imuxsock: Unix Socket Input Module¶
Module Name: |
imuxsock |
Author: |
Purpose¶
This module provides the ability to accept syslog messages from applications running on the local system via Unix sockets. Most importantly, this is the mechanism by which the syslog(3) call delivers syslog messages to rsyslogd.
See also
Notable Features¶
Configuration Parameters¶
Note
Parameter names are case-insensitive; camelCase is recommended for readability.
Module Parameters¶
Warning
When running under systemd, many “sysSock.” parameters are ignored. See parameter descriptions and the Coexistence with systemd section for details.
Parameter |
Summary |
---|---|
Ignores timestamps included in messages from the system log socket. |
|
Ignores messages that originate from the same rsyslogd instance. |
|
Enables listening on the system log socket or the path set by SysSock.Name. |
|
Selects an alternate log socket instead of the default |
|
Applies flow control to the system log socket. |
|
Obtains the logged PID from the log socket itself. |
|
Sets the rate-limiting interval in seconds for the system log socket. |
|
Sets the rate-limiting burst size in messages for the system log socket. |
|
Specifies which message severity levels are rate-limited on the system log socket. |
|
Obtains message time from the system instead of the message content. |
|
Enables annotation or trusted properties on the system log socket. |
|
Turns trusted properties into JSON fields when annotation is enabled. |
|
Controls whether the system socket is unlinked and recreated on start and stop. |
|
Uses a specialized parser for the typical system log socket format. |
|
Expects hostnames on the system log socket when special parsing is disabled. |
Input Parameters¶
Parameter |
Summary |
---|---|
Binds a specified ruleset to the input instead of the default ruleset. |
|
Ignores timestamps included in messages from this input. |
|
Suppresses messages that originated from the same rsyslog instance. |
|
Enables flow control on this input’s socket. |
|
Sets the rate-limiting interval in seconds for this input. |
|
Sets the rate-limiting burst size in messages for this input. |
|
Defines the severity level at or below which messages are rate-limited. |
|
Obtains the process ID from the log socket instead of the message. |
|
Takes message timestamps from the system instead of the message itself. |
|
Creates missing directories for the specified socket path. |
|
Adds an additional UNIX socket for this input to listen on. |
|
Overrides the hostname used inside messages from this input. |
|
Enables annotation and trusted properties for this input. |
|
Turns annotation data into JSON fields when annotation is enabled. |
|
Controls whether the socket is unlinked on open and close. |
|
Selects the special parser tailored for default UNIX socket format. |
|
Expects hostnames in messages when the special parser is disabled. |
Input rate limiting¶
rsyslog supports (optional) input rate limiting to guard against the problems
of a wild running logging process. If more than
SysSock.RateLimit.Interval
* SysSock.RateLimit.Burst
log messages
are emitted from the same process, those messages with
SysSock.RateLimit.Severity
or lower will be dropped. It is not possible
to recover anything about these messages, but imuxsock will tell you how
many it has dropped once the interval has expired AND the next message is
logged. Rate-limiting depends on SCM\_CREDENTIALS
. If the platform does
not support this socket option, rate limiting is turned off. If multiple
sockets are configured, rate limiting works independently on each of
them (that should be what you usually expect).
The same functionality is available for additional log sockets, in which case the config statements just use the prefix RateLimit… but otherwise works exactly the same. When working with severities, please keep in mind that higher severity numbers mean lower severity and configure things accordingly. To turn off rate limiting, set the interval to zero.
Added in version 5.7.1.
Trusted (syslog) properties¶
rsyslog can annotate messages from system log sockets (via imuxsock) with so-called Trusted syslog properties, (or just “Trusted Properties” for short). These are message properties not provided by the logging client application itself, but rather obtained from the system. As such, they can not be faked by the user application and are trusted in this sense. This feature is based on a similar idea introduced in systemd.
This feature requires a recent enough Linux Kernel and access to
the /proc
file system. In other words, this may not work on all
platforms and may not work fully when privileges are dropped (depending
on how they are dropped). Note that trusted properties can be very
useful, but also typically cause the message to grow rather large. Also,
the format of log messages is changed by adding the trusted properties at
the end. For these reasons, the feature is not enabled by default.
If you want to use it, you must turn it on (via
SysSock.Annotate
and Annotate
).
Added in version 5.9.4.
See also
Flow-control of Unix log sockets¶
If processing queues fill up, the unix socket reader is blocked for a short while to help prevent overrunning the queues. If the queues are overrun, this may cause excessive disk-io and impact performance.
While turning on flow control for many systems does not hurt, it can lead to a very unresponsive system and as such is disabled by default.
This means that log records are placed as quickly as possible into the
processing queues. If you would like to have flow control, you
need to enable it via the SysSock.FlowControl
and FlowControl
config
directives. Just make sure you have thought about the implications and have
tested the change on a non-production system first.
Control over application timestamps¶
Application timestamps are ignored by default. This is needed, as some
programs (e.g. sshd) log with inconsistent timezone information, what
messes up the local logs (which by default don’t even contain time zone
information). This seems to be consistent with what sysklogd has done for
many years. Alternate behaviour may be desirable if gateway-like processes
send messages via the local log slot. In that case, it can be enabled via
the SysSock.IgnoreTimestamp
and IgnoreTimestamp
config directives.
Coexistence with systemd¶
Rsyslog should by default be configured for systemd support on all platforms that usually run systemd (which means most Linux distributions, but not, for example, Solaris).
