{"id":12382,"date":"2024-11-27T20:53:25","date_gmt":"2024-11-27T20:53:25","guid":{"rendered":"https:\/\/stackify.com\/?p=12382"},"modified":"2024-12-02T16:50:12","modified_gmt":"2024-12-02T16:50:12","slug":"syslog-101","status":"publish","type":"post","link":"https:\/\/stackify.com\/syslog-101\/","title":{"rendered":"What Is Syslog: An Introductory Tutorial"},"content":{"rendered":"\n<p>Syslog is a standard for sending and receiving notification messages&#8211;in a particular format&#8211;from various network devices. The messages include time stamps, event messages, severity, host IP addresses, diagnostics and more.<\/p>\n\n\n\n<p>In terms of its built-in severity level, it can communicate a range between level 0, an Emergency, level 5, a Warning, System Unstable, critical and level 6 and 7 which are Informational and Debugging.<\/p>\n\n\n\n<p>Moreover, Syslog is open-ended. Syslog was designed to monitor network devices and systems to send out notification messages if there are any issues their functionality&#8211;it also sends out alerts for pre-defined events and monitors suspicious activity via the change log\/event log of participating network devices.<\/p>\n\n\n\n<p>The Syslog protocol was initially written by Eric Allman and is <a href=\"http:\/\/www.ietf.org\/rfc\/rfc3164.txt\" target=\"_blank\" rel=\"noopener noreferrer\">defined in RFC 3164<\/a>. The messages are sent across IP networks to the event message collectors or syslog servers. Syslog uses the <a href=\"https:\/\/camel.apache.org\/syslog.html\" target=\"_blank\" rel=\"noopener noreferrer\">User Datagram Protocol (UDP), port 514<\/a>, to communicate. Although, syslog servers do not send back an acknowledgment of receipt of the messages. Since 2009, syslog has been standardized by the IETF in <a href=\"https:\/\/datatracker.ietf.org\/doc\/rfc5424\/\" target=\"_blank\" rel=\"noopener noreferrer\">RFC 5424<\/a>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/stackify.com\/wp-content\/uploads\/2017\/06\/flylib-syslog-screenshot-12386.jpg\" alt=\"Flylib Syslog Screenshot\" class=\"wp-image-12386\"\/><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\"><em>Screenshot via <a href=\"http:\/\/flylib.com\/books\/1\/297\/1\/html\/2\/images\/1587051583\/graphics\/09fig02.gif\" rel=\"noopener\">Flylib<\/a><\/em><\/p>\n\n\n\n<p>Today, it has gained wide support on many operating systems including almost all versions of Linux, Unix, and MacOS. For Microsoft Windows, Syslog is supported through open sources and commercial third-party libraries.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-benefits-of-logging\">Benefits of Logging<\/h3>\n\n\n\n<p>In the simplest definition, logging is the act of keeping a log. Sysadmins have engaged in an ongoing debate over what level of detail to log their system data. There is the tradeoff between using up disk space too quickly and not having enough data in your logs.<\/p>\n\n\n\n<p>Yet, the benefits of logging are still wide-ranging\u2014especially <a href=\"https:\/\/stackify.com\/what-are-docker-logs\/\">when troubleshooting code.<\/a> It is necessary to have a standardized and centralized system to generate, record and log messages.<\/p>\n\n\n\n<p>Furthermore, it helps to improve your ability to control and use logging data. Here are a few other <a href=\"https:\/\/stackoverflow.com\/questions\/7750560\/what-are-the-advantages-of-using-syslog-over-other-logging-facilites\" target=\"_blank\" rel=\"noopener noreferrer\">benefits<\/a>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reduce the number of trouble tickets<\/li>\n\n\n\n<li>Reduce downtime<\/li>\n\n\n\n<li>Decrease the volume of business interruptions<\/li>\n\n\n\n<li>Promote preventative troubleshooting<\/li>\n<\/ul>\n\n\n\n<p>Without logging, it can become a nightmare to search for a single transaction that may have been processed on any of your servers.<\/p>\n\n\n\n<p>With <a href=\"https:\/\/stackify.com\/log-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">centralized logging<\/a>, you get a correlated view of all of the log data. In contrast, reviewing each log file separately can become quite time-consuming. This is why using Syslog to forward local log messages to a remote log analytics server has become the standard for logging solutions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-components-of-syslog-servers\">Components of Syslog Servers<\/h3>\n\n\n\n<p>You now understand how Syslog offers a central repository for logs from <a href=\"https:\/\/www.howtogeek.com\/107069\/how-to-remotely-collect-server-events-using-syslog\/\" target=\"_blank\" rel=\"noopener noreferrer\">multiple sources<\/a>. To achieve this objective, <a href=\"https:\/\/www.pcwdld.com\/free-syslog-servers-windows-and-linux\" target=\"_blank\" rel=\"noopener noreferrer\">Syslog servers<\/a> have several components including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A Syslog listener&#8211;The listener gathers and processes syslog data sent over UDP port 514. Although, there is no acknowledgment receipt and messages aren&#8217;t guaranteed to arrive.