%ents; ]>
Event Logging over XMPP This specification provides a common framework for sending events to event logs over XMPP networks. &LEGALNOTICE; 0337 Experimental Standards Track Standards Council XMPP Core XEP-0001 eventlogging &peterwaher; 0.2 2015-11-09 pw

Updated contact information.

Updated example JIDs to example.org

0.1 2014-01-08 psa

Initial published version approved by the XMPP Council.

0.0.2 2013-12-02 pw

Addressed pre-publication feedback from the XMPP Council.

0.0.1 2013-11-10 pw

First draft.

This XEP provides a common framework for sending events over an XMPP network. These events can then be logged in event logs or analyzed by network monitors to analyze the status or operation of the network and its participants.

The basic principle behind interoperable event logging over XMPP is the definition of a common XML element defining the event. This payload is then sent in a normal message stanza (i.e. with type='normal') to the recipient. The recipient in turn, if it understands the payload, can choose to store it in an event log, forward it or analyze it accordingly.

There are various event log packages available, but none yet defined for XMPP or using a well-defined and known XML format. Therefore, this document defines such an XML format. This format is able to store Syslog RFC-5424: The Syslog Protocol <https://tools.ietf.org/html/rfc5424> compliant event information, even though the Syslog event model has been somewhat extended. Also, in the use of the facility attribute, this XEP does not have the same restrictions compared to the Syslog specification.

This document does not restrict the use of event messages to directed message stanzas alone. It may be envisioned that some would like to publish event information through &xep0060; or other mechanisms. It is not in the scope of this document to specify such transports however, as it only deals with direct messages, but a brief list is provided in the Security Considerations section.

The following table lists common terms and corresponding descriptions.

Event
A piece of information describing an event in time.
Event ID
An attribute providing a machine readable ID to the type of event in question without having to parse the message text itself.
Event Level
Provides an additional level on the previous classification (Minor, Medium, Major).
Event Type
Coarse classification of the event (Debug, Informational, Notice, Warning, Error, Critical, Alert, Emergency).
Facility
What type of device, server, application, etc., is sending the message.
Message
A (human readable) text message describing what has occurred.
Module
The module reporting the event. Larger software packages are often divided into modules. Keeping track of which modules report which events can be useful when analyzing system performance.
Object
The object to which the event message refers to, on which the current action is performed.
Stack Trace
Exact position in the code from which the event was reported or where the error occurred. Reporting it in a separate attribute unclutters the message, and removes the need to define custom tags.
Subject
The subject causing the event to take place or performing the action (for instance, user, process, etc.)
Tag
A custom tag or parameter attached to an event. Each tag has a name and a value and an optional data type.
Timestamp
When the event occurred.

The following example shows how to send a simple event using a normal message to an event log. Only two parameters are required: The timestamp of the message goes into the timestamp attribute, and the actual messages goes into a child element named message. This event will be treated as a Minor Informational event by the recipient.

Something happened. ]]>

The following example shows how to send a multi-line event.

10 objects deleted: Object 1 ... Object 10 ]]>

The following example shows how an event message can be categorized with an event type and level.

Low on memory. ]]>

The following example shows how an event message can be further enhanced by providing object and subject information.

Object deleted. ]]>

The following example shows how to send an event message with an event ID that can be singled out later to be analyzed by administrators, for instance.

User attempted to login but provided incorrect password. ]]>

The following example shows how to tag an event using custom information in a way that is easy to interpret and process.

Current resources. ]]> Note: Any tag elements must come after the message element.

The following example shows how module information can be provided in events to more easily be able to single out information relating to the same application running on different machines.

Something horrible happened. ]]>

The following example shows how to send a debug message with a stack trace, module and custom information.

Something is rotten in the state of Denmark. File1, Line1, ... File2, Line2, ... ... ]]> Note: Any stackTrace element must come after the message element and any tag elements.

The following example shows how multiple events can be sent in a single message. The receiver should interpret this as two different events having been received.

Something happened. Something else happened. ]]>

If an entity supports the reception of events as specified herein, it MUST advertise that fact by returning a feature of "urn:xmpp:eventlog" in response to &xep0030; information requests.

]]> ... ... ]]>

In order for an application to determine whether an entity supports this protocol, where possible it SHOULD use the dynamic, presence-based profile of service discovery defined in &xep0115;. However, if an application has not received entity capabilities information from an entity, it SHOULD use explicit service discovery instead.

The following table lists possible event types that can be used. If none is specified for an event, it is assumed that the event is Informational. It is largely based on the severity levels of Syslog.

