Table of Contents |
---|
About This Document
Official R1 documentation snapshot in https://onap.readthedocs.io/en/latest/submodules/logging-analytics.git/docs/
This document specifies logging conventions to be followed by ONAP component applications.
ONAP logging is intended to support operability, debugging and reporting on ONAP. These guidelines address:
- Events that are written by ONAP components.
- Propagation of transaction and invocation information between components.
- MDCs, Markers and other information that should be attached to log messages.
- MDC = Mapped Diagnostic Context
- Human and machine-readable output format(s).
- Files, locations and other conventions.
Original AT&T ONAP Logging guidelines (pre amsterdam release) - for historical reference only: https://wiki.onap.org/download/attachments/1015849/ONAP%20application%20logging%20guidelines.pdf?api=v2
The Acumos logging specification follows this document at https://wiki.acumos.org/display/OAM/Log+Standards
Logback reference: Logging Developer Guide#Logback.xml based on https://gerrit.onap.org/r/#/c/62405
Introduction
The purpose of ONAP logging is to capture information needed to operate, troubleshoot and report on the performance of the ONAP platform and its constituent components. Log records may be viewed and consumed directly by users and systems, indexed and loaded into a datastore, and used to compute metrics and generate reports.
The processing of a single client request will often involve multiple ONAP components and/or subcomponents (interchangeably referred to as ‘application’ in this document). The ability to track flows across components is critical to understanding ONAP’s behavior and performance. ONAP logging uses a universally unique RequestID value in log records to track the processing of every client request through all the ONAP components involved in its processing.
A reference configuration of Elastic Stack is being deployed using ONAP Operations Manager since the amsterdam release - see usage in Logging Analytics Dashboards (Kibana)
This document proposes conventions you can follow to generate conformant, indexable logging output from your component.
Supported Languages
How to Log
ONAP prescribes conventions. The use of certain APIs and providers is recommended, but they are not mandatory. Most components log via EELF or SLF4J to a provider like Logback or Log4j.
Logging Specification Compliance
Logging Library Location and Use
What to Log
The purpose of logging is to capture diagnostic information.
An important aspect of this is analytics, which requires tracing of requests between components. In a large, distributed and scalable system such as ONAP this is critical to understanding behavior and performance.
General
It isn't the aim of this document to reiterate Best Practices, so advice here is general:
- Use a logging facade such as SLF4J or EELF.
- Write log messages in English.
- Write meaningful messages. Consider what will be useful to consumers of logger output.
- Log at the appropriate level. Be aware of the volume of logs that will be produced.
- Safeguard the information in exceptions, and ensure it is never lost.
- Use errorcodes to characterise exceptions.
- Log in a machine-readable format. See Conventions.
- Log for analytics as well as troubleshooting.
Others have written extensively on this:
- http://www.masterzen.fr/2013/01/13/the-10-commandments-of-logging/
- https://www.loggly.com/blog/how-to-write-effective-logs-for-remote-logging/
- And so on.
Standard Attributes
These are attributes common to all log messages. They are either:
- Explicitly required by logging APIs:
- Logger
- Level
- Message
- Exception (note that exception is the only standard attribute that may routinely be empty).
- Implicitly derived by the logging provider:
- Timestamp
- Thread.
Which means you normally can't help but report them.
See https://www.slf4j.org/api/org/slf4j/Logger.html and https://logback.qos.ch/manual/layouts.html#ClassicPatternLayout for their origins and use.
Logger Name
This indicates the name of the logger that logged the message.
In Java it is convention to name the logger after the class or package using that logger.
- In Java, report the class or package name.
- In Python, the class or source filename.
Most other languages will fit one of those patterns.
Level
Severity, typically drawn from the enumeration {TRACE, DEBUG, INFO, WARN, ERROR}.
Think carefully about the information you report at each log level. The default log level is INFO.
Some loggers define non-standard levels, like FINE, FINER, WARNING, SEVERE, FATAL or CRITICAL. Use these judiciously, or avoid them.
Message
The free text payload of a log event.
This is the most important item of information in most log messages. See General guidelines.
Internationalization
Diagnostic log messages generally do not need to be internationalized.
Parameterization
Parameterized messages allow serialization to be deferred until AFTER level threshold checks. This means the cost is never incurred for messages that won't be written.
- Favor parameterized messages, especially for INFO and DEBUG logging.
- Perform expensive serialization in the #toString method of wrapper classes.
For example:
Code Block | ||
---|---|---|
| ||
logger.debug("Relax - this won't hurt: {}", new ToStringWrapper(costlyToSerialize)); |
Exception
The error stacktrace, where applicable.
Log unabridged stacktraces upon error.
When rethrowing, ensure that frame information is not lost:
- By logging the original exception at the point where it was caught.
- By setting the original exception as the cause when rethrowing.
Timestamp
Logged as an ISO8601 UTC datetime. Millisecond (or greater) precision is preferable.
For example:
Code Block | ||
---|---|---|
| ||
2018-07-05T20:21:34.794Z |
Offset timestamps are OK provided the offset is included. (In the above example, the "Z" is a shorthand indicating an offset of zero – UTC).
Thread
The name of the thread from which the log message was emitted.
Thread names don't necessarily convey useful information, and their reliability depends on the thread model implemented by different runtimes, but they are sometimes used in heuristic analysis.
Efficiency
There is tension between utility and efficiency. IO bandwidth is finite, and the cost of serialization can be significant, especially at higher diagnostic levels.
Methods and Line Numbers
Many loggers can use reflection to emit the originating (Java) method, and even individual line numbers.
This information is certainly useful, but very expensive. Most logging implementations recommend that this not be enabled in production.
Level Thresholds
Level indicates severity.
Logger output is typically filtered by logger and level. The default logging level is INFO, so particular consideration should be given to the efficiency of INFO-level logging.
When DEBUG-level logging is configured, it's probably for good reason, and a greater overhead is expected. Be aware that it's not unusual for DEBUG logging to be left enabled inadvertently, however.
WARN and ERROR-level messages are of higher value, and comparatively rare, so their cost is less of a concern.
Conditionals
A common pattern is to place conditionals around (expensive) serialization.
For example:
Code Block | ||
---|---|---|
| ||
if (logger.isDebugEnabled()) {
logger.debug("But this WILL hurt: " + costlyToSerialize);
} |
Parameterized logging is preferable.
Context
MDCs
A Mapped Diagnostic Context (MDC) allows an arbitrary string-valued attribute to be attached to a Java thread via a ThreadLocal variable. The MDC's value is then emitted with each message logged by that thread. The set of MDCs associated with a log message is serialized as unordered name-value pairs (see Text Output).
A good discussion of MDCs can be found at https://logback.qos.ch/manual/mdc.html.
Example
From Luke Parker's call graph work in https://git.onap.org/logging-analytics/tree/reference/logging-slf4j-demo
Code Block | ||
---|---|---|
| ||
LogEntry(markers=ENTRY, logger=ComponentAlpha, requestID=eb3e0dc2-6c3c-4bb7-8ed6-e5cc4ec7aad2, invocationID=06c815ef-5969-45cc-b319-d0dbcde89329, timestamp=Tue May 08 04:23:27 AEST 2018) |
...