<\/li>\n\n\n\n<li>A database&#8211;Syslog servers need databases to store the massive amounts of data for quick access.<\/li>\n\n\n\n<li>Management and filtering software&#8211;Since there can be enormous amounts of data, it can take excessive amounts of time to find specific log entries. The syslog server needs help to automate the work, as well as to filter to view specified log messages.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-filtering-specifics\">Filtering Specifics<\/h4>\n\n\n\n<p>To illustrate, it can extract messages based on specific parameters such as a critical event or device name. You can also use the filter to avoid seeing certain types of entries through the Negative Filter rule. If you wanted, you could show all of the critical log messages from a firewall.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-it-works\">How It Works<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright\"><img decoding=\"async\" src=\"https:\/\/stackify.com\/wp-content\/uploads\/2017\/06\/Syslog-Message-Destination-min.png\" alt=\"Syslog Message Destination\" class=\"wp-image-12387\"\/><\/figure><\/div>\n\n\n<p>There are three different <a href=\"https:\/\/www.ietf.org\/proceedings\/59\/slides\/syslog-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">layers<\/a> within the Syslog standard, which are:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Syslog content (information contained in an event message)<\/li>\n\n\n\n<li>Syslog application (generates, interprets, routes and stores messages)<\/li>\n\n\n\n<li>Syslog transport (transmits the messages)<\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-align-center\"><em>(Image via <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Syslog_Message_Destination_Options.PNG\" rel=\"noopener\">Wikimedia Commons<\/a>)<\/em><\/p>\n\n\n\n<p>In addition, applications can be configured to send messages to several destinations. There are also alarms that give instant notifications for events such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hardware errors<\/li>\n\n\n\n<li>Application failures<\/li>\n\n\n\n<li>Lost contact<\/li>\n\n\n\n<li>Mis-configuration<\/li>\n<\/ul>\n\n\n\n<p>Furthermore, alarms can be set up to send notifications via SMS, pop-up messages, email, HTTP and more. Since the process is automated, the IT team will get immediate notifications of there is a sudden failure of any of the devices.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-syslog-servers\">Syslog Servers<\/h3>\n\n\n\n<p>Syslog servers are used to send diagnostic and monitoring data. The data can then be analyzed for system <a href=\"https:\/\/stackify.com\/what-is-network-monitoring\/\">monitoring<\/a>, network maintenance and more. Since the Syslog protocol is supported by a <a href=\"http:\/\/www.ciscopress.com\/articles\/article.asp?p=426638&amp;seqNum=3\" target=\"_blank\" rel=\"noopener noreferrer\">wide swath of devices<\/a>, they can conveniently log information into the Syslog server.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"200\" src=\"https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/Syslog-servers-are-used-to-send-diagnostic-and-monitoring-data.png\" alt=\"Syslog servers are used to send diagnostic and monitoring data.\" class=\"wp-image-45020\" srcset=\"https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/Syslog-servers-are-used-to-send-diagnostic-and-monitoring-data.png 1000w, https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/Syslog-servers-are-used-to-send-diagnostic-and-monitoring-data-300x60.webp 300w, https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/Syslog-servers-are-used-to-send-diagnostic-and-monitoring-data-150x30.webp 150w, https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/Syslog-servers-are-used-to-send-diagnostic-and-monitoring-data-768x154.webp 768w, https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/Syslog-servers-are-used-to-send-diagnostic-and-monitoring-data-600x120.webp 600w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.manageengine.com\/network-monitoring\/what-is-snmp.html\" target=\"_blank\" rel=\"noreferrer noopener\">SNMP data<\/a>\u00a0can be used to assess any failure points quickly. Syslog servers can also have automated\u00a0<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/hh457576(v=sc.12).aspx\" target=\"_blank\" rel=\"noreferrer noopener\">events<\/a>\u00a0to trigger alerts that help to prevent downtime or outages.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/stackify.com\/wp-content\/uploads\/2017\/06\/kiwi-syslog-server-screenshot-12384.jpg\" alt=\"Kiwi Syslog Server\" class=\"wp-image-45014\"\/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">List of a Few Windows-Based Syslog Servers<\/h3>\n\n\n\n<p><strong>1.