Network Working Group                                        S. Chisholm
Request for Comments: 5674                                        Nortel
Category: Standards Track                                    R. Gerhards
                                                            Adiscon GmbH
                                                            October 2009


                            Alarms in Syslog

Abstract

   This document describes how to send alarm information in syslog.  It
   includes the mapping of ITU perceived severities onto syslog message
   fields.  It also includes a number of alarm-specific SD-PARAM
   definitions from X.733 and the IETF Alarm MIB.

Status of This Memo

   This document specifies an Internet standards track protocol for the
   Internet community, and requests discussion and suggestions for
   improvements.  Please refer to the current edition of the "Internet
   Official Protocol Standards" (STD 1) for the standardization state
   and status of this protocol.  Distribution of this memo is unlimited.

Copyright Notice

   Copyright (c) 2009 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the BSD License.













Chisholm & Gerhards         Standards Track                     [Page 1]


RFC 5674                    Alarms in Syslog                October 2009


Table of Contents

   1. Introduction ....................................................2
   2. Severity Mapping ................................................2
   3. Alarm STRUCTURED-DATA Elements ..................................3
      3.1. resource ...................................................3
      3.2. probableCause ..............................................4
      3.3. perceivedSeverity ..........................................4
      3.4. eventType ..................................................4
      3.5. trendIndication ............................................4
      3.6. resourceURI ................................................5
   4. Examples ........................................................5
   5. Security Considerations .........................................6
   6. IANA Considerations .............................................6
   7. Acknowledgments .................................................6
   8. References ......................................................7
      8.1. Normative References .......................................7
      8.2. Informative References .....................................7

1.  Introduction

   In addition to sending out alarm information asynchronously via
   protocols such as the Simple Network Management Protocol (SNMP) or
   the Network Configuration Protocol (Netconf), many implementations
   also log alarms via syslog.  This memo defines a set of SD-PARAMs to
   support logging and defines a mapping of syslog severity to the
   severity of the alarm.

   The Alarm MIB [RFC3877] includes mandatory alarm fields from X.733
   [X.733] as well as information from X.736 [X.736].  In additional,
   the Alarm MIB introduces its own alarm fields.  This memo reuses
   terminology and fields from the Alarm MIB.

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

   Alarm-related terminology is defined in [RFC3877].

   SD-ID, SD-PARAM, and other syslog-related terms are defined in
   [RFC5424].

2.  Severity Mapping

   The Alarm MIB [RFC3877] defines ITU perceived severities; it is
   useful to be able to relate these to the syslog message fields,
   particularly in the case where alarms are being logged.  This memo
   describes the representation of ITU perceived severities in



Chisholm & Gerhards         Standards Track                     [Page 2]


RFC 5674                    Alarms in Syslog                October 2009


   appropriate syslog fields, which are described in [RFC5424].  Syslog
   offers both a so-called SEVERITY as well as STRUCTURED-DATA.  Due to
   constraints in syslog, there is no one-to-one mapping possible for
   SEVERITY.  A STRUCTURED-DATA element is defined in this document to
   allow inclusion of the unmodified ITU perceived severity.

   Syslog supports Severity values different from ITU perceived
   severities.  These are defined in Section 6.2.1 of [RFC5424].  The
   mapping shown in Table 1 below SHOULD be used to map ITU perceived
   severities to syslog severities.

           ITU Perceived Severity      syslog SEVERITY (Name)
           Critical                    1 (Alert)
           Major                       2 (Critical)
           Minor                       3 (Error)
           Warning                     4 (Warning)
           Indeterminate               5 (Notice)
           Cleared                     5 (Notice)

        Table 1. ITUPerceivedSeverity to Syslog SEVERITY Mapping

3.  Alarm STRUCTURED-DATA Elements

   STRUCTURED-DATA allows the inclusion of any structured information
   into a syslog message.  The following are defined in this document to
   support the structuring of alarm information.

   o  Resource Under Alarm

   o  Probable Cause

   o  Event Type

   o  Perceived Severity

   o  Trend Indication

   o  Resource URI

   Support of the "alarm" SD-ID is optional but, once supported, some of
   the SD-PARAMS are mandatory.

3.1.  resource

   If the "alarm" SD-ID is included, the "resource" SD-PARAM MUST be
   included.  This item uniquely identifies the resource under alarm
   within the scope of a network element.




Chisholm & Gerhards         Standards Track                     [Page 3]


RFC 5674                    Alarms in Syslog                October 2009


3.2.  probableCause

   If the "alarm" SD-ID is included, the "probableCause" SD-PARAM MUST
   be included.  This parameter is the mnemonic associated with the
   IANAItuProbableCause object defined within [RFC3877] and any
   subsequent extensions defined by IANA.  For example,
   IANAItuProbableCause defines a transmission failure to a probable
   cause of 'transmissionError (10)'.  The value of the parameter in
   this case would be 'transmissionError'.

3.3.  perceivedSeverity

   If the "alarm" SD-ID is included, the "perceivedSeverity" SD-PARAM
   MUST be included.  Similar to the definition of perceived severity in
   [X.736] and [RFC3877], this object can take the following values:

   o  cleared

   o  indeterminate

   o  critical

   o  major

   o  minor

   o  warning

   See Section 2 for the relationship between this severity and syslog
   severity.

3.4.  eventType

   If the "alarm" SD-ID is included, the "eventType" SD-PARAM SHOULD be
   included.  This parameter is the mnemonic associated with the
   IANAItuEventType object defined within [RFC3877] and any subsequent
   extensions defined by IANA.  For example, IANAItuEventType defines an
   environmental alarm to an event type of 'environmentalAlarm (6)'.
   The value of the parameter in this case would be
   'environmentalAlarm'.

