GENWiki

Premier IT Outsourcing and Support Services within the UK

User Tools

Site Tools


rfc:rfc5674

Network Working Group S. Chisholm Request for Comments: 5674 Nortel Category: Standards Track R. Gerhards

                                                          Adiscon GmbH
                                                          October 2009
                          Alarms in Syslog

Abstract

 This document describes how to send alarm information in syslog.  It
 includes the mapping of ITU perceived severities onto syslog message
 fields.  It also includes a number of alarm-specific SD-PARAM
 definitions from X.733 and the IETF Alarm MIB.

Status of This Memo

 This document specifies an Internet standards track protocol for the
 Internet community, and requests discussion and suggestions for
 improvements.  Please refer to the current edition of the "Internet
 Official Protocol Standards" (STD 1) for the standardization state
 and status of this protocol.  Distribution of this memo is unlimited.

Copyright Notice

 Copyright (c) 2009 IETF Trust and the persons identified as the
 document authors.  All rights reserved.
 This document is subject to BCP 78 and the IETF Trust's Legal
 Provisions Relating to IETF Documents
 (http://trustee.ietf.org/license-info) in effect on the date of
 publication of this document.  Please review these documents
 carefully, as they describe your rights and restrictions with respect
 to this document.  Code Components extracted from this document must
 include Simplified BSD License text as described in Section 4.e of
 the Trust Legal Provisions and are provided without warranty as
 described in the BSD License.

Chisholm & Gerhards Standards Track [Page 1] RFC 5674 Alarms in Syslog October 2009

Table of Contents

 1. Introduction ....................................................2
 2. Severity Mapping ................................................2
 3. Alarm STRUCTURED-DATA Elements ..................................3
    3.1. resource ...................................................3
    3.2. probableCause ..............................................4
    3.3. perceivedSeverity ..........................................4
    3.4. eventType ..................................................4
    3.5. trendIndication ............................................4
    3.6. resourceURI ................................................5
 4. Examples ........................................................5
 5. Security Considerations .........................................6
 6. IANA Considerations .............................................6
 7. Acknowledgments .................................................6
 8. References ......................................................7
    8.1. Normative References .......................................7
    8.2. Informative References .....................................7

1. Introduction

 In addition to sending out alarm information asynchronously via
 protocols such as the Simple Network Management Protocol (SNMP) or
 the Network Configuration Protocol (Netconf), many implementations
 also log alarms via syslog.  This memo defines a set of SD-PARAMs to
 support logging and defines a mapping of syslog severity to the
 severity of the alarm.
 The Alarm MIB [RFC3877] includes mandatory alarm fields from X.733
 [X.733] as well as information from X.736 [X.736].  In additional,
 the Alarm MIB introduces its own alarm fields.  This memo reuses
 terminology and fields from the Alarm MIB.
 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
 document are to be interpreted as described in [RFC2119].
 Alarm-related terminology is defined in [RFC3877].
 SD-ID, SD-PARAM, and other syslog-related terms are defined in
 [RFC5424].

2. Severity Mapping

 The Alarm MIB [RFC3877] defines ITU perceived severities; it is
 useful to be able to relate these to the syslog message fields,
 particularly in the case where alarms are being logged.  This memo
 describes the representation of ITU perceived severities in

Chisholm & Gerhards Standards Track [Page 2] RFC 5674 Alarms in Syslog October 2009

 appropriate syslog fields, which are described in [RFC5424].  Syslog
 offers both a so-called SEVERITY as well as STRUCTURED-DATA.  Due to
 constraints in syslog, there is no one-to-one mapping possible for
 SEVERITY.  A STRUCTURED-DATA element is defined in this document to
 allow inclusion of the unmodified ITU perceived severity.
 Syslog supports Severity values different from ITU perceived
 severities.  These are defined in Section 6.2.1 of [RFC5424].  The
 mapping shown in Table 1 below SHOULD be used to map ITU perceived
 severities to syslog severities.
         ITU Perceived Severity      syslog SEVERITY (Name)
         Critical                    1 (Alert)
         Major                       2 (Critical)
         Minor                       3 (Error)
         Warning                     4 (Warning)
         Indeterminate               5 (Notice)
         Cleared                     5 (Notice)
      Table 1. ITUPerceivedSeverity to Syslog SEVERITY Mapping