&nbsp;<a href=\"http:\/\/www.kiwisyslog.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kiwi Syslog Server<\/a><\/strong>. This server is simple to install and generates reports in plain text or HTML. The software handles Syslog and SNMP, even from Linux and UNIX hosts. It is compatible with Windows 10 (32\/64-bit), Windows 11 (32\/64-bit), Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows Server 2022 R2, Windows 8, Windows Server 2012 &amp; 2012 R2.<\/p>\n\n\n\n<p><strong>2.&nbsp;<a href=\"https:\/\/www.paessler.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">PRTG<\/a><\/strong>. This adds a sensor to the PRTG monitoring to enable Syslog ability. It focuses on SNMP and Syslog protocol data. It is compatible with any Windows 64-bit environment, including Windows Server 2016, Windows Server 2019, Windows Server 2022, and Windows 11.<\/p>\n\n\n\n<p><strong>3.&nbsp;<a href=\"https:\/\/syslogwatcher.com\/syslog-watcher\/\" target=\"_blank\" rel=\"noreferrer noopener\">SNMPSoft Sys-log Watcher<\/a><\/strong>. This is a dedicated syslog server for a wide variety of devices. It can also parse and manage non-standard Syslog. It is compatible with Windows 10, Windows 11, and Windows Server 2016, 2019, and 2022.<\/p>\n\n\n\n<p><strong>4.&nbsp;<a href=\"https:\/\/wiki.mikrotik.com\/wiki\/Manual:The_Dude_v6\/Syslog\" target=\"_blank\" rel=\"noreferrer noopener\">The Dude<\/a><\/strong>. This system is used for general network management with a built-in syslog server. Furthermore, it comes with functionality for remote logging through the RouterOS. It is compatible with Windows 10, Windows 11, and Windows Server 2016, 2019, and 2022. It also runs on Linux or macOS using Wine\/Darwine.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/stackify.com\/wp-content\/uploads\/2017\/06\/visual-syslog-server-screenshot-12383.jpg\" alt=\"Visual Syslog Server\" class=\"wp-image-12383\"\/><\/figure><\/div>\n\n\n<p><strong>5.\u00a0<a href=\"http:\/\/maxbelkov.github.io\/visualsyslog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Visual Syslog Server<\/a><\/strong>. This is a lighter syslog option that looks at alerts in real-time. Thresholds can be configured to trigger both scripts and programs. It is compatible with Windows XP, Vista, 7, 8, 8.1, as well as Windows Server 2003, 2008, 2012. <\/p>\n\n\n\n<p>Visual Syslog does not explicitly list the latest Windows Server 2022 and Windows 11 as supported operating systems. However, many applications that support Windows Server 2016 and 2019 may also work on Windows Server 2022 due to compatibility features in the Windows operating system.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Mac-OS Syslog Servers<\/h3>\n\n\n\n<p>For the Mac OS X, you can use Splunk\u2013which enables system monitoring and syslog events. In fact, Splunk is known as the tool for\u00a0<a href=\"https:\/\/stackify.com\/top-devops-tools\/\">operational intelligence.<\/a>\u00a0Also, you can configure Splunk as a forwarder to your central monitoring server. <\/p>\n\n\n\n<p>To configure the Mac OS X Syslogd you would:<\/p>\n\n\n\n<p>1. Open a terminal window<\/p>\n\n\n\n<p>2. Make a backup copy of syslogd.conf into the \/tmp folder by typing<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code> $ cp \/etc\/syslog.conf \/tmp\/syslog.conf.bkp<\/code><\/pre>\n\n\n\n<p>3. Open the configuration file in the editor of your choice<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo vi \/etc\/syslog.conf<\/code><\/pre>\n\n\n\n<p>Password: The \u2018sudo\u2019 command is used to execute vi with \u201croot\u201d privileges.<\/p>\n\n\n\n<p>4. Replace the IP address 192.168.1.12 with the IP address if your Splunk server\u2019s network interface<\/p>\n\n\n\n<p>5. Type \u2018i\u2019 in vi to enter the insert mode (text entry). Make sure to use tabs and not spaces between the selector and action fields.<\/p>\n\n\n\n<p>6. Save and Exit. Save the file by typing<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\u2019:wq &lt;enter&gt;\u2019<\/code><\/pre>\n\n\n\n<p>7 Restart the \u2018syslogd\u2019 service, and test it by typing<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ ps -e | grep syslogd\n\n5070 ?? 2:33.75 \/usr\/sbin\/syslogd<\/code><\/pre>\n\n\n\n<p>These are the commands that restart the service:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo launchctl unload \/System\/Library\/LaunchDaemons\/com.apple.syslogd.plist\n\n$ sudo launchctl load \/System\/Library\/LaunchDaemons\/com.apple.syslogd.plist<\/code><\/pre>\n\n\n\n<p>To log an event, open a new Terminal window and type:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ logger -s -p user.info \"Testing splunk syslog forwarding\"<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">The Syslog Format<\/h3>\n\n\n\n<p>Syslog has a standard definition and format of the log message defined by RFC 5424. As a result, it is composed of a&nbsp;<a href=\"https:\/\/signoz.io\/blog\/syslog-formats\/#:~:text=Syslog%20is%20a%20standard%20for,device%20hostname%2C%20and%20message%20content.