3.5.  trendIndication

   If the "alarm" SD-ID is included, the "trendIndication" SD-PARAM
   SHOULD be included.  Similar to the definition of perceived severity
   in [X.733] and [RFC3877], this object can take the following values:





Chisholm & Gerhards         Standards Track                     [Page 4]


RFC 5674                    Alarms in Syslog                October 2009


   o  moreSevere

   o  noChange

   o  lessSevere

3.6.  resourceURI

   If the "alarm" SD-ID is included, the "resourceURI" SD-PARAM SHOULD
   be included.  This item uniquely identifies the resource under alarm.

   The value of this field MUST conform to the URI definition in
   [RFC3986] and its updates.  In the case of an SNMP resource, the
   syntax in [RFC4088] MUST be used and "resourceURI" must point to the
   same resource as alarmActiveResourceId [RFC3877] for this alarm.

   Both the "resource" and the "resourceURI" parameters point at the
   resource experiencing the alarm, but the "resourceURI" has syntactic
   constraint requiring it to be a URI.  This makes it easy to correlate
   this syslog alarm with any alarms that are received via other
   protocols, such as SNMP, or to use SNMP or other protocols to get
   additional information about this resource.

4.  Examples

   Example 1 - Mandatory Alarm Information

   <165>1 2003-10-11T22:14:15.003Z mymachine.example.com
   evntslog - ID47 [exampleSDID@32473 iut="3" eventSource=
   "Application" eventID="1011"][alarm resource="su root"
   probableCause="unauthorizedAccessAttempt"
   perceivedSeverity="major"]
   BOMAn application event log entry...

   In this example, extended from [RFC5424], the VERSION is 1 and the
   Facility has the value of 4.  The severity is 2.  The message was
   created on 11 October 2003 at 10:14:15pm UTC, 3 milliseconds into the
   next second.  The message originated from a host that identifies
   itself as "mymachine.example.com".  The APP-NAME is "evntslog" and
   the PROCID is unknown.  The MSGID is "ID47".  We have included both
   the structured data from the original example, a single element with
   the value "[exampleSDID@32473 iut="3" eventSource="Application"
   eventID="1011"]", and a new element with the alarm information
   defined in this memo.  The alarm SD-ID contains the mandatory SD-
   PARAMS of resource, probableCause, and preceivedSeverity.  The MSG
   itself is "An application event log entry..."  The BOM at the
   beginning of the MSG indicates UTF-8 encoding.




Chisholm & Gerhards         Standards Track                     [Page 5]


RFC 5674                    Alarms in Syslog                October 2009


   Example 2 - Additional Alarm Information

   <165>1 2004-11-10T20:15:15.003Z mymachine.example.com
   evntslog - ID48 [alarm resource="interface 42"
   probableCause="unauthorizedAccessAttempt"
   perceivedSeverity="major"
   eventType="communicationsAlarm"
   resourceURI="snmp://example.com//1.3.6.1.2.1.2.2.1.1.42"]

   In this example, we include two optional alarm fields: eventType and
   resourceURI.

5.  Security Considerations

   In addition to the general syslog security considerations discussed
   in [RFC5424], the information contained with alarms may provide
   hackers with helpful information about parts of the system currently
   experiencing stress as well as general information about the system,
   such as inventory.

   Users should not have access to information in alarms that their
   normal access permissions would not permit if the information were
   accessed in another manner.

   There is no standardized access control model for syslog, and hence
   the ability to filter alarms based on a notion of a receiver identity
   is, at best, implementation specific.

6.  IANA Considerations

   IANA registered the syslog Structured Data ID values and PARAM-NAMEs
   shown below:

   SD-ID              PARAM-NAME
   alarm                                 OPTIONAL
                      resource           MANDATORY
                      probableCause      MANDATORY
                      perceivedSeverity  MANDATORY
                      eventType          OPTIONAL
                      trendIndication    OPTIONAL
                      resourceURI        OPTIONAL

7.  Acknowledgments

   Thanks to members of the Syslog and OPSAWG work group who contributed
   to this specification.  We'd also like to thank Juergen
   Schoenwaelder, Dave Harrington, Wes Hardaker, and Randy Presuhn for
   their reviews.



Chisholm & Gerhards         Standards Track                     [Page 6]


RFC 5674                    Alarms in Syslog                October 2009


8.  References

8.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC3877]  Chisholm, S. and D. Romascanu, "Alarm Management
              Information Base (MIB)", RFC 3877, September 2004.

   [RFC3986]  Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
              Resource Identifier (URI): Generic Syntax", STD 66,
              RFC 3986, January 2005.

   [RFC4088]  Black, D., McCloghrie, K., and J. Schoenwaelder, "Uniform
              Resource Identifier (URI) Scheme for the Simple Network
              Management Protocol (SNMP)", RFC 4088, June 2005.

   [RFC5424]  Gerhards, R., "The Syslog Protocol", RFC 5424, March 2009.

8.2.  Informative References

   [X.733]    ITU-T, "Information Technology - Open Systems
              Interconnection - System Management: Alarm Reporting
              Function", ITU-T X.733, 1992.

   [X.736]    ITU-T, "Information Technology - Open Systems
              Interconnection - System Management: Security Alarm
              Reporting Function", ITU-T X.736, 1992.

Authors' Addresses

   Sharon Chisholm
   Nortel
   3500 Carling Ave
   Nepean, Ontario  K2H 8E9
   Canada

   EMail: schishol@nortel.com


   Rainer Gerhards
   Adiscon GmbH
   Mozartstrasse 21
   Grossrinderfeld, BW  97950
   Germany

   EMail: rgerhards@adiscon.com



Chisholm & Gerhards         Standards Track                     [Page 7]

mirror server hosted at Truenetwork, Russian Federation.