Type Description
Debug Developers can ask applications to send debug messages during development or testing to more easily see what happens in a system.
Informational An informational message describing a normal event.
Notice Represents a significant condition or change that administrators should be aware of.
Warning A warning condition. If not taken into account, the condition could turn into an error.
Error An error condition. A condition has been detected that is considered to be an error or a fault.
Critical A critical condition. An error so great that it could escalate into something graver if not addressed.
Alert An alert condition. Action must be taken immediately.
Emergency System is unusable.

Given an Event Type, an event level can provide additional information about the extent or importance of the event (a second dimension).

Level Description
Minor Minor events, concerning normal operating procedures.
Medium Medium events.
Major More substantial events or events that are affecting larger parts of the system.

Using Event IDs, the application can provide a machine understandable classification of the event. Examples could be "Login"-events, "ConnectionProblem"-events, etc. It is easier to group, parse or interpret events and their tags if you know what type of event it is. Event IDs are manufacturer specific, and only provide a means to more easily extract subsets of events for processing without having to parse message texts (which should be allowed to be localizable).

Note: To avoid problems when running applications using different locales, event IDs should never be localized.

An event is often linked to an object, e.g. on which object an action was performed, or which object is reporting a condition. The object field permits the tagging of objects in a common way. It is later easy to extract all events relating to a specific object by using this attribute.

An event is often also linked to a subject, i.e. who or what performed a given action resulting in the event or condition. The subject field permits the tagging of subjects in a common way. It is later easy to extract all events relating to a specific subject by using this attribute.

Facility can be either a facility in the network sense or in the system sense. This document does not restrict its use to the possible choices defined by other protocols such as Syslog, and leaves it open. However, it is left as a special attribute since it is important in monitoring applications.

A module is part of a larger software package. Using the module attribute makes it easier to attribute events to specific parts of a distributed application and analyze them separately.

Stack Traces can be important information to developers and correlate events to actual locations in the code that generated the event. This document does not specify any particular format for stack traces.

Any event can have a custom set of tags attached to it. A tag is required to have a name and a value. It can also optionally specify a data type. Data types are specified using Qualified Names (QNames). If possible, they should adhere to the list of Data Forms Validation Datatypes Data Forms Validation Datatypes <http://xmpp.org/registrar/xdv-datatypes.html> that is maintained by the XMPP Registrar.

Note: To avoid problems when running applications using different locales, tag names should never be localized.

If persisting received events in a database, care should be taken if normalized tables are used for storage of tags names and values, event IDs, objects, subjects, facilities and modules. If this is the case, the receiver should look for types of values that can be incompatible with normalized tables (such as floating point values or numbers in general, GUIDs, resource names in JIDs etc.) and replace them with some descriptive text and append the corresponding value in the message text instead. This to avoid problems with indexes in databases because of devices implemented by third parties.

It is still valid to send information like sequence numbers, unique GUIDs, measurements, resource names in JIDs etc. in tag names and values, but such information should be avoided in event IDs, objects, subjects, facilities and modules, as they can cause problems further down the line.

The messag text and stack trace parts of an event message lie as simple type valued child elements (xs:string). This allows for simple encoding of multi-line text information into these two parameters. However, do not indent new lines when serializing multi-line text to these parameters to make the XML look nicer. The recipient cannot know what whitespace is indenting and what is part of the actual information.

All timestamps and dateTime values use the XML data type xs:dateTime to specify values. These values include a date, an optional time and an optional time zone.

Note: If time zone is not available, it is supposed to be undefined. The recipient of an event message without time zone information should assume the sender has the same time zone as the received, if not explicitly configured otherwise on the recipient side.

If devices report time zone, this information should be propagated throughout the system. Otherwise, comparing timestamps from different time zones will be impossible.

Event messages SHOULD contain an xml:lang attribute on the message stanza to specify the language used in message texts, etc. If language information is not available, e.g. if relaying messages are not created by the device itself, the xml:lang attribute can be omitted.

Even though this document permits zero-configuration of devices to event logs, this might not always be the best option. Event information might be sensitive and should not be sent to anybody just because they support the event log feature as defined in this document.

Never log information that should be handled securely or encrypted, such as passwords.

The following subsections lists different transport options together with security considerations for each one.

This document explicitly describes how to send event messages in direct messages. If sensitive information is being sent, end-to-end encryption should be considered.

Event messages could be published using Publish-Subscribe. But, even more care should be taken to log only information that can be published openly. If there's risk for sensitive information to be logged, the publish/subscribe pattern should be avoided.

This document requires no interaction with &IANA;.

The protocol schema needs to be added to the list of XMPP protocol schemas.

]]>

Thanks in alphabetical order to Dave Cridland, Joachim Lindborg, Karin Forsell, Ludovic Bocquet, Markus Kohlhase, Matthew Wild, Mike Taylor, Philipp Hancke, Robert Kosten, Steffen Larsen, and Yusuke DOI for all valuable feedback.