\" target=\"_blank\" rel=\"noreferrer noopener\">header, structured-data (SD) and a message<\/a>.&nbsp;Within the header, you will see a description of the type such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Priority<\/li>\n\n\n\n<li>Version<\/li>\n\n\n\n<li>Timestamp<\/li>\n\n\n\n<li>Hostname<\/li>\n\n\n\n<li>Application<\/li>\n\n\n\n<li>Process id<\/li>\n\n\n\n<li>Message id<\/li>\n<\/ul>\n\n\n\n<p>Then, you will see structured-data which have data blocks in the \u201ckey=value\u201d format within square brackets. After the SD, you will see the detailed log message, which is encoded in UTF-8.<\/p>\n\n\n\n<p>For example, the&nbsp;<a href=\"https:\/\/www.balabit.com\/documents\/syslog-ng-ose-latest-guides\/en\/syslog-ng-ose-guide-admin\/html\/concepts-message-ietfsyslog.html\" target=\"_blank\" rel=\"noreferrer noopener\">following message<\/a>:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;34>1 2003-10-11T22:14:15.003Z mymachine.example.com su - ID47 - BOM'su root' failed for lonvick on \/dev\/pts\/8<\/code><\/pre>\n\n\n\n<p>Corresponds to the following format:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;priority>VERSION ISOTIMESTAMP HOSTNAME APPLICATION PID MESSAGEID STRUCTURED-DATA MSG<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Syslog Messages<\/h3>\n\n\n\n<p>Syslog messages are used to report levels of Emergency and Warnings with regards to software or hardware issues. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"200\" src=\"https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/Syslog-messages-are-used-to-report-levels-of-Emergency-and-Warnings-with-regards-to-software-or-hardware-issues.png\" alt=\"Syslog messages are used to report levels of Emergency and Warnings with regards to software or hardware issues. \" class=\"wp-image-45021\" srcset=\"https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/Syslog-messages-are-used-to-report-levels-of-Emergency-and-Warnings-with-regards-to-software-or-hardware-issues.png 1000w, https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/Syslog-messages-are-used-to-report-levels-of-Emergency-and-Warnings-with-regards-to-software-or-hardware-issues-300x60.webp 300w, https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/Syslog-messages-are-used-to-report-levels-of-Emergency-and-Warnings-with-regards-to-software-or-hardware-issues-150x30.webp 150w, https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/Syslog-messages-are-used-to-report-levels-of-Emergency-and-Warnings-with-regards-to-software-or-hardware-issues-768x154.webp 768w, https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/Syslog-messages-are-used-to-report-levels-of-Emergency-and-Warnings-with-regards-to-software-or-hardware-issues-600x120.webp 600w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>To illustrate, a system restart will be sent through the Notice level. A system reload will be sent through the Informational level. If debug commands are outputted, it is conveyed through the Debug level.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/stackify.com\/wp-content\/uploads\/2017\/06\/cisco-syslog-message-12385.jpg\" alt=\"Cisco syslog\" class=\"wp-image-12385\"\/><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\"><em>Screenshot via&nbsp;<a href=\"http:\/\/www.cisco.com\/c\/dam\/en\/us\/td\/i\/Other\/Cisco_Press\/ITG\/10-19-01\/TR892401.eps\/jcr:content\/renditions\/TR892401.jpg\">Cisco<\/a><\/em><\/p>\n\n\n\n<p>Here are the Syslog Message Levels:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Emergency Messages\u2013System is unavailable and unusable (Could be a \u201cpanic\u201d condition due to a natural disaster)<\/li>\n\n\n\n<li>Alert Messages\u2013Action needs to be taken immediately (an example is loss of backup ISP connection)<\/li>\n\n\n\n<li>Critical Messages\u2013Critical conditions (this could be a loss of primary ISP connection)<\/li>\n\n\n\n<li>Error Messages\u2013Error conditions (must be resolved within a specified time frame)<\/li>\n\n\n\n<li>Warning Messages\u2013Warning conditions (indicates an error may occur if action is not taken)<\/li>\n\n\n\n<li>Notification Messages\u2013Things are normal, but this is still a significant condition (immediate action is usually not required)<\/li>\n\n\n\n<li>Informational Messages\u2013Informational messages (for reporting and measuring)<\/li>\n\n\n\n<li>Debugging Messages\u2013Debug-level messages (Offers information around debugging apps)<\/li>\n<\/ul>\n\n\n\n<p>Here are some additional examples from\u00a0<a href=\"https:\/\/techzone.ergon.ch\/syslog-message-format\" target=\"_blank\" rel=\"noreferrer noopener\">TechZone<\/a>. <\/p>\n\n\n\n<p>This system error message:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>May 11 10:40:48 scrooge disk-health-nurse&#91;26783]: &#91;ID 702911 user.error] m:SY-mon-full-500 c:H : partition health measures for \/var did not suffice - still using 96% of partition space<\/code><\/pre>\n\n\n\n<p>We can split into the following columns:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Column 1 = \"May 11 10:40:48\" > Timestamp\nColumn 2 = \"scrooge\" > Loghost\nColumn 3 = \"disk-health-nurse&#91;26783]:\" > Application\/Process\nColumn 4 = \"&#91;ID 702911 user.error]\" > Syslog facility.level\nColumn 5 = \"m:SY-mon-full-500\" > Message ID\nColumn 6 = \"c:H : partition health...