- Must be set as early in invocation as possible.
- Must be unset on exit.
- keep in sync with https://wiki.acumos.org/display/OAM/Log+Standards
...
Applicable
(per log file)
...
Marker Associations
Moved
MDC
to
standard
attribute
...
Removed
(was in
older
spec)
Required?
Y/N/C
(C= context dependent)
N = not required
L=Library provided
...
Code References
...
RequestID
(pau)do we need to update this to TransactionID as per LOG-232 (discussed back in 20180426)?
...
UUID to track the processing of each client request across all the ONAP components involved in its processing
...
In general
...
UUID correlates log entries relating to a single invocation of a single component
In the case of an asynchronous request, the InvocationID should come from the original request
...
UUID to differentiate between multiple instances of the same (named) log writing service/application
...
The service inside the partner doing the call - includes API name
...
The identification of the entity that made the request being served. For a serving API that is authenticating the request, this should be the authenticated username or equivalent (e.g. an attuid or a mechid)
unauthenticated = The part of the URI specifying the agent that the caller used to make the call to the component that is logging the message.
authenticated = userid
- If an authenticated API, then log the userid
- Otherwise, if the HTTP header "X-ONAP-PartnerName" was provided, then log that (note: this was a direction that we seemed to be going but never completed)
- Otherwise, if the HTTP header "User-Agent" was provided, then log that
- Otherwise, log "UNKNOWN" (since the field is currently required, something must be in it)
...
This field indicates the high level status of the request - one of (COMPLETE, ERROR, INPROGRESS)
...
20180807: expand from 2 fields to add "INPROGRESS"
addresses Chris Lott question on https://wiki.acumos.org/display/OAM/Log+Standards
...
Y
...
Y
...
Logging level by default aligned with the reported log level - one of INFO/TRACE/DEBUG/WARN/ERROR/FATAL
...
The VM FQDN if the server is virtualized. Otherwise the host name of the logging component.
...
Y
...
This field contains the requesting remote client application’s IP address if known. Otherwise empty.
...
Y
...
The name of the ONAP component or sub-component, or external entity, at which the operation activities captured in this metrics log record is invoked.
...
The name of the API or operation activities invoked (name on the remote/target application) at the TargetEntity.
...
VNF/PNF context dependent - on CRUD operations of VNF/PNFs
The IDs that need to be covered with the above Attributes are
- VNF_ID OR VNFC_ID : (Unique identifier for a VNF asset that is being instantiated or that would generate an alarms)
- VSERVER_ID OR VM_ID (or vmid): (Unique identified for a virtual server or virtual machine on which a Control Loop action is usually taken on, or that is installed as part of instantiation flow)
- PNF : (What is the Unique identifier used within ONAP?)
...
allows forward compatability with ELK indexers that read all MDCs in a single field - while maintaining separate MDCs above.
The key/value pairs all in one pipe field (will have some duplications currently with MDC’s that are in their own pipe – but allows us to expand the MDC list – replaces customvalue1-3 older fields - this field is %mdc
...
Logging
Via SLF4J:
Code Block | ||||
---|---|---|---|---|
| ||||
import java.util.UUID;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.slf4j.MDC;
// ...
final Logger logger = LoggerFactory.getLogger(this.getClass());
MDC.put("SomeUUID", UUID.randomUUID().toString());
try {
logger.info("This message will have a UUID-valued 'SomeUUID' MDC attached.");
// ...
}
finally {
MDC.clear();
} |
EELF doesn't directly support MDCs, but its default provider (where com.att.eelf.configuration.SLF4jWrapper is the configured EELF provider)normally logs via SLF4J, and SLF4J will receive any MDC that is set:
Code Block | ||||
---|---|---|---|---|
| ||||
import java.util.UUID;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.slf4j.MDC;
import com.att.eelf.configuration.EELFLogger;
import com.att.eelf.configuration.EELFManager;
// ...
final EELFLogger logger = EELFManager.getInstance().getLogger(this.getClass());
MDC.put("SomeUUID", UUID.randomUUID().toString());
try {
logger.info("This message will have a UUID-valued 'SomeUUID' MDC attached.");
// ...
}
finally {
MDC.clear();
} |
Serializing
Output of MDCs must ensure that:
- All reported MDCs are logged with both name AND value. Logging output should not treat any MDCs as special.
- All MDC names and values are escaped.
Escaping in Logback configuration can be achieved with:
Code Block | ||||
---|---|---|---|---|
| ||||
%replace(%replace(%mdc){'\t','\\\\t'}){'\n','\\\\n'} |
...
This is often referred to by other names, including "Transaction ID", and one of several (pre-standardization) REST header names including X-TransactionID, X-ECOMP-TransactionID, X-ECOMP-RequestID and X-ONAP-RequestID.
ONAP logging uses a universally unique "RequestID" value in log records to track the processing of each client request across all the ONAP components involved in its processing. RequestID be propagated across all interfaces, not just REST Interfaces.
This value:
- Is logged as a RequestID MDC.
- Is propagated between components in REST calls as an X-ONAP-RequestID HTTP header.
Receiving the X-ONAP-RequestID will vary by component according to APIs and frameworks. In general:
Code Block | ||||
---|---|---|---|---|
| ||||
import javax.ws.rs.core.HttpHeaders;
// ...
final HttpHeaders headers = ...;
// ...
String txId = headers.getRequestHeaders().getFirst("X-ONAP-RequestID");
if (StringUtils.isBlank(txId)) {
txId = UUID.randomUUID().toString();
}
MDC.put("RequestID", txID); |
Setting the X-ONAP-RequestID likewise will vary. For example:
Code Block | ||||
---|---|---|---|---|
| ||||
final String txID = MDC.get("RequestID");
HttpURLConnection cx = ...;
// ...
cx.setRequestProperty("X-ONAP-RequestID", txID); |
Note that it's been suggested that for the duration of Casablanca we report the request ID using all three headers:
- X-ONAP-RequestID (canonical)
- X-RequestID (deprecated)
- X-TransactionID (deprecated)
...
InvocationID is similar to RequestID, but where RequestID correlates records relating a single, top-level invocation of ONAP as it traverses many systems, InvocationID correlates log entries relating to a single invocation of a single component. Typically this means via REST, but in certain cases an InvocationID may be allocated without a new invocation, e.g. when a request is retried.
RequestID and InvocationID allow an execution graph to be derived. This requires that:
- The relationship between RequestID and InvocationID is reported.
- The relationship between caller and recipient is reported for each invocation.
The proposed approach is that:
- Callers:
- Issue a new, unique InvocationID UUID for each downstream call they make.
- Log the new InvocationID, indicating the intent to invoke:
- With Markers INVOKE, and SYNCHRONOUS if the invocation is synchronous.
- With their own InvocationID still set as an MDC.
- Pass the InvocationID as an X-InvocationID REST header.
- Invoked components:
- Retrieve the InvocationID from REST headers upon invocation, or generate a UUID default.
- Set the InvocationID MDC.
- Write a log entry with the Marker ENTRY. (In EELF this will be to the AUDIT log).
- Act as per Callers in all downstream requests.
- Write a log entry with the Marker EXIT upon return. (In EELF this will be to the METRICS log).
