:26:54 recalc_Bezug state: Next: 21:31:59
  664. </pre>
  665. </li><br>
  666. <li><code>addStateEvent [0|1]</code><br>
  667. <br>
  668. If set to 1, events will be completed with "state" if a state-event appears.<br/>
  669. Default behavior is without getting "state".
  670. </li><br>
  671. <li><code>disable [0|1]</code><br>
  672. <br>
  673. disables the device.
  674. </li><br>
  675. <li><code>logFormat [BSD|IETF]</code><br>
  676. <br>
  677. Set the syslog protocol format. <br>
  678. Default value is "IETF" if not specified.
  679. </li><br>
  680. <li><code>protocol [TCP|UDP]</code><br>
  681. <br>
  682. Sets the socket protocol which should be used. You can choose UDP or TCP. <br>
  683. Default value is "UDP" if not specified.
  684. </li><br>
  685. <li><code>port</code><br>
  686. <br>
  687. The port of the syslog server is listening. (default 514)
  688. </li><br>
  689. <li><code>rateCalcRerun</code><br>
  690. <br>
  691. Rerun cycle for calculation of log transfer rate (Reading "Transfered_logs_per_minute") in seconds.
  692. Default is 60 seconds.
  693. </li><br>
  694. <li><code>timeout</code><br>
  695. <br>
  696. Timeout for connection to the syslog server (TCP).
  697. </li><br>
  698. <li><code>verbose</code><br>
  699. <br>
  700. To avoid loops, the output of verbose level of the Log2Syslog-Devices will only be reported into the local FHEM Logfile and
  701. no forwarded.
  702. </li><br>
  703. </ul>
  704. <br>
  705. <a name="Log2Syslogreadings"></a>
  706. <b>Readings</b>
  707. <ul>
  708. <br>
  709. <table>
  710. <colgroup> <col width=40%> <col width=60%> </colgroup>
  711. <tr><td><b>SSL_Algorithm</b> </td><td> used SSL algorithm if SSL is enabled and active </td></tr>
  712. <tr><td><b>SSL_Version</b> </td><td> the used TLS-version if encryption is enabled and is active</td></tr>
  713. <tr><td><b>Transfered_logs_per_minute</b> </td><td> the average number of forwarded logs/events per minute </td></tr>
  714. </table>
  715. <br>
  716. </ul>
  717. </ul>
  718. =end html
  719. =begin html_DE
  720. <a name="Log2Syslog"></a>
  721. <h3>Log2Syslog</h3>
  722. <ul>
  723. Sendet FHEM Systemlog Einträge und/oder Events an einen externen Syslog-Server weiter. <br>
  724. Die Implementierung des Syslog-Protokolls erfolgte entsprechend den Vorgaben von <a href="https://tools.ietf.org/html/rfc5424"> RFC5424 (IETF)</a>,
  725. <a href="https://tools.ietf.org/html/rfc3164"> RFC3164 (BSD)</a> sowie dem TLS Transport Protokoll nach
  726. <a href="https://tools.ietf.org/pdf/rfc5425.pdf"> RFC5425</a>. <br>
  727. <br>
  728. <b>Voraussetzungen</b>
  729. <ul>
  730. <br/>
  731. Es wird das Perl Modul "IO::Socket::INET" benötigt und muss installiert sein. <br>
  732. Das Modul kann über CPAN oder mit <br><br>
  733. <code>apt-get install libio-socket-multicast-perl (auf Debian Linux Systemen) </code><br><br>
  734. installiert werden.