3. Alarm STRUCTURED-DATA Elements

 STRUCTURED-DATA allows the inclusion of any structured information
 into a syslog message.  The following are defined in this document to
 support the structuring of alarm information.
 o  Resource Under Alarm
 o  Probable Cause
 o  Event Type
 o  Perceived Severity
 o  Trend Indication
 o  Resource URI
 Support of the "alarm" SD-ID is optional but, once supported, some of
 the SD-PARAMS are mandatory.

3.1. resource

 If the "alarm" SD-ID is included, the "resource" SD-PARAM MUST be
 included.  This item uniquely identifies the resource under alarm
 within the scope of a network element.

Chisholm & Gerhards Standards Track [Page 3] RFC 5674 Alarms in Syslog October 2009

3.2. probableCause

 If the "alarm" SD-ID is included, the "probableCause" SD-PARAM MUST
 be included.  This parameter is the mnemonic associated with the
 IANAItuProbableCause object defined within [RFC3877] and any
 subsequent extensions defined by IANA.  For example,
 IANAItuProbableCause defines a transmission failure to a probable
 cause of 'transmissionError (10)'.  The value of the parameter in
 this case would be 'transmissionError'.

3.3. perceivedSeverity

 If the "alarm" SD-ID is included, the "perceivedSeverity" SD-PARAM
 MUST be included.  Similar to the definition of perceived severity in
 [X.736] and [RFC3877], this object can take the following values:
 o  cleared
 o  indeterminate
 o  critical
 o  major
 o  minor
 o  warning
 See Section 2 for the relationship between this severity and syslog
 severity.

3.4. eventType

 If the "alarm" SD-ID is included, the "eventType" SD-PARAM SHOULD be
 included.  This parameter is the mnemonic associated with the
 IANAItuEventType object defined within [RFC3877] and any subsequent
 extensions defined by IANA.  For example, IANAItuEventType defines an
 environmental alarm to an event type of 'environmentalAlarm (6)'.
 The value of the parameter in this case would be
 'environmentalAlarm'.

3.5. trendIndication

 If the "alarm" SD-ID is included, the "trendIndication" SD-PARAM
 SHOULD be included.  Similar to the definition of perceived severity
 in [X.733] and [RFC3877], this object can take the following values:

Chisholm & Gerhards Standards Track [Page 4] RFC 5674 Alarms in Syslog October 2009

 o  moreSevere
 o  noChange
 o  lessSevere

3.6. resourceURI

 If the "alarm" SD-ID is included, the "resourceURI" SD-PARAM SHOULD
 be included.  This item uniquely identifies the resource under alarm.
 The value of this field MUST conform to the URI definition in
 [RFC3986] and its updates.  In the case of an SNMP resource, the
 syntax in [RFC4088] MUST be used and "resourceURI" must point to the
 same resource as alarmActiveResourceId [RFC3877] for this alarm.
 Both the "resource" and the "resourceURI" parameters point at the
 resource experiencing the alarm, but the "resourceURI" has syntactic
 constraint requiring it to be a URI.  This makes it easy to correlate
 this syslog alarm with any alarms that are received via other
 protocols, such as SNMP, or to use SNMP or other protocols to get
 additional information about this resource.

4. Examples

 Example 1 - Mandatory Alarm Information
 <165>1 2003-10-11T22:14:15.003Z mymachine.example.com
 evntslog - ID47 [exampleSDID@32473 iut="3" eventSource=
 "Application" eventID="1011"][alarm resource="su root"
 probableCause="unauthorizedAccessAttempt"
 perceivedSeverity="major"]
 BOMAn application event log entry...
 In this example, extended from [RFC5424], the VERSION is 1 and the
 Facility has the value of 4.  The severity is 2.  The message was
 created on 11 October 2003 at 10:14:15pm UTC, 3 milliseconds into the
 next second.  The message originated from a host that identifies
 itself as "mymachine.example.com".  The APP-NAME is "evntslog" and
 the PROCID is unknown.  The MSGID is "ID47".  We have included both
 the structured data from the original example, a single element with
 the value "[exampleSDID@32473 iut="3" eventSource="Application"
 eventID="1011"]", and a new element with the alarm information
 defined in this memo.  The alarm SD-ID contains the mandatory SD-
 PARAMS of resource, probableCause, and preceivedSeverity.  The MSG
 itself is "An application event log entry..."  The BOM at the
 beginning of the MSG indicates UTF-8 encoding.