- Unset all MDCs on exit.
That seems onerous, but:
...
(formerly InstanceUUID)
If known, this field contains a universally unique identifier used to differentiate between multiple instances of the same (named) log writing service/application. Its value is set at instance creation time (and read by it, e.g., at start/initialization time from the environment). This value should be picked up by the component instance from its configuration file and subsequently used to enable differentiation of log records created by multiple, locally load balanced ONAP component or subcomponent instances that are otherwise identically configured.
Handles parallel threads or running across a load balanced set of microservices - for identification.
...
This field should contain the name of the client application user agent or user invoking the API. The identification of the entity that made the request being served. For a serving API that is authenticating the request, this should be the authenticated username or equivalent (e.g. a userid or a mechid).
For example SDC-BE instead of just SDC for the overall pods
This is often used for heuristic analysis to identify invocations between ONAP individual ONAP components. Its value has never been clearly stipulated, so a common problem has been a lack of consistency.
There is no clear consensus, but:
- Use the short name of your component, e.g. xyzdriver. (try to incorporate both levels - the container name and the pod the container is in within the kubernetes deployment)
- Values should be human-readable.
- Values should be fine-grained enough to disambiguate subcomponents where it's likely to matter. This is subjective.
- Be consistent: your component should ALWAYS report same value.
Real-life examples include MSO, bpmnclient, BPELClient, (all of which are reported by SO), openECOMP (SDNC), vid (VID!) etc. (See the problem?)
Usage overlaps with InvocationID, which doesn't mean PartnerName gets retired, but which might mean it serves a more descriptive purpose. (Since it hasn't proven to be a great way of generating a call graph).
...
The URI that the caller used to make the call to the component that is logging the message.
For EELF Audit log records that capture API requests, this field contains the name of the API invoked at the component creating the record (e.g., Layer3ServiceActivateRequest).
For EELF Audit log records that capture processing as a result of receipt of a message, this field should contain the name of the module that processes the message.
Usage is the same for indexable logs.
...
This field indicates the high level status of the request. It must have the value COMPLETE when the request is successful and ERROR when there is a failure. And INPROGRESS for states between the two.
Discussion: status/response/severity relationship
status = global, response below is app specific
Ability to render severity-like line in a non-debug log
...
This field contains application-specific error codes. For consistency, common error categorizations should be used.
...
OPS specific
Use/Map existing https://www.slf4j.org/api/org/apache/commons/logging/Log.html
ENUM is INFO/TRACE/DEBUG/WARN/ERROR/FATAL
By default - align this severity with the reported log level
(optionally a way to map actual level from reported level if required)
...
This field contains the Virtual Machine (VM) Fully Qualified Domain Name (FQDN) if the server is virtualized. Otherwise, it contains the host name of the logging component.
Best effort (ip, fqdn)
(previously covered by removed "Server" field)
redundancy between clientIP, server, virtualServer name is OK - and helpfull for runtime OPS/Hybrid envs
supercedes virtualServerName
Report what is in the http header
Discussion: roll all 3 fqdn, hostname or ip into one field - do we ever need two of the 3 fields concurrently?
- TODO: Verify what is also available from a filebeat agent when it exists
...
This field contains the requesting remote client application’s IP address if known. Otherwise this field can be empty.
We don't differentiate between inside/outside ONAP for the IP - this supports hybrid environments
Derived from the system
redundancy between clientIP, server, virtualServer name is OK - and helpfull for runtime OPS/Hybrid envs
Discussion: do we need both ip and fqdn fields?
Report what is in the http header
...
Date-time that processing activities being logged begins. The value should be represented in UTC and formatted per ISO 8601, such as “2015-06-03T13:21:58+00:00”. The time should be shown with the maximum resolution available to the logging component (e.g., milliseconds, microseconds) by including the appropriate number of decimal digits. For example, when millisecond precision is available, the date-time value would be presented as, as “2015-06-03T13:21:58.340+00:00”.
Context dependent on whether part of an ENTRY marker
Audit requires this field
...
Timestamp on invocation start.
Context dependent on whether part of an INVOKE marker
metrics needs this field.
...
It contains the name of the ONAP component or sub-component, or external entity, at which the operation activities captured in this metrics log record is invoked.
Example: SDC-BE
...
It contains the name of the API or operation activities invoked (name on the remote/target application) at the TargetEntity.
Example: Class name of rest endpoint
Discussion: on building call graph vs human readable single line - keep for human readable
Used as valuable URI - to annnote invoke marker
Review in terms of Marker-INVOKE - possiblly add INVOKE-return - to filter reporting
TBD: Coverage by log file type (debug, trace, ...)
TBD: cover off discussion on reducing log files to two (DEBUG/rest) for C* release
...
VNF/PNF context dependent - on CRUD operations of VNF/PNFs
The IDs that need to be covered with the above Attributes are
- VNF_ID OR VNFC_ID : (Unique identifier for a VNF asset that is being instantiated or that would generate an alarms)
- VSERVER_ID OR VM_ID (or vmid): (Unique identified for a virtual server or virtual machine on which a Control Loop action is usually taken on, or that is installed as part of instantiation flow)
- PNF : (What is the Unique identifier used within ONAP)
MDCs - the Rest
Other MDCs are logged in a wide range of contexts.
Certain MDCs and their semantics may be specific to EELF log types.
Deprecation
Indexing makes many of the remaining attributes redundant. So for example:
- There is considerable duplication:
- BeginTimestamp, EndTimestamp, ElapsedTime. These are all captured elsewhere (and ElapsedTime is even redundant within that triplet).
- Server, ServerIPAddress, ServerFQDN, VirtualServiceName. Overkill. Should be one, plus optionally ClientIPAddress (or some variant thereof).
- TargetEntity, TargetServiceName, not obviously different to similar attributes.
- There is junk:
- Severity? Nagios codes?
- ProcessKey?
- All the stuff that's already grayed out in the table above.
- People may defend these individually, maybe vigorously, but they're domain-specific:
- That absolutely doesn't mean they can't be used.
- Beats configuration allows ad hoc contexts to be indexed.
- But perhaps they don't belong in this kind of spec.
- Redundant attributes *do* matter, because:
- Populating and propagating everything prescribed by the guide approaches being prohibitive. People won't do it, and people *don't* do it.
- If something might be in one of several attributes then that's worse than it being in just one.
- That means:
- We're left with only two MANDATORY attributes, necessary to build invocations graphs:
- RequestID - top-level transactions.
- InvocationID - inter-component invocations.
- And a minimal number of OPTIONAL descriptive attributes: ServiceInstanceID, InstanceID, Server, StatusCode, ResponseCode, ResponseDescription.
- Those are the ones we need to document clearly, support in APIs, etc.
- That's <=10, a manageable number.
- And again, that matters because if the number isn't manageable, people won't (and don't) comply.
Some of that is contentious, but it's just talking points at this stage. We've tiptoed around the issue of extant conventions, and the ongoing result is a lot of attributes that nobody's really sure how to use, and which don't result in better logs. In Casablanca it's time to be less conservative.
Examples
Markers
Markers unambiguously assign semantics to individual log messages. They allow messages that have a specific meaning to be cheaply and easily identified in logger output, without inherently unreliable (and more costly, and less easily enforced) schemes like scanning for magic strings in the text of each log message.