\" > Message &#91;possibly including rid, sid, ip]<\/code><\/pre>\n\n\n\n<p>And, here\u2019s an example of a summary message:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>May 11 10:00:39 scrooge SG_child&#91;808]: &#91;ID 748625 user.info] m:WR-SG-SUMMARY c:X\u00a0 vhost:iscrooge61.seclutions.com:80 (http) GET \/ => http:\/\/bali\/ , status:200 , redirection URL:&lt;n\/a> , referer:&lt;n\/a> , mapping:bali , request size: 421 , backend response size: 12960 , audit token:- , time statistics (microseconds): &#91;request total 16617 , allow\/deny filters 1290 , backend responsiveness 11845 , response processing 1643 , ICAP reqmod &lt;n\/a> , ICAP respmod &lt;n\/a> ] timestamp: &#91;2012-05-11 10:00:39] &#91; rid:T6zHJ38AAAEAAAo2BCwAAAMk sid:910e5dd02df49434d0db9b445ebba975 ip:172.18.61.2 ]<\/code><\/pre>\n\n\n\n<p>Which contains the following columns:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Column 1 = \"May 11 10:00:39\" > Timestamp\nColumn 2 = \"scrooge\" > Loghost\nColumn 3 = \"SG_child&#91;808]:\" > Application\/Process\nColumn 4 = \"&#91;ID 748625 user.info]\" > Syslog facility.level\nColumn 5 = \"m:WR-SG-SUMMARY\" > Message ID\nColumn 6 = \"c:X vhost:...\" > Message &#91;including time statistics and rid, sid, ip]<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">The Most Important Log Files to Track and Monitor<\/h3>\n\n\n\n<p><a href=\"https:\/\/stackify.com\/13-ways-to-tail-a-log-file-on-windows-unix\/\">Monitoring log files<\/a>&nbsp;is critical because it helps you manage any errors in the functioning of your OS. Some the types of relevant information you will receive includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>User issues<\/li>\n\n\n\n<li>Security breaches<\/li>\n\n\n\n<li>Hard disk crashes or power outages<\/li>\n<\/ul>\n\n\n\n<p>Of course, there are log files of high priority that you should always keep track of. <\/p>\n\n\n\n<p>The log files include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\/var\/log\/messages\u2013Contains most system messages<\/li>\n\n\n\n<li>\/var\/log\/secure\u2013Authentication messages<\/li>\n\n\n\n<li>\/var\/log\/cron\u2013Logs Cron job activities<\/li>\n\n\n\n<li>\/var\/log\/maillog\u2013Mail transactions<\/li>\n<\/ul>\n\n\n\n<p>If you were to look into \/var\/log\/messages, you would find:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The timestamp<\/li>\n\n\n\n<li>The hostname of the executing program<\/li>\n\n\n\n<li>Name of the utility that prompted the message<\/li>\n\n\n\n<li>The action that took place<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Pros and Cons of Syslog<\/h3>\n\n\n\n<p>One problematic scenario is when your \/var\/log\/messages file fills up due to&nbsp;<a href=\"https:\/\/security.stackexchange.com\/questions\/108824\/what-kind-of-misconfiguration-may-lead-to-publicly-accessible-webserver-logs\" target=\"_blank\" rel=\"noreferrer noopener\">logging misconfiguration<\/a>. Plus, there will be times when your system\u2019s logging will cause unforeseen issues. This is why it is imperative to understand how to control your logging and where your logs are saved. Plus, there may be some packet loss if there is a large burst of network traffic.<\/p>\n\n\n\n<p>Also, the fact that Syslog is based on UDP means there can be&nbsp;<a href=\"http:\/\/www.rexconsulting.net\/tip-centralized-logging-benefits.html\" target=\"_blank\" rel=\"noreferrer noopener\">issues with reliability<\/a>. On the other hand, as systems become more complex, it becomes increasingly important to collect and monitor all relevant data produced by applications.<\/p>\n\n\n\n<p>We analyze this data to determine how systems are behaving. <\/p>\n\n\n\n<p>Plus, logs are considered a reliable data source for understanding current system statistics and making trend predictions. Not to mention, logs are used for activities such as troubleshooting such or rolling back the system after a failure accident.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Best Practices<\/h3>\n\n\n\n<p>In terms of securing your log files, you will have many devices to generate that data. Still, it is a best practice to funnel all logs to a dedicated host. We should harden and secure this host.