Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support syslog driver for nerdctl #1377

Merged
merged 1 commit into from
Sep 27, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
33 changes: 32 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -493,7 +493,7 @@ Metadata flags:
- :nerd_face: `--pidfile`: file path to write the task's pid. The CLI syntax conforms to Podman convention.

Logging flags:
- :whale: `--log-driver=(json-file|journald|fluentd)`: Logging driver for the container (default `json-file`).
- :whale: `--log-driver=(json-file|journald|fluentd|syslog)`: Logging driver for the container (default `json-file`).
- :whale: `--log-driver=json-file`: The logs are formatted as JSON. The default logging driver for nerdctl.
- The `json-file` logging driver supports the following logging options:
- :whale: `--log-opt=max-size=<MAX-SIZE>`: The maximum size of the log before it is rolled. A positive integer plus a modifier representing the unit of measure (k, m, or g). Defaults to unlimited.
Expand All @@ -510,6 +510,37 @@ Logging flags:
- :whale: `--log-opt=fluentd-sub-second-precision=<true|false>`: Enable sub-second precision for fluentd. The default value is false.
- :nerd_face: `--log-opt=fluentd-async-reconnect-interval=<1s|1ms>`: The time to wait before retrying to reconnect to fluentd. The default value is 0s.
- :nerd_face: `--log-opt=fluentd-request-ack=<true|false>`: Enable request ack for fluentd. The default value is false.
- :whale: `--log-driver=syslog`: Writes log messages to `syslog`. The
`syslog` daemon must be running on either the host machine or remote.
- The `syslog` logging driver supports the following logging options:
- :whale: `--log-opt=syslog-address=<ADDRESS>`: The address of an
external `syslog` server. The URI specifier may be
`tcp|udp|tcp+tls]://host:port`, `unix://path`, or `unixgram://path`.
If the transport is `tcp`, `udp`, or `tcp+tls`, the default port is
`514`.
- :whale: `--log-opt=syslog-facility=<FACILITY>`: The `syslog` facility to
use. Can be the number or name for any valid syslog facility. See the
[syslog documentation](https://www.rfc-editor.org/rfc/rfc5424#section-6.2.1).
- :whale: `--log-opt=syslog-tls-ca-cert=<VALUE>`: The absolute path to
the trust certificates signed by the CA. **Ignored if the address
protocol is not `tcp+tls`**.
- :whale: `--log-opt=syslog-tls-cert=<VALUE>`: The absolute path to
the TLS certificate file. **Ignored if the address protocol is not
`tcp+tls`**.
- :whale: `--log-opt=syslog-tls-key=<VALUE>`:The absolute path to
the TLS key file. **Ignored if the address protocol is not `tcp+tls`**.
- :whale: `--log-opt=syslog-tls-skip-verify=<VALUE>`: If set to `true`,
TLS verification is skipped when connecting to the daemon.
**Ignored if the address protocol is not `tcp+tls`**.
- :whale: `--log-opt=syslog-format=<VALUE>`: The `syslog` message format
to use. If not specified the local UNIX syslog format is used,
without a specified hostname. Specify `rfc3164` for the RFC-3164
compatible format, `rfc5424` for RFC-5424 compatible format, or
`rfc5424micro` for RFC-5424 compatible format with microsecond
timestamp resolution.
- :whale: `--log-opt=tag=<VALUE>`: A string that is appended to the
`APP-NAME` in the `syslog` message. By default, nerdctl uses the first
12 characters of the container ID to tag log messages.
- :nerd_face: Accepts a LogURI which is a containerd shim logger. A scheme must be specified for the URI. Example: `nerdctl run -d --log-driver binary:///usr/bin/ctr-journald-shim docker.io/library/hello-world:latest`. An implementation of shim logger can be found at (https://github.com/containerd/containerd/tree/dbef1d56d7ebc05bc4553d72c419ed5ce025b05d/runtime/v2#logging)


Expand Down
253 changes: 253 additions & 0 deletions cmd/nerdctl/run_log_driver_syslog_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,253 @@
/*
Copyright The containerd Authors.