ONAP logging requires the emission of Markers reporting entry, exit and invocation as the execution of requests pass between ONAP components. This information is used to generate a call graph.
ONAP components are also free to use Markers for their own purposes. Any Markers that are logged will be automatically indexed by Logstash.
Markers differ from MDCs in two important ways:
- They have a name, but no value. They are a tag - like a label.
- They are specified explicitly on invocation. They are not ThreadLocal, and they do not propagate.
EELF's implementation can be modified to emit Markers, but its public APIs do not allow them to be passed in by callers.
see code on reference folder in git clone ssh://michaelobrien@gerrit.onap.org:29418/logging-analytics
Examples
Marker formatting is using tabs -
Jira Legacy | ||||||
---|---|---|---|---|---|---|
|
Note there are 3 tabs (see p_mak in logback.xml) delimiting the MARKERS (ENTRY and EXIT) at the end of each line
<property name="p_mak" value="%replace(%replace(%marker){'\t', '\\\\t'}){'\n','\\\\n'}"/>
...
language | java |
---|---|
theme | Midnight |
...
Table of Contents |
---|
About This Document
Official R1 documentation snapshot in https://onap.readthedocs.io/en/latest/submodules/logging-analytics.git/docs/
This document specifies logging conventions to be followed by ONAP component applications.
ONAP logging is intended to support operability, debugging and reporting on ONAP. These guidelines address:
- Events that are written by ONAP components.
- Propagation of transaction and invocation information between components.
- MDCs, Markers and other information that should be attached to log messages.
- MDC = Mapped Diagnostic Context
- Human and machine-readable output format(s).
- Files, locations and other conventions.
Original AT&T ONAP Logging guidelines (pre amsterdam release) - for historical reference only: https://wiki.onap.org/download/attachments/1015849/ONAP%20application%20logging%20guidelines.pdf?api=v2
The Acumos logging specification follows this document at https://wiki.acumos.org/display/OAM/Log+Standards
Logback reference: Logging Developer Guide#Logback.xml based on https://gerrit.onap.org/r/#/c/62405
Introduction
The purpose of ONAP logging is to capture information needed to operate, troubleshoot and report on the performance of the ONAP platform and its constituent components. Log records may be viewed and consumed directly by users and systems, indexed and loaded into a datastore, and used to compute metrics and generate reports.
The processing of a single client request will often involve multiple ONAP components and/or subcomponents (interchangeably referred to as ‘application’ in this document). The ability to track flows across components is critical to understanding ONAP’s behavior and performance. ONAP logging uses a universally unique RequestID value in log records to track the processing of every client request through all the ONAP components involved in its processing.
A reference configuration of Elastic Stack is being deployed using ONAP Operations Manager since the amsterdam release - see usage in Logging Analytics Dashboards (Kibana)
This document proposes conventions you can follow to generate conformant, indexable logging output from your component.
Supported Languages
How to Log
ONAP prescribes conventions. The use of certain APIs and providers is recommended, but they are not mandatory. Most components log via EELF or SLF4J to a provider like Logback or Log4j.
Logging Specification Compliance
Logging Library Location and Use
What to Log
Context
MDCs
A Mapped Diagnostic Context (MDC) allows an arbitrary string-valued attribute to be attached to a Java thread via a ThreadLocal variable. The MDC's value is then emitted with each message logged by that thread. The set of MDCs associated with a log message is serialized as unordered name-value pairs (see 71831758).
A good discussion of MDCs can be found at https://logback.qos.ch/manual/mdc.html.
Example
From Luke Parker's call graph work in https://git.onap.org/logging-analytics/tree/reference/logging-slf4j-demo
Code Block | ||
---|---|---|
| ||
LogEntry(markers=ENTRY, logger=ComponentAlpha, requestID=eb3e0dc2-6c3c-4bb7-8ed6-e5cc4ec7aad2, invocationID=06c815ef-5969-45cc-b319-d0dbcde89329, timestamp=Tue May 08 04:23:27 AEST 2018) |
Mapped Diagnostic Context Table
- Must be set as early in invocation as possible.
- Must be unset on exit.
- keep in sync with https://wiki.acumos.org/display/OAM/Log+Standards
Legend |
---|
Green = Required field |
Yellow = Optional field |
Pipe Order | Name | Type | Group | Description | Required? Y/N/C (C= context dependent) N = not required L=Library provided | Notes | Code References | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | LogTimestamp | log system | use %d field - see %d{"yyyy-MM-dd'T'HH:mm:ss.SSSXXX",UTC} | L | |||||||||||
2 | EntryTimestamp | MDC | if part of an ENTRY marker log | C | |||||||||||
3 | InvokeTimestamp | MDC | if part of an INVOKE marker log | C | |||||||||||
4 | RequestID | MDC | UUID to track the processing of each client request across all the ONAP components involved in its processing | Y | In general | ||||||||||
5 | InvocationID | MDC | UUID correlates log entries relating to a single invocation of a single component In the case of an asynchronous request, the InvocationID should come from the original request | Y | See the comment section of the v1.2 spec spec on July 23, 2019 | ||||||||||
6 | InstanceID | MDC | An unique ID to differentiate between multiple instances of the same (named) log writing service/application. For example, either the Kubernetes pod ID or UUID can be used for this field. | Y | Was InstanceUUID | ||||||||||
7 | ServiceInstanceID | MDC | An unique identifier of a newly instantiated network service instance. | C | |||||||||||
8 | thread | log system | use %thread field | L | |||||||||||
9 | ServiceName | MDC | The service inside the partner doing the call - includes API name | Y | |||||||||||
10 | PartnerName | MDC | The identification of the entity that made the request being served. For a serving API that is authenticating the request, this should be the authenticated username or equivalent (e.g. an attuid or a mechid)
authenticated = userid
| Y | See the comment section of the v1.2 spec spec on August 6, 2019 | ||||||||||
11 | StatusCode | MDC | This field indicates the high level status of the request - one of (COMPLETE, ERROR, INPROGRESS) | Y | 20180807: expand from 2 fields to add "INPROGRESS" addresses Chris Lott question on https://wiki.acumos.org/display/OAM/Log+Standards | ||||||||||
12 | ResponseCode | MDC | This field contains application-specific error codes. In the case where | Y | |||||||||||
13 | ResponseDesc | This field contains a human readable description of the ResponseCode | Y | ||||||||||||
14 | level | %level | L | ||||||||||||
15 | Severity | MDC | Logging level by default aligned with the reported log level - one of INFO/TRACE/DEBUG/WARN/ERROR/FATAL | Y | |||||||||||
16 | ServerIPAddress | C | |||||||||||||
17 | ElapsedTime | C | |||||||||||||
18 | ServerFQDN | MDC | The VM FQDN if the server is virtualized. Otherwise the host name of the logging component. | Y | |||||||||||
19 | ClientIPAddress | MDC | This field contains the requesting remote client application’s IP address if known. Otherwise empty. | Y | |||||||||||
ServerFQDN supercedes VirtualServerName as mentioned in the comment section of the v1.2 spec on July 3, 2019.