  735. </ul>
  736. <br/>
  737. <a name="Log2Syslogdefine"></a>
  738. <b>Definition</b>
  739. <ul>
  740. <br>
  741. <code>define &lt;name&gt; Log2Syslog &lt;Zielhost&gt; [ident:&lt;ident&gt;] [event:&lt;regexp&gt;] [fhem:&lt;regexp&gt;] </code><br>
  742. <br>
  743. &lt;Zielhost&gt; = Host (Name oder IP-Adresse) auf dem der Syslog-Server läuft <br>
  744. [ident:&lt;ident&gt;] = optionaler Programm Identifier. Wenn nicht gesetzt wird per default der Devicename benutzt. <br>
  745. [event:&lt;regexp&gt;] = optionaler regulärer Ausdruck zur Filterung von Events zur Weiterleitung <br>
  746. [fhem:&lt;regexp&gt;] = optionaler regulärer Ausdruck zur Filterung von FHEM Logs zur Weiterleitung <br><br>
  747. Direkt nach der Definition sendet das neue Device alle neu auftretenden FHEM Systemlog Einträge und Events ohne weitere
  748. Einstellungen an den Zielhost, Port=514/UDP Format=IETF, wenn reguläre Ausdrücke für Events/FHEM angegeben wurden. <br>
  749. Wurde kein Regex gesetzt, erfolgt keine Weiterleitung von Events oder FHEM Systemlogs. <br><br>
  750. Die Verbose-Level der FHEM Systemlogs werden in entsprechende Schweregrade der Syslog-Messages umgewandelt. <br>
  751. Weiterhin wird der Meldungstext der FHEM Systemlogs und Events nach den Signalwörtern "warning" und "error" durchsucht
  752. (Groß- /Kleinschreibung wird nicht beachtet). Davon abhängig wird der Schweregrad ebenfalls äquivalent gesetzt und übersteuert
  753. einen eventuell bereits durch Verbose-Level gesetzten Schweregrad. <br><br>
  754. <b>Umsetzungstabelle Verbose-Level in Syslog-Schweregrad Stufe: </b><br><br>
  755. <ul>
  756. <table>
  757. <colgroup> <col width=40%> <col width=60%> </colgroup>
  758. <tr><td> <b>Verbose-Level</b> </td><td> <b>Schweregrad in Syslog</b> </td></tr>
  759. <tr><td> 0 </td><td> Critical </td></tr>
  760. <tr><td> 1 </td><td> Error </td></tr>
  761. <tr><td> 2 </td><td> Warning </td></tr>
  762. <tr><td> 3 </td><td> Notice </td></tr>
  763. <tr><td> 4 </td><td> Informational </td></tr>
  764. <tr><td> 5 </td><td> Debug </td></tr>
  765. </table>
  766. </ul>
  767. <br>
  768. <br>
  769. Beispiel:<br/>
  770. <br/>
  771. <code>define splunklog Log2Syslog fhemtest 192.168.2.49 ident:Test event:.* fhem:.* </code><br/>
  772. <br/>
  773. Es werden alle Events weitergeleitet wie deses Beispiel der raw-Ausgabe eines Splunk Syslog Servers zeigt::<br/>
  774. <pre>Aug 18 21:06:46 fhemtest.myds.me 1 2017-08-18T21:06:46 fhemtest.myds.me Test_event 13339 FHEM - : LogDB sql_processing_time: 0.2306
  775. Aug 18 21:06:46 fhemtest.myds.me 1 2017-08-18T21:06:46 fhemtest.myds.me Test_event 13339 FHEM - : LogDB background_processing_time: 0.2397
  776. Aug 18 21:06:45 fhemtest.myds.me 1 2017-08-18T21:06:45 fhemtest.myds.me Test_event 13339 FHEM - : LogDB CacheUsage: 21
  777. Aug 18 21:08:27 fhemtest.myds.me 1 2017-08-18T21:08:27.760 fhemtest.myds.me Test_fhem 13339 FHEM - : 4: CamTER - Informations of camera Terrasse retrieved
  778. Aug 18 21:08:27 fhemtest.myds.me 1 2017-08-18T21:08:27.095 fhemtest.myds.me Test_fhem 13339 FHEM - : 4: CamTER - CAMID already set - ignore get camid
  779. </pre>
  780. Der Aufbau der Payload unterscheidet sich je nach verwendeten logFormat. <br><br>
  781. <b>logFormat IETF:</b> <br><br>
  782. "&lt;PRIVAL&gt;1 TIME MYHOST IDENT PID MID - : MESSAGE" <br><br>
  783. <ul>
  784. <table>
  785. <colgroup> <col width=10%> <col width=90%> </colgroup>
  786. <tr><td> PRIVAL </td><td> Priority Wert (kodiert aus "facility" und "severity") </td></tr>
  787. <tr><td> TIME </td><td> Timestamp nach RFC5424 </td></tr>
  788. <tr><td> MYHOST </td><td> Internal MYHOST </td></tr>
  789. <tr><td> IDENT </td><td> Ident-Tag aus DEF wenn angegeben, sonst der eigene Devicename. Die Angabe wird mit "_fhem" (FHEM-Log) bzw. "_event" (Event-Log) ergänzt. </td></tr>
  790. <tr><td> PID </td><td> fortlaufende Payload-ID </td></tr>
  791. <tr><td> MID </td><td> fester Wert "FHEM" </td></tr>
  792. <tr><td> MESSAGE </td><td> der zu übertragende Datensatz </td></tr>
  793. </table>
  794. </ul>
  795. <br>
  796. <b>logFormat BSD:</b> <br><br>
  797. "&lt;PRIVAL&gt;MONAT TAG TIME MYHOST IDENT: : MESSAGE" <br><br>
  798. <ul>
  799. <table>
  800. <colgroup> <col width=10%> <col width=90%> </colgroup>
  801. <tr><td> PRIVAL </td><td> Priority Wert (kodiert aus "facility" und "severity") </td></tr>
  802. <tr><td> MONAT </td><td> Monatsangabe nach RFC3164 </td></tr>
  803. <tr><td> TAG </td><td> Tag des Monats nach RFC3164 </td></tr>
  804. <tr><td> TIME </td><td> Zeitangabe nach RFC3164 </td></tr>
  805. <tr><td> MYHOST </td><td> Internal MYHOST </td></tr>
  806. <tr><td> IDENT </td><td> Ident-Tag aus DEF wenn angegeben, sonst der eigene Devicename. Die Angabe wird mit "_fhem" (FHEM-Log) bzw. "_event" (Event-Log) ergänzt. </td></tr>
  807. <tr><td> MESSAGE </td><td> der zu übertragende Datensatz </td></tr>
  808. </table>
  809. </ul>
  810. <br>
  811. </ul>
  812. <br><br>
  813. <a name="Log2SyslogGet"></a>
  814. <b>Get</b>
  815. <ul>
  816. <br>
  817. <li><code>certinfo</code><br>
  818. <br>
  819. Zeigt Informationen zum Serverzertifikat wenn eine TLS-Session aufgebaut wurde (Reading "SSL_Version" ist nicht "n.a.").