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

package main

import (
"fmt"
"os"
"runtime"
"strings"
"testing"
"time"

"github.com/containerd/nerdctl/pkg/rootlessutil"
"github.com/containerd/nerdctl/pkg/testutil"
"github.com/containerd/nerdctl/pkg/testutil/testca"
"github.com/containerd/nerdctl/pkg/testutil/testsyslog"
syslog "github.com/yuchanns/srslog"
)

func runSyslogTest(t *testing.T, networks []string, syslogFacilities map[string]syslog.Priority, fmtValidFuncs map[string]func(string, string, string, string, syslog.Priority, bool) error) {
base := testutil.NewBase(t)
base.Cmd("pull", testutil.CommonImage).AssertOK()
hostname, err := os.Hostname()
if err != nil {
t.Fatalf("Error retrieving hostname")
}
ca := testca.New(base.T)
cert := ca.NewCert("127.0.0.1")
t.Cleanup(func() {
cert.Close()
ca.Close()
})
rI := 0
for _, network := range networks {
for rFK, rFV := range syslogFacilities {
fPriV := rFV
// test both string and number facility
for _, fPriK := range []string{rFK, fmt.Sprintf("%d", int(fPriV)>>3)} {
for fmtK, fmtValidFunc := range fmtValidFuncs {
fmtKT := "empty"
if fmtK != "" {
fmtKT = fmtK
}
subTestName := fmt.Sprintf("%s_%s_%s", strings.ReplaceAll(network, "+", "_"), fPriK, fmtKT)
i := rI
rI++
t.Run(subTestName, func(t *testing.T) {
tID := testutil.Identifier(t)
tag := tID + "_syslog_driver"
msg := "hello, " + tID + "_syslog_driver"
if !testsyslog.TestableNetwork(network) {
if rootlessutil.IsRootless() {
t.Skipf("skipping on %s/%s; '%s' for rootless containers are not supported", runtime.GOOS, runtime.GOARCH, network)
}
t.Skipf("skipping on %s/%s; '%s' is not supported", runtime.GOOS, runtime.GOARCH, network)
}
testContainerName := fmt.Sprintf("%s-%d-%s", tID, i, fPriK)
done := make(chan string)
addr, closer := testsyslog.StartServer(network, "", done, cert)
args := []string{
"run",
"-d",
"--name",
testContainerName,
"--restart=no",
"--log-driver=syslog",
"--log-opt=syslog-facility=" + fPriK,
"--log-opt=tag=" + tag,
"--log-opt=syslog-format=" + fmtK,
"--log-opt=syslog-address=" + fmt.Sprintf("%s://%s", network, addr),
}
if network == "tcp+tls" {
args = append(args,
"--log-opt=syslog-tls-cert="+cert.CertPath,
"--log-opt=syslog-tls-key="+cert.KeyPath,
"--log-opt=syslog-tls-ca-cert="+ca.CertPath,
)
}
args = append(args, testutil.CommonImage, "echo", msg)
base.Cmd(args...).AssertOK()
t.Cleanup(func() {
base.Cmd("rm", "-f", testContainerName).AssertOK()
})
defer closer.Close()
defer close(done)
select {
case rcvd := <-done:
if err := fmtValidFunc(rcvd, msg, tag, hostname, fPriV, network == "tcp+tls"); err != nil {
t.Error(err)
}
case <-time.Tick(time.Second * 3):
t.Errorf("timeout with %s", subTestName)
}
})
}
}
}
}
}

func TestSyslogNetwork(t *testing.T) {
var syslogFacilities = map[string]syslog.Priority{
"user": syslog.LOG_USER,
}

networks := []string{
"udp",
"tcp",
"tcp+tls",
"unix",
"unixgram",
}
fmtValidFuncs := map[string]func(string, string, string, string, syslog.Priority, bool) error{
"rfc5424": func(rcvd, msg, tag, hostname string, pri syslog.Priority, isTLS bool) error {
var parsedHostname, timestamp string
var length, version, pid int
if !isTLS {
exp := fmt.Sprintf("<%d>", pri|syslog.LOG_INFO) + "%d %s %s " + tag + " %d " + tag + " - " + msg + "\n"
if n, err := fmt.Sscanf(rcvd, exp, &version, &timestamp, &parsedHostname, &pid); n != 4 || err != nil || hostname != parsedHostname {
return fmt.Errorf("s.Info() = '%q', didn't match '%q' (%d %s)", rcvd, exp, n, err)
}
} else {
exp := "%d " + fmt.Sprintf("<%d>", pri|syslog.LOG_INFO) + "%d %s %s " + tag + " %d " + tag + " - " + msg + "\n"
if n, err := fmt.Sscanf(rcvd, exp, &length, &version, &timestamp, &parsedHostname, &pid); n != 5 || err != nil || hostname != parsedHostname {
return fmt.Errorf("s.Info() = '%q', didn't match '%q' (%d %s)", rcvd, exp, n, err)
}
}
return nil
},
}
runSyslogTest(t, networks, syslogFacilities, fmtValidFuncs)
}