<\/p>\n\n\n\n<p>Moreover, you only want to open up the syslog port in all firewalls between you and the UDP\/514. If you have a geographic network, then you should have a local loghost\u2014at each location\u2013 that sends data to the central loghost.<\/p>\n\n\n\n<p>You can also rotate a log file once it reaches a particular size. Nonetheless, the\u00a0<a href=\"https:\/\/teklimbu.wordpress.com\/2007\/10\/16\/managing-your-linuxunix-log-files-using-logrotate\/\" target=\"_blank\" rel=\"noreferrer noopener\">UNIX logrotate utility<\/a>\u00a0will continue to write the log information to a new file after rotating the old file. <\/p>\n\n\n\n<p>Here are the keys to use:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\/usr\/sbin\/logrotate\u2013The logrotate command<\/li>\n\n\n\n<li>\/etc\/cron.daily\/logrotate\u2013The shell script that executes the logrotate command on a daily basis.<\/li>\n\n\n\n<li>\/etc\/logrotate.conf\u2013 global configuration for log rotation<\/li>\n\n\n\n<li>\/etc\/logrotate.d\u2013For individual packages<\/li>\n<\/ul>\n\n\n\n<p>To rotate a log file for every 1KB, use the logrotate.conf below<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ cat logrotate.conf\n\n\/tmp\/output.log {\n\nsize 1k\n\ncreate 700 bala bala\n\nrotate 4\n\n}<\/code><\/pre>\n\n\n\n<p>It gives you three options:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>size 1k\u2013logrotate only runs if the file size is equal to or greater than this size<\/li>\n\n\n\n<li>create\u2013rotate the original file and create a new file with configured users, groups and permissions<\/li>\n\n\n\n<li>rotate\u2013this keeps only the most recent four rotated log files<\/li>\n<\/ul>\n\n\n\n<p>Since an increasing number of organizations are moving to the cloud, the need for log management tools and services has never been greater. It is good to have centralized logs, but you also need the right tools to analyze them effectively. Going through files individually will&nbsp;<a href=\"https:\/\/stackify.com\/what-are-docker-logs\/\">drive you nuts.<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Tools For Centralized Logging<\/h3>\n\n\n\n<p><strong><a href=\"https:\/\/stackify.com\/retrace\/\">Retrace,<\/a><\/strong> one of Stackify\u2019s developer tools, is the only developer tool that combines APM, errors, metrics, and monitoring with logging to provide a fully-integrated, multi-environment tool that gives you app performance superpowers.<\/p>\n\n\n\n<p>For an open-source tool,&nbsp;<strong><a href=\"https:\/\/www.elastic.co\/products\/logstash\" target=\"_blank\" rel=\"noreferrer noopener\">Logstash<\/a><\/strong> can manages and collectes your events and logs. Plus, you can use it along with Kibana.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Wrapping Up<\/h2>\n\n\n\n<p>Syslog is a widely used tool that makes management of complex networks much more straightforward. Plus, with the right tools, you don\u2019t have to worry about the volume of data since you can filter easily and conveniently.<\/p>\n\n\n\n<p>For a list of 46 useful log management tools, check out our list <a href=\"https:\/\/stackify.com\/best-log-management-tools\/\">here.<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Additional Syslog Resources<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.howtoforge.com\/syslog-better-logging-tutorial\" target=\"_blank\" rel=\"noreferrer noopener\">Syslog Better Logging Tutorial<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/unix.stackexchange.com\/questions\/205883\/understand-logging-in-linux\" target=\"_blank\" rel=\"noreferrer noopener\">Understand logging in Linux<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.linkedin.com\/pulse\/understanding-syslog-servers-messages-security-hani-al-madkhali\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Syslog: Servers, Messages &amp; Security<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/serverfault.com\/questions\/681293\/understanding-syslog-conf-targeting-specific-types-tags-of-logs\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding syslog conf \u2013 targeting specific types \/ tags of logs<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/searchdatacenter.techtarget.com\/tip\/Setting-up-a-centralized-Linux-log-server\" target=\"_blank\" rel=\"noreferrer noopener\">Setting up a centralized Linux log server<\/a><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Syslog offers a central repository for logs from multiple sources. Understand how syslog works, its components, benefits, and best practices.<\/p>\n","protected":false},"author":14,"featured_media":45026,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[26],"class_list":["post-12382","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-developers","tag-logging"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.6 (Yoast SEO v25.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is Syslog: An Introductory Tutorial<\/title>\n<meta name=\"description\" content=\"In this Syslog tutorial, we&#039;ll cover how syslog works and provide examples. We&#039;ll also discuss best practices including tools that can help.