Logging¶
Logging features in Mavkit allow to monitor the execution of Mavkit binaries, informing in real time about events of interest, such as errors, completion of certain steps, etc. This is why various software components emit events throughout the codebase (see Using The Event Logging Framework), the logging framework dispatches them to an arbitrary number of (active) sinks which can filter print, store, or otherwise handle events.
The logging framework can be configured with environment variables, which specify how events are mapped to sinks. Some Mavkit binaries provide additional configurations means.
Events¶
Events have:
a name
a section; a hierarchical event classification mechanism, i.e. a path-like list of strings, sometimes the name is appended to make a fully-qualified name,
a level quantifying the relative importance of the event (Debug, Info, Notice, Warning, Error, and Fatal — inspired from the Syslog standard severity levels),
and, as contents, arbitrary structured data. They can be serialized to any format supported by the data-encoding library (e.g. JSON) and pretty-printed for human readers.
Events are by default “lazy”: if no active sink accepts their section and level, they are not emitted at all. This means that outputting more events implies more CPU and memory usage.
“Legacy events” are the events that use the old & deprecated logging API; their contents all have the same structure: they are just human-readable text. The API makes that these events are evaluated even if they are not consumed by a sink; i.e. they are not lazily evaluated. The codebase is in the process of getting rid of them.
Sink Configuration¶
The logging framework refers to sinks with URIs (a.k.a. structured strings of
the form schema://path?query
): the schema of the URI is used to find the
appropriate sink-implementation, the rest of the URI is used to configure the
particular instance.
File-Descriptor Sinks¶
File-descriptor sinks allow to configure loggers that output events to regular Unix file-descriptors. They are duplicatable. They actually consist in a family of four URI-schemes:
file-descriptor-path://
outputs to a filefile-descriptor-stdout://
outputs tostdout
/1
file-descriptor-stderr://
outputs tostderr
/2
file-descriptor-syslog://
outputs to asyslog
facility
Note: -stdout
and -stderr
schemes are there for convenience
and for making the API consistent; most Unix-ish systems nowadays have
/dev/std{out,err}
and /dev/fd/[0-9]+
special files which can be
used with file-descriptor-path
(with some precautions).
The path of the URI is used by file-descriptor-path
to choose the
path to write to and ignored for the other two.
The query of the URI is used to further configure the sink instance.
Common options:
level-at-least=<loglevel>
the minimal log-level that the sink will output.section-prefix
can be given many times and defines a list of pairs<section-prefix>:<level-threshold>
which can be used to setup more precise filters.level-at-least=info
can be understood assection-prefix=:info
, the empty section prefix matches all sections. To exclude a specific section use thenone
filter, for examplesection-prefix=p2p:none
. To define a filter only for one specific sectionsection-prefix=p2p:debug§ion-prefix=:none
format=<value>
the output format used. Note that syslog output will ignore this option and use the syslog formatting. Possible values are:one-per-line
(the default): output JSON objects, one per line,netstring
: use the Netstring format (cf. Wikipedia) to separate JSON records,pp
orpp-rfc5424
to output the events pretty-printed, one per line, using a format compatible with RFC-5424 (or Syslog).pp-short
to output the events pretty-printed in a shorter and more user-friendly fashion.
color=true
enables logs coloring. It only works on ttys, in conjunction withformat=pp-short
.
Options available only for the file-descriptor-path://
case:
with-pid=<bool>
whentrue
adds the current process-id to the file path provided (for instance, useful for the node when not running in--singleprocess
mode).fresh=<bool>
whentrue
smashes the content of the file if it already exists instead of appending to it.chmod=<int>
sets the access-rights of the file at creation time (default is0o600
, provided Umask allows it).daily-logs=<int>
sets up a rotation for log files, creating a file for each day. The parameter is the number of days these logs should be kept, and hence the number of files. The day of the year with format [“yyyymmdd”] is added as a suffix to the filename, prefixed by a dash. We recomend not to put your tezos logs in/var/log
if you use this option, as you system would uselogrotate
automatically.create-dirs=<bool>
whentrue
allows to create the directory where the log files are stored and all its parents recursively if they don’t exist.