| |||||||||||||||
21 | ContextName | C | The logging enhancement team could not find any definition for this field and it was agreed to leave out the description for this field. See comment section of the v1.2 spec on July 23, 2019. | ||||||||||||
22 | TargetEntity | MDC | The name of the ONAP component or sub-component, or external entity, at which the operation activities captured in this metrics log record is invoked. | C | |||||||||||
23 | TargetServiceName | MDC | The name of the API or operation activities invoked (name on the remote/target application) at the TargetEntity. | C | |||||||||||
24 | TargetElement | MDC | VNF/PNF context dependent - on CRUD operations of VNF/PNFs The IDs that need to be covered with the above Attributes are
| C | |||||||||||
25 | User | MDC | User - used for %X{user} | C | |||||||||||
26 | p_logger | log system | The name of the class doing the logging (in my case the ApplicationController – close to the targetservicename but at the class granular level - this field is %logger | L | |||||||||||
27 | p_mdc | log system | allows forward compatability with ELK indexers that read all MDCs in a single field - while maintaining separate MDCs above. The key/value pairs all in one pipe field (will have some duplications currently with MDC’s that are in their own pipe – but allows us to expand the MDC list – replaces customvalue1-3 older fields - this field is %mdc | L | |||||||||||
28 | p_message | log system | Standard attribute - defined in logback.xml - Message - used for %msg% | L | |||||||||||
29 | p_marker | log system | The marker labels INVOKE, ENTRY, EXIT – and later will also include DEBUG, AUDIT, METRICS, ERROR when we go to 1 log file - this field is %marker | L |
Logging
Via SLF4J:
Code Block | ||||
---|---|---|---|---|
| ||||
import orgjava.slf4jutil.LoggerUUID; import org.slf4j.LoggerFactoryLogger; import org.slf4j.MarkerLoggerFactory; import org.slf4j.MarkerFactoryMDC; // ... final Logger logger = LoggerFactory.getLogger(this.getClass()); final Marker marker = MarkerFactory.getMarker("MY_MARKER"); logger.warn(marker, "This warning has a 'MY_MARKER' annotation."); |
EELF does not allow Markers to be set directly. See notes on the InvocationID MDC.
Serializing
Marker names also need to be escaped, though they're much less likely to contain problematic characters than MDC values.
Escaping in Logback configuration can be achieved with:
Code Block | ||||
---|---|---|---|---|
| ||||
%replace(%replace(%marker){'\t','\\\\t'}){'\n','\\\\n'} |
...
TODO: add table detailing which log files each marker is a part of - from a use case perspective
This should be reported as early in invocation as possible, immediately after setting the RequestID and InvocationID MDCs.
It can be automatically set by EELF, and written to the AUDIT log.
It must be manually set otherwise. Candidate for framework
...
final Logger logger = LoggerFactory.getLogger(this.getClass());
MDC.put("SomeUUID", UUID.randomUUID().toString());
try {
logger.info("This message will have a UUID-valued 'SomeUUID' MDC attached.");
// ...
}
finally {
MDC.clear();
} |
EELF doesn't directly support MDCs, but its default provider (where com.att.eelf.configuration.SLF4jWrapper is the configured EELF provider)normally logs via SLF4J, and SLF4J will receive any MDC that is set:
Code Block | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
import java.util.UUID; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import org.slf4j.MDC; import com.att.eelf.configuration.EELFLogger; import com.att.eelf.configuration.EELFManager; // ... final EELFLogger logger = EELFManager.getAuditLogger.getInstance().getLogger(this.getClass()); loggerMDC.auditEventput("Entering."); |
SLF4J:
Code Block | ||||||
---|---|---|---|---|---|---|
| ||||||
public static final Marker ENTRY = MarkerFactory.getMarker("ENTRY"); SomeUUID", UUID.randomUUID().toString()); try { logger.info("This message will have a UUID-valued 'SomeUUID' MDC attached."); // .... } finally { final Logger logger = LoggerFactoryMDC.getLoggerclear(this.getClass()); logger.debug(ENTRY, "Entering."); |
Marker - EXIT
This should be reported as late in invocation as possible, immediately before unsetting the RequestID and InvocationID MDCs.
It can be automatically reported by EELF, and written to the METRICS log.
It must be manually set otherwise.
...
} |
Serializing
Output of MDCs must ensure that:
- All reported MDCs are logged with both name AND value. Logging output should not treat any MDCs as special.
- All MDC names and values are escaped.
Escaping in Logback configuration can be achieved with:
Code Block | ||||||
---|---|---|---|---|---|---|
| ||||||
final EELFLogger logger = EELFManager.getMetricsLogger();
logger.metricsEvent("Exiting."); |
SLF4J:
Code Block | ||||||
---|---|---|---|---|---|---|
| ||||||
public static final Marker EXIT = MarkerFactory.getMarker("EXIT");
// ...
final Logger logger = LoggerFactory.getLogger(this.getClass());
logger.debug(EXIT, "Exiting."); |
Marker - INVOKE
This should be reported by the caller of another ONAP component via REST, including a newly allocated InvocationID, which will be passed to the caller.
...
%replace(%replace(%mdc){'\t','\\\\t'}){'\n','\\\\n'} |
Anchor | ||||
---|---|---|---|---|
|
This is often referred to by other names, including "Transaction ID", and one of several (pre-standardization) REST header names including X-TransactionID, X-ECOMP-TransactionID, X-ECOMP-RequestID and X-ONAP-RequestID.
ONAP logging uses a universally unique "RequestID" value in log records to track the processing of each client request across all the ONAP components involved in its processing. RequestID be propagated across all interfaces, not just REST Interfaces.
This value:
- Is logged as a RequestID MDC.
- Is propagated between components in REST calls as an X-ONAP-RequestID HTTP header.
Receiving the X-ONAP-RequestID will vary by component according to APIs and frameworks. In general:
Code Block | ||||||
---|---|---|---|---|---|---|
| ||||||
public static final Marker INVOKE = MarkerFactory.getMarker("INVOKE");
// ...
// Generate and report invocation ID.
final String invocationID = UUID.randomUUID().toString();
MDC.put(MDC_INVOCATION_ID, invocationID);
try {
logger.debug(INVOKE_SYNCHRONOUS, "Invoking synchronously ... ");
}
finally {
MDC.remove(MDC_INVOCATION_ID);
}
// Pass invocationID as HTTP X-InvocationID header.
callDownstreamSystem(invocationID, ... ); |
EELF examples of INVOCATION_ID reporting, without changing published APIs.
Marker - INVOKE-RETURN
This should be reported by the caller of another ONAP component via REST on return.
InvokeTimestamp context dependent MDC will be reported here.
SLF4J:
Code Block | ||||||
---|---|---|---|---|---|---|
| ||||||
TBD |
Marker - INVOKE-SYNCHRONOUS
This should accompany INVOKE when the invocation is synchronous.
...
import javax.ws.rs.core.HttpHeaders;
// ...
final HttpHeaders headers = ...;
// ...