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/stackify.com\/syslog-101\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Syslog: An Introductory Tutorial\" \/>\n<meta property=\"og:description\" content=\"In this Syslog tutorial, we&#039;ll cover how syslog works and provide examples. We&#039;ll also discuss best practices including tools that can help.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/stackify.com\/syslog-101\/\" \/>\n<meta property=\"og:site_name\" content=\"Stackify\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Stackify\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-27T20:53:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-02T16:50:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/640x360-12-What-Is-Syslog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Stackify Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@stackify\" \/>\n<meta name=\"twitter:site\" content=\"@stackify\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stackify Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/stackify.com\/syslog-101\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/stackify.com\/syslog-101\/\"},\"author\":{\"name\":\"Stackify Team\",\"@id\":\"https:\/\/stackify.com\/#\/schema\/person\/17745b16e8a04befc464e9669d6e7e59\"},\"headline\":\"What Is Syslog: An Introductory Tutorial\",\"datePublished\":\"2024-11-27T20:53:25+00:00\",\"dateModified\":\"2024-12-02T16:50:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/stackify.com\/syslog-101\/\"},\"wordCount\":2164,\"publisher\":{\"@id\":\"https:\/\/stackify.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/stackify.com\/syslog-101\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/640x360-12-What-Is-Syslog.png\",\"keywords\":[\"logging\"],\"articleSection\":[\"Developer Tips, Tricks &amp; Resources\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/stackify.com\/syslog-101\/\",\"url\":\"https:\/\/stackify.com\/syslog-101\/\",\"name\":\"What Is Syslog: An Introductory Tutorial\",\"isPartOf\":{\"@id\":\"https:\/\/stackify.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/stackify.com\/syslog-101\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/stackify.com\/syslog-101\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/640x360-12-What-Is-Syslog.png\",\"datePublished\":\"2024-11-27T20:53:25+00:00\",\"dateModified\":\"2024-12-02T16:50:12+00:00\",\"description\":\"In this Syslog tutorial, we'll cover how syslog works and provide examples. We'll also discuss best practices including tools that can help.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/stackify.com\/syslog-101\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/stackify.com\/syslog-101\/#primaryimage\",\"url\":\"https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/640x360-12-What-Is-Syslog.png\",\"contentUrl\":\"https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/640x360-12-What-Is-Syslog.png\",\"width\":640,\"height\":360},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/stackify.com\/#website\",\"url\":\"https:\/\/stackify.com\/\",\"name\":\"Stackify\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/stackify.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/stackify.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/stackify.com\/#organization\",\"name\":\"Stackify\",\"url\":\"https:\/\/stackify.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/stackify.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/stackify.com\/wp-content\/uploads\/2024\/05\/logo-1.png\",\"contentUrl\":\"https:\/\/stackify.com\/wp-content\/uploads\/2024\/05\/logo-1.png\",\"width\":1377,\"height\":430,\"caption\":\"Stackify\"},\"image\":{\"@id\":\"https:\/\/stackify.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Stackify\/\",\"https:\/\/x.com\/stackify\",\"https:\/\/www.instagram.com\/stackify\/\",\"https:\/\/www.linkedin.com\/company\/2596184\",\"https:\/\/www.youtube.com\/stackify\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/stackify.com\/#\/schema\/person\/17745b16e8a04befc464e9669d6e7e59\",\"name\":\"Stackify Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/stackify.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b3f4b8e5d5b39734bb1b5a6661faa538?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b3f4b8e5d5b39734bb1b5a6661faa538?s=96&d=mm&r=g\",\"caption\":\"Stackify Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Is Syslog: An Introductory Tutorial","description":"In this Syslog tutorial, we'll cover how syslog works and provide examples. We'll also discuss best practices including tools that can help.