Option available only for file-descriptor-syslog://
case:
facility=<facility>
is the targeted syslog output. The possible values are:auth, authpriv, cron, daemon, ftp, kernel, local0, local1, local2, local3, local4, local5, local6, local7, lpr, mail, news, syslog, user, uucp, ntp, security, console
.user
is the default facility if no value is provided. See RFC-3164 for more information.Examples:
file-descriptor-path:///the/path/to/write.log?format=one-per-line&level-at-least=notice&with-pid=true&chmod=0o640
→ Executables will write all log events of level at leastNotice
to a file/the/path/to/write-XXXX.log
whereXXXX
is the PID, the file will be also readable by the user’s group (0o640
).file-descriptor-stderr://?format=netstring
→ Executables will write tostderr
JSON blobs “packetized” as Netstrings.file-descriptor-path:///dev/fd/4?section-prefix=rpc:debug
→ Executables will write to the file-descriptor4
likely opened by a parent monitoring process. The reader will only receive the logs from the sectionrpc
(but all of them includingDebug
).file-descriptor-path:///the/path/to/write.log?section-prefix=rpc:debug§ion-prefix=validator:debug§ion-prefix=:none"
→ Write only sections validator and rpc at debug level but exclude all other sections from the stream."file-descriptor-path:///tmp/node-logs/node.log?daily-logs=5&create-dirs=true§ion-prefix=:info"
sets up daily log files with a history of up to 5 days and verbosity levelinfo
for all logs. Files will be namednode-19700101.log
in an example of a file produced in 1970, January, the 1st. The log directorynode-logs
will be automatically created if it doesn’t exist.
The format of the events is (usually minified):
{"fd-sink-item.v0":
{"hostname": <host-name>,
"time_stamp": <float-seconds-since-epoch>,
"section":[ <list-of-strings> ],
"event":
<event-specific-json> } }
Additionally, the "hostname"
field can be customized with environment
variable MAVRYK_EVENT_HOSTNAME
; Its default value is the hostname of the
device the node is running on.
To store rotated logs, there is the daily-logs
option to create logs files on
a daily basis. However, it is also possible to use logrotate
by putting the
log file in /var/log/tezos/sink.log
, for exemple. The following
configuration can then be put in /etc/logrotate.d/tezos/sink.log
:
/var/log/tezos/sink.log {
daily
copytruncate
rotate 4
compress
}
File-Tree Sink¶
This is a sink that dumps events as JSON files (same format as above) in a directory structure guided by the section of the events. It can be useful for testing the logging framework itself, or for off-line post-mortem analysis for instance.
The URI scheme is unix-files
, the path is the top-level directory in
which the JSON files will be written.
The query of the URI allows one to filter the events early on.
level-at-least=<loglevel>
the minimal log-level that the sink will output.name-matches=<regexps>
comma-separated-list of POSIX regular expressions on the name of the events.name=<names>
comma-separated-list of event names matched exactly.section=<sections>
comma-separated-list of event sections matched exactly.no-section=<bool>
when true only catch the events that have an empty section.
Example: unix-files:///the/path/to/write?level-at-least=info
(the
path should be inexistent or already a directory).
The directory structure is as follows:
<section-dirname>/<event-name>/<YYYYMMDD>/<HHMMSS-MMMMMM>/<YYYYMMDD-HHMMSS-MMMMMM-xxxx.json>
where <section-dirname>
is either no-section
or
section-<section-name>
.
Global Defaults¶
By default, the Mavkit binaries generate user logs as follows:
file-descriptor-stdout://
sink is activated by default and configured to output events of level at leastNotice
to stdout.
The node and the baker additionally generate by default more detailed internal logs as follows:
A file-descriptor-sink is activated to store logs from last seven days with an
Info
level. For the node, the path is<node-data-dir>/daily-logs/
. For other tools, see the corresponding sections in this page.
JSON Configuration Format¶
A configuration JSON blob, is an object with one field "active_sinks"
which contains a list of URIs:
{
"active_sinks": [ <list-of-sink-URIs> ]
}
The URIs are discriminated among the sink implementations above using their schemes and activated.
It is used in various places: node configuration file, logging-configuration RPC, etc.
Environment Variables¶
The logging framework can be configured with environment variables
before starting an Mavkit executable (e.g., the node). Those variables work on all the code using the
mavryk-stdlib-unix
library as long as Internal_event_unix.init
is
called; this should include all the regular mavkit-*
binaries.
MAVRYK_EVENTS_CONFIG
must be a whitespace-separated list of URIs:URIs that have a schema are activated.
URIs without a schema, i.e. simple paths, are understood as paths to configuration JSON files (format above) to load (which themselves activate sinks).
MAVRYK_LOG
andLWT_LOG
(deprecated and has a lower priority) contain “rules” to configure the defaultfile-descriptor-stdout
sink. The rules are expressed with a DSL:rules are separated by semi-colons
;
,each rule has the form
pattern -> level
,a pattern is a minimalist glob-expression on the
section.name
of the event, e.g.rpc*
for all events whose section.name starts withrpc
,rules are ordered, i.e., the first pattern that matches, from left to right, fires the corresponding rule.
MAVRYK_EVENT_HOSTNAME
is used by the file-descriptor-sink to tweak the JSON output (see above).
As the Irmin context backend uses an internal and specific logging
system, it is possible to configure it through the MAVRYK_CONTEXT
environment variable, see Context.
Node-Specific Configuration¶
The node supports some additional means to configure logging, besides environment variables.
Configuration File¶
See mavkit-node config --help
for the full schema of the node’s JSON
configuration file.
In particular the fields:
"internal-events"
contains a configuration of the sinks (format above)."log"
is an object which defines the configuration of the defaultfile-descriptor-stdout
sink; one can redirect the output to a file, set the rules, and change the formatting template. The goal of this configuration field is to be simpler to express thatinternal-events
for simpler changes.
Note that log
is ignored if internal-events
is present.
Command Line Options¶
See mavkit-node run --help
, the default file-descriptor-stdout://
sink
configuration can be also be changed with the following options:
-v
/-vv
: set the global log level toInfo
orDebug
respectively.--log-output
: set the output file.--log-coloring=<bool>
: enable or disable colors in the default stdout logs. The default value istrue
.
RPC /config/logging
¶
The node exposes an administrative PUT
endpoint:
/config/logging
.
The input schema is the JSON configuration of the sinks. It
deactivates all current sinks and activates the ones provided except
the file-descriptor-stdout://
sink that is left untouched.
Example: (assuming the file-descriptor-stdout://
is active not to miss other
events) this call adds a sink to suddenly start pretty-printing all
rpc
events to a /tmp/rpclogs
file:
mavkit-client rpc put /config/logging with \
'{ "active_sinks": [ "file-descriptor-path:///tmp/rpclogs?section-prefix=rpc:debug&format=pp&fresh=true" ] }'
Client and baker configuration¶
Both mavkit-client
and mavkit-{baker,accuser}-*
can be configured either
using environment variables or using internal-events
in the client configuration
file, with the file-descriptor sinks described above.
There is also one common option --log-requests
which can be used to trace
all the interactions with the node (but it does not use the logging
framework).
By default, the baker also generates internal logs, which are stored at
<client-base-dir>/logs/baker-<protocol-name>/*
. Hence, running two bakers
(for two different accounts) using the same protocol with the same base
directory is not recommended.
Processing Structured Events¶
This is work-in-progress, see:
mavkit-admin-client show event-logging
outputs the configuration currently understood bymavkit-admin-client
(hence through theMAVRYK_EVENTS_CONFIG
variable) and lists all the events it knows about.mavkit-admin-client output schema of <Event-Name> to <File-path>
get the JSON-Schema for an event.
Example:
mavkit-admin-client output schema of block-seen-alpha to block-seen-alpha.json