  820. </li><br>
  821. </ul>
  822. <br>
  823. <a name="Log2Syslogattr"></a>
  824. <b>Attribute</b>
  825. <ul>
  826. <br>
  827. <a name="addTimestamp"></a>
  828. <li><code>addTimestamp [0|1]</code><br>
  829. <br/>
  830. Wenn gesetzt, werden FHEM Timestamps im Datensatz mit übertragen.<br/>
  831. Per default werden die Timestamps nicht mit übertragen, da der Syslog-Server eigene Timestamps verwendet.<br/>
  832. Die Einstellung kann hilfeich sein wenn mseclog in FHEM aktiviert ist.<br/>
  833. <br/>
  834. Beispielausgabe (raw) eines Splunk Syslog Servers:<br/>
  835. <pre>Aug 18 21:26:55 fhemtest.myds.me 1 2017-08-18T21:26:55 fhemtest.myds.me Test_event 13339 FHEM - : 2017-08-18 21:26:55 USV state: OL
  836. Aug 18 21:26:54 fhemtest.myds.me 1 2017-08-18T21:26:54 fhemtest.myds.me Test_event 13339 FHEM - : 2017-08-18 21:26:54 Bezug state: done
  837. Aug 18 21:26:54 fhemtest.myds.me 1 2017-08-18T21:26:54 fhemtest.myds.me Test_event 13339 FHEM - : 2017-08-18 21:26:54 recalc_Bezug state: Next: 21:31:59
  838. </pre>
  839. </li><br>
  840. <li><code>addStateEvent [0|1]</code><br>
  841. <br>
  842. Wenn gesetzt, werden state-events mit dem Reading "state" ergänzt.<br/>
  843. Die Standardeinstellung ist ohne state-Ergänzung.
  844. </li><br>
  845. <li><code>disable [0|1]</code><br>
  846. <br>
  847. Das Device wird aktiviert | aktiviert.
  848. </li><br>
  849. <li><code>logFormat [BSD|IETF]</code><br>
  850. <br>
  851. Stellt das Protokollformat ein. <br>
  852. Der Standardwert ist "IETF". <br>
  853. </li><br>
  854. <li><code>protocol [TCP|UDP]</code><br>
  855. <br>
  856. Setzt den Protokolltyp der verwendet werden soll. Es kann UDP oder TCP gewählt werden. <br>
  857. Standard ist "UDP" wenn nichts spezifiziert ist.
  858. </li><br>
  859. <li><code>port</code><br>
  860. <br>
  861. Der verwendete Port des Syslog-Servers. (default 514)
  862. </li><br>
  863. <li><code>rateCalcRerun</code><br>
  864. <br>
  865. Wiederholungszyklus für die Bestimmung der Log-Transferrate (Reading "Transfered_logs_per_minute") in Sekunden.
  866. Default sind 60 Sekunden.
  867. </li><br>
  868. <li><code>timeout</code><br>
  869. <br>
  870. Timeout für die Verbindung zum Syslog-Server (TCP).
  871. </li><br>
  872. <li><code>verbose</code><br>
  873. <br>
  874. Die Ausgaben der Verbose-Level von Log2Syslog-Devices werden ausschließlich im lokalen FHEM Logfile ausgegeben und
  875. nicht weitergeleitet um Schleifen zu vermeiden.
  876. </li><br>
  877. </ul>
  878. <br>
  879. <a name="Log2Syslogreadings"></a>
  880. <b>Readings</b>
  881. <ul>
  882. <br>
  883. <table>
  884. <colgroup> <col width=35%> <col width=65%> </colgroup>
  885. <tr><td><b>SSL_Algorithm</b> </td><td> der verwendete SSL Algorithmus wenn SSL eingeschaltet und aktiv ist </td></tr>
  886. <tr><td><b>SSL_Version</b> </td><td> die verwendete TLS-Version wenn die Verschlüsselung aktiv ist</td></tr>
  887. <tr><td><b>Transfered_logs_per_minute</b> </td><td> die durchschnittliche Anzahl der übertragenen Logs/Events pro Minute </td></tr>
  888. </table>
  889. <br>
  890. </ul>
  891. </ul>
  892. =end html_DE
  893. =cut