Rsyslog is able to coexist with systemd with minimal changes on the part of the
local system administrator. While the systemd journal
now assumes full
control of the local /dev/log
system log socket, systemd provides
access to logging data via the /run/systemd/journal/syslog
log socket.
This log socket is provided by the syslog.socket
file that is shipped
with systemd.
The imuxsock module can still be used in this setup and provides superior performance over imjournal, the alternative journal input module.
Note
It must be noted, however, that the journal tends to drop messages when it becomes busy instead of forwarding them to the system log socket. This is because the journal uses an async log socket interface for forwarding instead of the traditional synchronous one.
Added in version 8.32.0: rsyslog emits an informational message noting the system log socket provided by systemd.
Handling of sockets¶
What follows is a brief description of the process rsyslog takes to determine what system socket to use, which sockets rsyslog should listen on, whether the sockets should be created and how rsyslog should handle the sockets when shutting down.
Step 1: Select name of system socket¶
If the user has not explicitly chosen to set
SysSock.Use="off"
then the default listener socket (aka, “system log socket” or simply “system socket”) name is set to/dev/log
. Otherwise, if the user has explicitly setSysSock.Use="off"
, then rsyslog will not listen on/dev/log
OR any socket defined by theSysSock.Name
parameter and the rest of this section does not apply.If the user has specified
sysSock.Name="/path/to/custom/socket"
(and not explicitly setSysSock.Use="off"
), then the default listener socket name is overwritten with/path/to/custom/socket
.Otherwise, if rsyslog is running under systemd AND
/run/systemd/journal/syslog
exists, (AND the user has not explicitly setSysSock.Use="off"
) then the default listener socket name is overwritten with/run/systemd/journal/syslog
.
Step 2: Listen on specified sockets¶
Note
This is true for all sockets, be it system socket or not. But if
SysSock.Use="off"
, the system socket will not be listened on.
rsyslog evaluates the list of sockets it has been asked to activate:
the system log socket (if still enabled after completion of the last section)
any custom inputs defined by the user
and then checks to see if it has been passed in via systemd (name is checked). If it was passed in via systemd, the socket is used as-is (e.g., not recreated upon rsyslog startup), otherwise if not passed in via systemd the log socket is unlinked, created and opened.
Step 3: Shutdown log sockets¶
Note
This is true for all sockets, be it system socket or not.
Upon shutdown, rsyslog processes each socket it is listening on and evaluates it. If the socket was originally passed in via systemd (name is checked), then rsyslog does nothing with the socket (systemd maintains the socket).
If the socket was not passed in via systemd AND the configuration permits rsyslog to do so (the default setting), rsyslog will unlink/remove the log socket. If not permitted to do so (the user specified otherwise), then rsyslog will not unlink the log socket and will leave that cleanup step to the user or application that created the socket to remove it.
Statistic Counter¶
This plugin maintains a global statistics with the following properties:
submitted
- total number of messages submitted for processing since startupratelimit.discarded
- number of messages discarded due to rate limitingratelimit.numratelimiters
- number of currently active rate limiters (small data structures used for the rate limiting logic)
Caveats/Known Bugs¶
When running under systemd, many “sysSock.” parameters are ignored. See parameter descriptions and the Coexistence with systemd section for details.
On systems where systemd is used this module is often not loaded by default. See the Coexistence with systemd section for details.
Application timestamps are ignored by default. See the Control over application timestamps section for details.
Examples¶
Minimum setup¶
The following sample is the minimum setup required to accept syslog messages from applications running on the local system.
module(load="imuxsock")
This only needs to be done once.
Enable flow control¶
module(load="imuxsock" # needs to be done just once
SysSock.FlowControl="on") # enable flow control (use if needed)
Enable trusted properties¶
As noted in the Trusted (syslog) properties section, trusted properties
are disabled by default. If you want to use them, you must turn the feature
on via SysSock.Annotate
for the system log socket and Annotate
for
inputs.
Append to end of message¶
The following sample is used to activate message annotation and thus trusted properties on the system log socket. These trusted properties are appended to the end of each message.
module(load="imuxsock" # needs to be done just once
SysSock.Annotate="on")
Store in JSON message properties¶
The following sample is similar to the first one, but enables parsing of trusted properties, which places the results into JSON/lumberjack variables.
module(load="imuxsock"
SysSock.Annotate="on" SysSock.ParseTrusted="on")
Read log data from jails¶
The following sample is a configuration where rsyslogd pulls logs from two jails, and assigns different hostnames to each of the jails:
module(load="imuxsock") # needs to be done just once
input(type="imuxsock"
HostName="jail1.example.net"
Socket="/jail/1/dev/log") input(type="imuxsock"
HostName="jail2.example.net" Socket="/jail/2/dev/log")
Read from socket on temporary file system¶
The following sample is a configuration where rsyslogd reads the openssh log messages via a separate socket, but this socket is created on a temporary file system. As rsyslogd starts up before the sshd daemon, it needs to create the socket directories, because it otherwise can not open the socket and thus not listen to openssh messages.
module(load="imuxsock") # needs to be done just once
input(type="imuxsock"
Socket="/var/run/sshd/dev/log"
CreatePath="on")
Disable rate limiting¶
The following sample is used to turn off input rate limiting on the system log socket.
module(load="imuxsock" # needs to be done just once
SysSock.RateLimit.Interval="0") # turn off rate limiting
Support: rsyslog Assistant | GitHub Discussions | GitHub Issues: rsyslog source project
Contributing: Source & docs: rsyslog source project
© 2008–2025 Rainer Gerhards and others. Licensed under the Apache License 2.0.