String txId = headers.getRequestHeaders().getFirst("X-ONAP-RequestID");
if (StringUtils.isBlank(txId)) {
txId = UUID.randomUUID().toString();
}
MDC.put("RequestID", txID); |
Setting the X-ONAP-RequestID likewise will vary. For example:
Code Block | ||||||
---|---|---|---|---|---|---|
| ||||||
public static final Marker INVOKE_SYNCHRONOUS; static { INVOKE_SYNCHRONOUSString txID = MarkerFactoryMDC.getMarkerget("INVOKERequestID"); HttpURLConnection cx = INVOKE_SYNCHRONOUS.add(MarkerFactory.getMarker("SYNCHRONOUS")); }...; // ... // Generate and report invocation ID. final String invocationID = UUID.randomUUID().toString(); MDC.put(MDC_INVOCATION_ID, invocationID); try { logger.debug(INVOKE_SYNCHRONOUS, "Invoking synchronously ... "); } finally { MDC.remove(MDC_INVOCATION_ID); } // Pass invocationID as HTTP X-InvocationID header. callDownstreamSystem(invocationID, ... ); |
EELF example of SYNCHRONOUS reporting, without changing published APIs.
Errorcodes
Errorcodes are reported as MDCs.
TODO: add to table
Exceptions should be accompanied by an errrorcode. Typically this is achieved by incorporating errorcodes into your exception hierarchy and error handling. ONAP components generally do not share this kind of code, though EELF defines a marker interface (meaning it has no methods) EELFResolvableErrorEnum.
A common convention is for errorcodes to have two components:
- A prefix, which identifies the origin of the error.
- A suffix, which identifies the kind of error.
Suffixes may be numeric or text. They may also be common to more than one component.
For example:
Code Block | ||||
---|---|---|---|---|
| ||||
COMPONENT_X.STORAGE_ERROR |
Output Format
Several considerations:
- Logs should be human-readable (within reason).
- Shipper and indexing performance and durability depends on logs that can be parsed quickly and reliably.
- Consistency means fewer shipping and indexing rules are required.
Text Output
TODO: 20190115 - do not take the example in this section until I reverify it in terms of the reworked spec example in
Jira Legacy | ||||||
---|---|---|---|---|---|---|
|
ONAP needs to strike a balance between human-readable and machine-readable logs. This means:
- The use of PIPE (|) as a delimiter. (Previously tab, and before that ... pipe).
- Escaping all messages, exceptions, MDC values, Markers, etc. to replace tabs and pipes in their content.
- Escaping all newlines with \n so that each entry is on one line.
In logback, this looks like:
Code Block | ||||
---|---|---|---|---|
| ||||
<property name="defaultPattern" value="%nopexception%logger
|%date{yyyy-MM-dd'T'HH:mm:ss.SSSXXX,UTC}
|%level
|%replace(%replace(%replace(%message){'\t','\\\\t'}){'\n','\\\\n'}){'|','\\\\|'}
|%replace(%replace(%replace(%mdc){'\t','\\\\t'}){'\n','\\\\n'}){'|','\\\\|'}
|%replace(%replace(%replace(%rootException){'\t','\\\\t'}){'\n','\\\\n'}){'|','\\\\|'}
|%replace(%replace(%replace(%marker){'\t','\\\\t'}){'\n','\\\\n'}){'|','\\\\|'}
|%thread
|%n"/> |
The output of which, with MDCs, a Marker and a nested exception, with newlines added for readability, looks like:
Code Block | ||||
---|---|---|---|---|
| ||||
org.onap.example.component1.subcomponent1.LogbackTest
|2017-08-06T16:09:03.594Z
|ERROR
|Here's an error, that's usually bad
|key1=value1, key2=value2 with space, key5=value5"with"quotes, key3=value3\nwith\nnewlines, key4=value4\twith\ttabs
|java.lang.RuntimeException: Here's Johnny
\n\tat org.onap.example.component1.subcomponent1.LogbackTest.main(LogbackTest.java:24)
\nWrapped by: java.lang.RuntimeException: Little pigs, little pigs, let me come in
\n\tat org.onap.example.component1.subcomponent1.LogbackTest.main(LogbackTest.java:27)
|AMarker1
|main |
Default Logstash indexing rules understand output in this format.
XML Output
For Log4j 1.X output, since escaping is not supported, the best alternative is to emit logs in XML format, we will expand on JSON support
There may be other instances where XML (or JSON) output may be desirable. Default indexing rules support
Default Logstash indexing rules understand the XML output of Log4J's XMLLayout.
Note that we're hoping that support for indexing of XML output can be deprecated during Beijing. This relies on the adoption of ODL Carbon, which should eliminate any remnant of Log4J1.X.
Output Location
Standardization of output locations makes logs easier to locate and ship for indexing.
Expand on out-of-container locations off /dockerdata-nfs
Logfiles should default to beneath /var/log, and beneath /var/log/ONAP in the case of core ONAP components:
Code Block | ||||
---|---|---|---|---|
| ||||
/var/log/ONAP/<component>[/<subcomponent>]/*.log |
For the duration of Beijing, logs will be written to a separate directory, /var/log/ONAP_EELF:
expand on Casablanca differences, and adding as a config setting in OOM
Code Block | ||||
---|---|---|---|---|
| ||||
/var/log/ONAP_EELF/<component>[/<subcomponent>]/*.log |
Configuration
Logging providers should be configured by file. Files should be at a predictable, static location, so that they can be written by deployment automation. Ideally this should be under /etc/ONAP, but compliance is low.
Locations
All logger provider configuration document locations namespaced by component and (if applicable) subcomponent by default:
Code Block | ||||
---|---|---|---|---|
| ||||
/etc/ONAP/<component>[/<subcomponent>]/<provider>.xml |
Where <provider>.xml, will typically be one of:
- logback.xml
- log4j.xml
- log4j.properties
Reconfiguration
Logger providers should reconfigure themselves automatically when their configuration file is rewritten. All major providers should support this.
The default interval is 10s.
Overrides
The location of the configuration file MAY be overrideable, for example by an environment variable, but this is left for individual components to decide.
Archetypes
...
Retention
Logfiles are often large. Logging providers allow retention policies to be configured.
Retention has to balance:
- The need to index logs before they're removed.
- The need to retain logs for other (including regulatory) purposes.
Defaults are subject to change. Currently they are:
- Files <= 50MB before rollover.
- Files retain for 30 days.
- Total files capped at 10GB.
In Logback configuration XML:
Code Block | ||||
---|---|---|---|---|
| ||||
<appender name="file" class="ch.qos.logback.core.rolling.RollingFileAppender">
<file>${outputDirectory}/${outputFilename}.log</file>
<rollingPolicy class="ch.qos.logback.core.rolling.SizeAndTimeBasedRollingPolicy">
<fileNamePattern>${outputDirectory}/${outputFilename}.%d{yyyy-MM-dd}.%i.log.zip</fileNamePattern>
<maxFileSize>50MB</maxFileSize>
<maxHistory>30</maxHistory>
<totalSizeCap>10GB</totalSizeCap>
</rollingPolicy>
<encoder>
<!-- ... -->
</encoder>
</appender> |
Types of EELF Logs
EELF guidelines stipulate that an application should output log records to four separate files:
- audit
- metrics
- error
- debug
This applies only to EELF logging. Components which log directly to a provider may choose to emit the same set of logs, but most do not.
Audit Log
An audit log is required for EELF-enabled components, and provides a summary view of the processing of a (e.g., transaction) request within an application. It captures activity requests that are received by an ONAP component, and includes such information as the time the activity is initiated, then it finishes, and the API that is invoked at the component.
Audit log records are intended to capture the high level view of activity within an ONAP component. Specifically, an API request handled by an ONAP component is reflected in a single Audit log record that captures the time the request was received, the time that processing was completed, as well as other information about the API request (e.g., API name, on whose behalf it was invoked, etc).
Metrics Log
A metrics log is required for EELF-enabled components, and provides a more detailed view into the processing of a transaction within an application. It captures the beginning and ending of activities needed to complete it. These can include calls to or interactions with other ONAP or non-ONAP entities.
Suboperations invoked as part of the processing of the API request are logged in the Metrics log. For example, when a call is made to another ONAP component or external (i.e., non-ONAP) entity, a Metrics log record captures that call. In such a case, the Metrics log record indicates (among other things) the time the call is made, when it returns, the entity that is called, and the API invoked on that entity. The Metrics log record contain the same RequestID as the Audit log record so the two can be correlated.
Note that a single request may result in multiple Audit log records at an ONAP component and may result in multiple Metrics log records generated by the component when multiple suboperations are required to satisfy the API request captured in the Audit log record.
Error Log
An error log is required for EELF-enabled components, and is intended to capture info, warn, error and fatal conditions sensed (“exception handled”) by the software components.
This includes previous logs that went to application.log
Debug Log
A debug log is optional for EELF-enabled components, and is intended to capture whatever data may be needed to debug and correct abnormal conditions of the application.
Engine.out
Console logging may also be present, and is intended to capture “system/infrastructure” records. That is stdout and stderr assigned to a single “engine.out” file in a directory configurable (e.g. as an environment/shell variable) by operations personnel.
Application Log (deprecated)
see example in https://git.onap.org/oom/tree/kubernetes/portal/charts/portal-sdk/resources/config/deliveries/properties/ONAPPORTALSDK/logback.xml
We no longer support this 5th log file - see error.log
Log File Locations
There are several locations where logs are available on the host, on the nfs share and in each application and filebeat container
Logs on each Kubernetes host VM - docker empty.dir shares
Logs on the /dockerdata-nfs share across hosts
Logs on each microservice docker container - /var/log/onap
...
cx.setRequestProperty("X-ONAP-RequestID", txID); |
Note that it's been suggested that for the duration of Casablanca we report the request ID using all three headers:
- X-ONAP-RequestID (canonical)
- X-RequestID (deprecated)
- X-TransactionID (deprecated)
Anchor | ||||
---|---|---|---|---|
|
InvocationID is similar to RequestID, but where RequestID correlates records relating a single, top-level invocation of ONAP as it traverses many systems, InvocationID correlates log entries relating to a single invocation of a single component. Typically this means via REST, but in certain cases an InvocationID may be allocated without a new invocation, e.g. when a request is retried.
RequestID and InvocationID allow an execution graph to be derived. This requires that:
- The relationship between RequestID and InvocationID is reported.
- The relationship between caller and recipient is reported for each invocation.
The proposed approach is that:
- Callers:
- Issue a new, unique InvocationID UUID for each downstream call they make.
- Log the new InvocationID, indicating the intent to invoke:
- With Markers INVOKE, and SYNCHRONOUS if the invocation is synchronous.
- With their own InvocationID still set as an MDC.
- Pass the InvocationID as an X-InvocationID REST header.
- Invoked components:
- Retrieve the InvocationID from REST headers upon invocation, or generate a UUID default.
- Set the InvocationID MDC.
- Write a log entry with the Marker ENTRY. (In EELF this will be to the AUDIT log).
- Act as per Callers in all downstream requests.
- Write a log entry with the Marker EXIT upon return. (In EELF this will be to the METRICS log).
- Unset all MDCs on exit.
That seems onerous, but:
- It's only a few calls.
- It can be largely abstracted in the case of EELF logging.
Anchor MDC-InstanceID MDC-InstanceID
MDC - InstanceID
MDC-InstanceID | |
MDC-InstanceID |
(formerly InstanceUUID)
If known, this field contains a universally unique identifier used to differentiate between multiple instances of the same (named) log writing service/application. Its value is set at instance creation time (and read by it, e.g., at start/initialization time from the environment). This value should be picked up by the component instance from its configuration file and subsequently used to enable differentiation of log records created by multiple, locally load balanced ONAP component or subcomponent instances that are otherwise identically configured.
Handles parallel threads or running across a load balanced set of microservices - for identification.
Anchor MDC-PartnerName MDC-PartnerName
MDC - PartnerName
MDC-PartnerName | |
MDC-PartnerName |
This field should contain the name of the client application user agent or user invoking the API. The identification of the entity that made the request being served. For a serving API that is authenticating the request, this should be the authenticated username or equivalent (e.g. a userid or a mechid).
For example SDC-BE instead of just SDC for the overall pods
This is often used for heuristic analysis to identify invocations between ONAP individual ONAP components. Its value has never been clearly stipulated, so a common problem has been a lack of consistency.
There is no clear consensus, but:
- Use the short name of your component, e.g. xyzdriver. (try to incorporate both levels - the container name and the pod the container is in within the kubernetes deployment)
- Values should be human-readable.
- Values should be fine-grained enough to disambiguate subcomponents where it's likely to matter. This is subjective.
- Be consistent: your component should ALWAYS report same value.
Real-life examples include MSO, bpmnclient, BPELClient, (all of which are reported by SO), openECOMP (SDNC), vid (VID!) etc. (See the problem?)
Usage overlaps with InvocationID, which doesn't mean PartnerName gets retired, but which might mean it serves a more descriptive purpose. (Since it hasn't proven to be a great way of generating a call graph).
Anchor | ||||
---|---|---|---|---|
|
The URI that the caller used to make the call to the component that is logging the message.
For EELF Audit log records that capture API requests, this field contains the name of the API invoked at the component creating the record (e.g., Layer3ServiceActivateRequest).
For EELF Audit log records that capture processing as a result of receipt of a message, this field should contain the name of the module that processes the message.
Usage is the same for indexable logs.
Anchor | ||||
---|---|---|---|---|
|
This field indicates the high level status of the request. It must have the value COMPLETE when the request is successful and ERROR when there is a failure. And INPROGRESS for states between the two.
Discussion: status/response/severity relationship
status = global, response below is app specific
Ability to render severity-like line in a non-debug log
Anchor | ||||
---|---|---|---|---|
|
This field contains application-specific error codes. For consistency, common error categorizations should be used.
Anchor | ||||
---|---|---|---|---|
|
OPS specific
Use/Map existing https://www.slf4j.org/api/org/apache/commons/logging/Log.html
ENUM is INFO/TRACE/DEBUG/WARN/ERROR/FATAL
By default - align this severity with the reported log level
(optionally a way to map actual level from reported level if required)
Anchor | ||||
---|---|---|---|---|
|
This field contains the Virtual Machine (VM) Fully Qualified Domain Name (FQDN) if the server is virtualized. Otherwise, it contains the host name of the logging component.