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/stackify.com\/syslog-101\/","og_locale":"en_US","og_type":"article","og_title":"What Is Syslog: An Introductory Tutorial","og_description":"In this Syslog tutorial, we'll cover how syslog works and provide examples. We'll also discuss best practices including tools that can help.","og_url":"https:\/\/stackify.com\/syslog-101\/","og_site_name":"Stackify","article_publisher":"https:\/\/www.facebook.com\/Stackify\/","article_published_time":"2024-11-27T20:53:25+00:00","article_modified_time":"2024-12-02T16:50:12+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/640x360-12-What-Is-Syslog.png","type":"image\/png"}],"author":"Stackify Team","twitter_card":"summary_large_image","twitter_creator":"@stackify","twitter_site":"@stackify","twitter_misc":{"Written by":"Stackify Team","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/stackify.com\/syslog-101\/#article","isPartOf":{"@id":"https:\/\/stackify.com\/syslog-101\/"},"author":{"name":"Stackify Team","@id":"https:\/\/stackify.com\/#\/schema\/person\/17745b16e8a04befc464e9669d6e7e59"},"headline":"What Is Syslog: An Introductory Tutorial","datePublished":"2024-11-27T20:53:25+00:00","dateModified":"2024-12-02T16:50:12+00:00","mainEntityOfPage":{"@id":"https:\/\/stackify.com\/syslog-101\/"},"wordCount":2164,"publisher":{"@id":"https:\/\/stackify.com\/#organization"},"image":{"@id":"https:\/\/stackify.com\/syslog-101\/#primaryimage"},"thumbnailUrl":"https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/640x360-12-What-Is-Syslog.png","keywords":["logging"],"articleSection":["Developer Tips, Tricks &amp; Resources"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/stackify.com\/syslog-101\/","url":"https:\/\/stackify.com\/syslog-101\/","name":"What Is Syslog: An Introductory Tutorial","isPartOf":{"@id":"https:\/\/stackify.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/stackify.com\/syslog-101\/#primaryimage"},"image":{"@id":"https:\/\/stackify.com\/syslog-101\/#primaryimage"},"thumbnailUrl":"https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/640x360-12-What-Is-Syslog.png","datePublished":"2024-11-27T20:53:25+00:00","dateModified":"2024-12-02T16:50:12+00:00","description":"In this Syslog tutorial, we'll cover how syslog works and provide examples. We'll also discuss best practices including tools that can help.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/stackify.com\/syslog-101\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/stackify.com\/syslog-101\/#primaryimage","url":"https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/640x360-12-What-Is-Syslog.png","contentUrl":"https:\/\/stackify.com\/wp-content\/uploads\/2024\/11\/640x360-12-What-Is-Syslog.png","width":640,"height":360},{"@type":"WebSite","@id":"https:\/\/stackify.com\/#website","url":"https:\/\/stackify.com\/","name":"Stackify","description":"","publisher":{"@id":"https:\/\/stackify.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/stackify.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/stackify.com\/#organization","name":"Stackify","url":"https:\/\/stackify.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/stackify.com\/#\/schema\/logo\/image\/","url":"https:\/\/stackify.com\/wp-content\/uploads\/2024\/05\/logo-1.png","contentUrl":"https:\/\/stackify.com\/wp-content\/uploads\/2024\/05\/logo-1.png","width":1377,"height":430,"caption":"Stackify"},"image":{"@id":"https:\/\/stackify.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Stackify\/","https:\/\/x.com\/stackify","https:\/\/www.instagram.com\/stackify\/","https:\/\/www.linkedin.com\/company\/2596184","https:\/\/www.youtube.com\/stackify"]},{"@type":"Person","@id":"https:\/\/stackify.com\/#\/schema\/person\/17745b16e8a04befc464e9669d6e7e59","name":"Stackify Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/stackify.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b3f4b8e5d5b39734bb1b5a6661faa538?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b3f4b8e5d5b39734bb1b5a6661faa538?s=96&d=mm&r=g","caption":"Stackify Team"}}]}},"_links":{"self":[{"href":"https:\/\/stackify.com\/wp-json\/wp\/v2\/posts\/12382"}],"collection":[{"href":"https:\/\/stackify.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stackify.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stackify.com\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/stackify.com\/wp-json\/wp\/v2\/comments?post=12382"}],"version-history":[{"count":6,"href":"https:\/\/stackify.com\/wp-json\/wp\/v2\/posts\/12382\/revisions"}],"predecessor-version":[{"id":45025,"href":"https:\/\/stackify.com\/wp-json\/wp\/v2\/posts\/12382\/revisions\/45025"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stackify.com\/wp-json\/wp\/v2\/media\/45026"}],"wp:attachment":[{"href":"https:\/\/stackify.com\/wp-json\/wp\/v2\/media?parent=12382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stackify.com\/wp-json\/wp\/v2\/categories?post=12382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stackify.com\/wp-json\/wp\/v2\/tags?post=12382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}