func TestSyslogFacilities(t *testing.T) {
var syslogFacilities = map[string]syslog.Priority{
"kern": syslog.LOG_KERN,
"user": syslog.LOG_USER,
"mail": syslog.LOG_MAIL,
"daemon": syslog.LOG_DAEMON,
"auth": syslog.LOG_AUTH,
"syslog": syslog.LOG_SYSLOG,
"lpr": syslog.LOG_LPR,
"news": syslog.LOG_NEWS,
"uucp": syslog.LOG_UUCP,
"cron": syslog.LOG_CRON,
"authpriv": syslog.LOG_AUTHPRIV,
"ftp": syslog.LOG_FTP,
"local0": syslog.LOG_LOCAL0,
"local1": syslog.LOG_LOCAL1,
"local2": syslog.LOG_LOCAL2,
"local3": syslog.LOG_LOCAL3,
"local4": syslog.LOG_LOCAL4,
"local5": syslog.LOG_LOCAL5,
"local6": syslog.LOG_LOCAL6,
"local7": syslog.LOG_LOCAL7,
}

networks := []string{"unix"}
fmtValidFuncs := map[string]func(string, string, string, string, syslog.Priority, bool) error{
"rfc5424": func(rcvd, msg, tag, hostname string, pri syslog.Priority, isTLS bool) error {
var parsedHostname, timestamp string
var length, version, pid int
if !isTLS {
exp := fmt.Sprintf("<%d>", pri|syslog.LOG_INFO) + "%d %s %s " + tag + " %d " + tag + " - " + msg + "\n"
if n, err := fmt.Sscanf(rcvd, exp, &version, &timestamp, &parsedHostname, &pid); n != 4 || err != nil || hostname != parsedHostname {
return fmt.Errorf("s.Info() = '%q', didn't match '%q' (%d %s)", rcvd, exp, n, err)
}
} else {
exp := "%d " + fmt.Sprintf("<%d>", pri|syslog.LOG_INFO) + "%d %s %s " + tag + " %d " + tag + " - " + msg + "\n"
if n, err := fmt.Sscanf(rcvd, exp, &length, &version, &timestamp, &parsedHostname, &pid); n != 5 || err != nil || hostname != parsedHostname {
return fmt.Errorf("s.Info() = '%q', didn't match '%q' (%d %s)", rcvd, exp, n, err)
}
}
return nil
},
}
runSyslogTest(t, networks, syslogFacilities, fmtValidFuncs)
}

func TestSyslogFormat(t *testing.T) {
var syslogFacilities = map[string]syslog.Priority{
"user": syslog.LOG_USER,
}