Chisholm & Gerhards Standards Track [Page 5] RFC 5674 Alarms in Syslog October 2009

 Example 2 - Additional Alarm Information
 <165>1 2004-11-10T20:15:15.003Z mymachine.example.com
 evntslog - ID48 [alarm resource="interface 42"
 probableCause="unauthorizedAccessAttempt"
 perceivedSeverity="major"
 eventType="communicationsAlarm"
 resourceURI="snmp://example.com//1.3.6.1.2.1.2.2.1.1.42"]
 In this example, we include two optional alarm fields: eventType and
 resourceURI.

5. Security Considerations

 In addition to the general syslog security considerations discussed
 in [RFC5424], the information contained with alarms may provide
 hackers with helpful information about parts of the system currently
 experiencing stress as well as general information about the system,
 such as inventory.
 Users should not have access to information in alarms that their
 normal access permissions would not permit if the information were
 accessed in another manner.
 There is no standardized access control model for syslog, and hence
 the ability to filter alarms based on a notion of a receiver identity
 is, at best, implementation specific.

6. IANA Considerations

 IANA registered the syslog Structured Data ID values and PARAM-NAMEs
 shown below:
 SD-ID              PARAM-NAME
 alarm                                 OPTIONAL
                    resource           MANDATORY
                    probableCause      MANDATORY
                    perceivedSeverity  MANDATORY
                    eventType          OPTIONAL
                    trendIndication    OPTIONAL
                    resourceURI        OPTIONAL

7. Acknowledgments

 Thanks to members of the Syslog and OPSAWG work group who contributed
 to this specification.  We'd also like to thank Juergen
 Schoenwaelder, Dave Harrington, Wes Hardaker, and Randy Presuhn for
 their reviews.

Chisholm & Gerhards Standards Track [Page 6] RFC 5674 Alarms in Syslog October 2009

8. References

8.1. Normative References

 [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
            Requirement Levels", BCP 14, RFC 2119, March 1997.
 [RFC3877]  Chisholm, S. and D. Romascanu, "Alarm Management
            Information Base (MIB)", RFC 3877, September 2004.
 [RFC3986]  Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
            Resource Identifier (URI): Generic Syntax", STD 66,
            RFC 3986, January 2005.
 [RFC4088]  Black, D., McCloghrie, K., and J. Schoenwaelder, "Uniform
            Resource Identifier (URI) Scheme for the Simple Network
            Management Protocol (SNMP)", RFC 4088, June 2005.
 [RFC5424]  Gerhards, R., "The Syslog Protocol", RFC 5424, March 2009.

8.2. Informative References

 [X.733]    ITU-T, "Information Technology - Open Systems
            Interconnection - System Management: Alarm Reporting
            Function", ITU-T X.733, 1992.
 [X.736]    ITU-T, "Information Technology - Open Systems
            Interconnection - System Management: Security Alarm
            Reporting Function", ITU-T X.736, 1992.

Authors' Addresses

 Sharon Chisholm
 Nortel
 3500 Carling Ave
 Nepean, Ontario  K2H 8E9
 Canada
 EMail: schishol@nortel.com
 Rainer Gerhards
 Adiscon GmbH
 Mozartstrasse 21
 Grossrinderfeld, BW  97950
 Germany
 EMail: rgerhards@adiscon.com

Chisholm & Gerhards Standards Track [Page 7]

/data/webs/external/dokuwiki/data/pages/rfc/rfc5674.txt · Last modified: 2009/10/28 18:43 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki