aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/nixos/modules/services/logging/syslogd.nix
diff options
context:
space:
mode:
Diffstat (limited to 'nixpkgs/nixos/modules/services/logging/syslogd.nix')
-rw-r--r--nixpkgs/nixos/modules/services/logging/syslogd.nix130
1 files changed, 130 insertions, 0 deletions
diff --git a/nixpkgs/nixos/modules/services/logging/syslogd.nix b/nixpkgs/nixos/modules/services/logging/syslogd.nix
new file mode 100644
index 00000000000..fe0b0490811
--- /dev/null
+++ b/nixpkgs/nixos/modules/services/logging/syslogd.nix
@@ -0,0 +1,130 @@
+{ config, lib, pkgs, ... }:
+
+with lib;
+
+let
+
+ cfg = config.services.syslogd;
+
+ syslogConf = pkgs.writeText "syslog.conf" ''
+ ${if (cfg.tty != "") then "kern.warning;*.err;authpriv.none /dev/${cfg.tty}" else ""}
+ ${cfg.defaultConfig}
+ ${cfg.extraConfig}
+ '';
+
+ defaultConf = ''
+ # Send emergency messages to all users.
+ *.emerg *
+
+ # "local1" is used for dhcpd messages.
+ local1.* -/var/log/dhcpd
+
+ mail.* -/var/log/mail
+
+ *.=warning;*.=err -/var/log/warn
+ *.crit /var/log/warn
+
+ *.*;mail.none;local1.none -/var/log/messages
+ '';
+
+in
+
+{
+ ###### interface
+
+ options = {
+
+ services.syslogd = {
+
+ enable = mkOption {
+ type = types.bool;
+ default = false;
+ description = ''
+ Whether to enable syslogd. Note that systemd also logs
+ syslog messages, so you normally don't need to run syslogd.
+ '';
+ };
+
+ tty = mkOption {
+ type = types.str;
+ default = "tty10";
+ description = ''
+ The tty device on which syslogd will print important log
+ messages. Leave this option blank to disable tty logging.
+ '';
+ };
+
+ defaultConfig = mkOption {
+ type = types.lines;
+ default = defaultConf;
+ description = ''
+ The default <filename>syslog.conf</filename> file configures a
+ fairly standard setup of log files, which can be extended by
+ means of <varname>extraConfig</varname>.
+ '';
+ };
+
+ enableNetworkInput = mkOption {
+ type = types.bool;
+ default = false;
+ description = ''
+ Accept logging through UDP. Option -r of syslogd(8).
+ '';
+ };
+
+ extraConfig = mkOption {
+ type = types.lines;
+ default = "";
+ example = "news.* -/var/log/news";
+ description = ''
+ Additional text appended to <filename>syslog.conf</filename>,
+ i.e. the contents of <varname>defaultConfig</varname>.
+ '';
+ };
+
+ extraParams = mkOption {
+ type = types.listOf types.str;
+ default = [ ];
+ example = [ "-m 0" ];
+ description = ''
+ Additional parameters passed to <command>syslogd</command>.
+ '';
+ };
+
+ };
+
+ };
+
+
+ ###### implementation
+
+ config = mkIf cfg.enable {
+
+ assertions =
+ [ { assertion = !config.services.rsyslogd.enable;
+ message = "rsyslogd conflicts with syslogd";
+ }
+ ];
+
+ environment.systemPackages = [ pkgs.sysklogd ];
+
+ services.syslogd.extraParams = optional cfg.enableNetworkInput "-r";
+
+ # FIXME: restarting syslog seems to break journal logging.
+ systemd.services.syslog =
+ { description = "Syslog Daemon";
+
+ requires = [ "syslog.socket" ];
+
+ wantedBy = [ "multi-user.target" ];
+
+ serviceConfig =
+ { ExecStart = "${pkgs.sysklogd}/sbin/syslogd ${toString cfg.extraParams} -f ${syslogConf} -n";
+ # Prevent syslogd output looping back through journald.
+ StandardOutput = "null";
+ };
+ };
+
+ };
+
+}