networks := []string{"unix"}
fmtValidFuncs := map[string]func(string, string, string, string, syslog.Priority, bool) error{
"": func(rcvd, msg, tag, hostname string, pri syslog.Priority, isSTLS bool) error {
var mon, day, hrs string
var pid int
exp := fmt.Sprintf("<%d>", pri|syslog.LOG_INFO) + "%s %s %s " + tag + "[%d]: " + msg + "\n"
if n, err := fmt.Sscanf(rcvd, exp, &mon, &day, &hrs, &pid); n != 4 || err != nil {
return fmt.Errorf("s.Info() = '%q', didn't match '%q' (%d %s)", rcvd, exp, n, err)
}
return nil
},
"rfc3164": func(rcvd, msg, tag, hostname string, pri syslog.Priority, isTLS bool) error {
var parsedHostname, mon, day, hrs string
var pid int
exp := fmt.Sprintf("<%d>", pri|syslog.LOG_INFO) + "%s %s %s %s " + tag + "[%d]: " + msg + "\n"
if n, err := fmt.Sscanf(rcvd, exp, &mon, &day, &hrs, &parsedHostname, &pid); n != 5 || err != nil || hostname != parsedHostname {
return fmt.Errorf("s.Info() = '%q', didn't match '%q' (%d %s)", rcvd, exp, n, err)
}
return nil
},
"rfc5424": func(rcvd, msg, tag, hostname string, pri syslog.Priority, isTLS bool) error {
var parsedHostname, timestamp string
var length, version, pid int
if !isTLS {
exp := fmt.Sprintf("<%d>", pri|syslog.LOG_INFO) + "%d %s %s " + tag + " %d " + tag + " - " + msg + "\n"
if n, err := fmt.Sscanf(rcvd, exp, &version, &timestamp, &parsedHostname, &pid); n != 4 || err != nil || hostname != parsedHostname {
return fmt.Errorf("s.Info() = '%q', didn't match '%q' (%d %s)", rcvd, exp, n, err)
}
} else {
exp := "%d " + fmt.Sprintf("<%d>", pri|syslog.LOG_INFO) + "%d %s %s " + tag + " %d " + tag + " - " + msg + "\n"
if n, err := fmt.Sscanf(rcvd, exp, &length, &version, &timestamp, &parsedHostname, &pid); n != 5 || err != nil || hostname != parsedHostname {
return fmt.Errorf("s.Info() = '%q', didn't match '%q' (%d %s)", rcvd, exp, n, err)
}
}
return nil
},
"rfc5424micro": func(rcvd, msg, tag, hostname string, pri syslog.Priority, isTLS bool) error {
var parsedHostname, timestamp string
var length, version, pid int
if !isTLS {
exp := fmt.Sprintf("<%d>", pri|syslog.LOG_INFO) + "%d %s %s " + tag + " %d " + tag + " - " + msg + "\n"
if n, err := fmt.Sscanf(rcvd, exp, &version, &timestamp, &parsedHostname, &pid); n != 4 || err != nil || hostname != parsedHostname {
return fmt.Errorf("s.Info() = '%q', didn't match '%q' (%d %s)", rcvd, exp, n, err)
}
} else {
exp := "%d " + fmt.Sprintf("<%d>", pri|syslog.LOG_INFO) + "%d %s %s " + tag + " %d " + tag + " - " + msg + "\n"
if n, err := fmt.Sscanf(rcvd, exp, &length, &version, &timestamp, &parsedHostname, &pid); n != 5 || err != nil || hostname != parsedHostname {
return fmt.Errorf("s.Info() = '%q', didn't match '%q' (%d %s)", rcvd, exp, n, err)
}
}
return nil
},
}
runSyslogTest(t, networks, syslogFacilities, fmtValidFuncs)
}
1 change: 1 addition & 0 deletions go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,7 @@ require (
github.com/tidwall/gjson v1.14.3
github.com/vishvananda/netlink v1.2.1-beta.2
github.com/vishvananda/netns v0.0.0-20211101163701-50045581ed74
github.com/yuchanns/srslog v1.1.0
golang.org/x/crypto v0.0.0-20220525230936-793ad666bf5e
golang.org/x/net v0.0.0-20220615171555-694bf12d69de
golang.org/x/sync v0.0.0-20220722155255-886fb9371eb4
Expand Down
2 changes: 2 additions & 0 deletions go.sum
Original file line number Diff line number Diff line change
Expand Up @@ -1510,6 +1510,8 @@ github.com/xeipuuv/gojsonschema v1.2.0 h1:LhYJRs+L4fBtjZUfuSZIKGeVu0QRy8e5Xi7D17
github.com/xeipuuv/gojsonschema v1.2.0/go.mod h1:anYRn/JVcOK2ZgGU+IjEV4nwlhoK5sQluxsYJ78Id3Y=
github.com/xiang90/probing v0.0.0-20190116061207-43a291ad63a2/go.mod h1:UETIi67q53MR2AWcXfiuqkDkRtnGDLqkBTpCHuJHxtU=
github.com/xordataexchange/crypt v0.0.3-0.20170626215501-b2862e3d0a77/go.mod h1:aYKd//L2LvnjZzWKhF00oedf4jCCReLcmhLdhm1A27Q=
github.com/yuchanns/srslog v1.1.0 h1:CEm97Xxxd8XpJThE0gc/XsqUGgPufh5u5MUjC27/KOk=
github.com/yuchanns/srslog v1.1.0/go.mod h1:HsLjdv3XV02C3kgBW2bTyW6i88OQE+VYJZIxrPKPPak=
github.com/yuin/goldmark v1.1.25/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
github.com/yuin/goldmark v1.1.32/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
Expand Down
3 changes: 3 additions & 0 deletions pkg/logging/logging.go
Original file line number Diff line number Diff line change
Expand Up @@ -87,6 +87,9 @@ func init() {
RegisterDriver("fluentd", func(opts map[string]string) (Driver, error) {
return &FluentdLogger{Opts: opts}, nil
}, FluentdLogOptsValidate)
RegisterDriver("syslog", func(opts map[string]string) (Driver, error) {
return &SyslogLogger{Opts: opts}, nil
}, SyslogOptsValidate)
}

// Main is the entrypoint for the containerd runtime v2 logging plugin mode.
Expand Down
Loading