Best effort (ip, fqdn)
(previously covered by removed "Server" field)
redundancy between clientIP, server, virtualServer name is OK - and helpfull for runtime OPS/Hybrid envs
supercedes virtualServerName
Report what is in the http header
Discussion: roll all 3 fqdn, hostname or ip into one field - do we ever need two of the 3 fields concurrently?
Dave Williamson We seem to cover well what to put in this field in bare metal and virtualized environments, but I think we have not managed to come to closure as to what we should put in containerized environments. I would suggest that in all environments we simply ask that whatever "hostname" reports be logged in this field.
- TODO: Verify what is also available from a filebeat agent when it exists
Anchor | ||||
---|---|---|---|---|
|
This field contains the requesting remote client application’s IP address if known. Otherwise this field can be empty.
We don't differentiate between inside/outside ONAP for the IP - this supports hybrid environments
Derived from the system
redundancy between clientIP, server, virtualServer name is OK - and helpfull for runtime OPS/Hybrid envs
Discussion: do we need both ip and fqdn fields?
Report what is in the http header
Anchor | ||||
---|---|---|---|---|
|
Date-time that processing activities being logged begins. The value should be represented in UTC and formatted per ISO 8601, such as “2015-06-03T13:21:58+00:00”. The time should be shown with the maximum resolution available to the logging component (e.g., milliseconds, microseconds) by including the appropriate number of decimal digits. For example, when millisecond precision is available, the date-time value would be presented as, as “2015-06-03T13:21:58.340+00:00”.
Context dependent on whether part of an ENTRY marker
Audit requires this field
Anchor | ||||
---|---|---|---|---|
|
Timestamp on invocation start.
Context dependent on whether part of an INVOKE marker
metrics needs this field.
Anchor | ||||
---|---|---|---|---|
|
It contains the name of the ONAP component or sub-component, or external entity, at which the operation activities captured in this metrics log record is invoked.
Example: SDC-BE
Anchor | ||||
---|---|---|---|---|
|
It contains the name of the API or operation activities invoked (name on the remote/target application) at the TargetEntity.
Example: Class name of rest endpoint
Discussion: on building call graph vs human readable single line - keep for human readable
Used as valuable URI - to annnote invoke marker
Review in terms of 71831758 - possiblly add INVOKE-return - to filter reporting
TBD: Coverage by log file type (debug, trace, ...)
TBD: cover off discussion on reducing log files to two (DEBUG/rest) for C* release
Anchor | ||||
---|---|---|---|---|
|
VNF/PNF context dependent - on CRUD operations of VNF/PNFs
The IDs that need to be covered with the above Attributes are
- VNF_ID OR VNFC_ID : (Unique identifier for a VNF asset that is being instantiated or that would generate an alarms)
- VSERVER_ID OR VM_ID (or vmid): (Unique identified for a virtual server or virtual machine on which a Control Loop action is usually taken on, or that is installed as part of instantiation flow)
- PNF : (What is the Unique identifier used within ONAP)
MDCs - the Rest
Other MDCs are logged in a wide range of contexts.
Certain MDCs and their semantics may be specific to EELF log types.
Deprecation
Indexing makes many of the remaining attributes redundant. So for example:
- There is considerable duplication:
- BeginTimestamp, EndTimestamp, ElapsedTime. These are all captured elsewhere (and ElapsedTime is even redundant within that triplet).
- Server, ServerIPAddress, ServerFQDN, VirtualServiceName. Overkill. Should be one, plus optionally ClientIPAddress (or some variant thereof).
- TargetEntity, TargetServiceName, not obviously different to similar attributes.
- There is junk:
- Severity? Nagios codes?
- ProcessKey?
- All the stuff that's already grayed out in the table above.
- People may defend these individually, maybe vigorously, but they're domain-specific:
- That absolutely doesn't mean they can't be used.
- Beats configuration allows ad hoc contexts to be indexed.
- But perhaps they don't belong in this kind of spec.
- Redundant attributes *do* matter, because:
- Populating and propagating everything prescribed by the guide approaches being prohibitive. People won't do it, and people *don't* do it.
- If something might be in one of several attributes then that's worse than it being in just one.
- That means:
- We're left with only two MANDATORY attributes, necessary to build invocations graphs:
- RequestID - top-level transactions.
- InvocationID - inter-component invocations.
- And a minimal number of OPTIONAL descriptive attributes: ServiceInstanceID, InstanceID, Server, StatusCode, ResponseCode, ResponseDescription.
- Those are the ones we need to document clearly, support in APIs, etc.
- That's <=10, a manageable number.
- And again, that matters because if the number isn't manageable, people won't (and don't) comply.
Some of that is contentious, but it's just talking points at this stage. We've tiptoed around the issue of extant conventions, and the ongoing result is a lot of attributes that nobody's really sure how to use, and which don't result in better logs. In Casablanca it's time to be less conservative.
Examples
Output Format
Output Location
Configuration
Logging providers should be configured by file. Files should be at a predictable, static location, so that they can be written by deployment automation. Ideally this should be under /etc/ONAP, but compliance is low.
Locations
All logger provider configuration document locations namespaced by component and (if applicable) subcomponent by default:
Code Block | ||||
---|---|---|---|---|
| ||||
/etc/ONAP/<component>[/<subcomponent>]/<provider>.xml |
Where <provider>.xml, will typically be one of:
- logback.xml
- log4j.xml
- log4j.properties
Reconfiguration
Logger providers should reconfigure themselves automatically when their configuration file is rewritten. All major providers should support this.
The default interval is 10s.
Overrides
The location of the configuration file MAY be overrideable, for example by an environment variable, but this is left for individual components to decide.
Archetypes
Configuration archetypes can be found in the ONAP codebase https://git.onap.org/logging-analytics/tree/. Choose according to your provider, and whether you're logging via EELF. Efforts to standardize them are underwayso the ones you should be looking for are where pipe (|) is used as a separator. (Previously it was "|").
Retention
Types of EELF Logs
Excerpt |
---|
New ONAP Component ChecklistAdd this procedure to the Project Proposal Template By following a few simple rules:
Obligations fall into two categories:
You must:
|
...
|
...
|
...
|
...
They are unordered. |
What's New
TBD
(Including what WILL be new in v1.2 / R2).
Field separator reverted to pipe.Dual appenders in Logback and Log4j reference configurations:Indexable, for shipping and indexing.EELF, for backward compatibility.Minor changes to path conventions.
XML output deprecated (required only for Log4j1.2, which is also expected to go).Improved documentation of semantics and usage (including initialization and propagation via ThreadLocaland HTTP headers) for existing MDCs and attributes.Add MDCs/Markers + usage for invocation IDs, allowing call graphs to be built without reliance on heuristics.Revisiting persistence (a clear requirement) and rollover settings, based on feedback from operations.More discussion of How to Log. (Where previously guidelines were largely concerned with architecture and mechanics).Locking in other changes proposed in R1, including MDC serialization, escaping, etc. These can be treated as accepted. (Note that they only affect indexable output).
In addition, we expect to provide (as a Beijing deliverable) a minimal, synthetic component as an example of best-practices, and this will provide all code examples for this guide. (Does that mean the example will log via EELF, or will we end up with two variants?)
Pending Specification Work
...