What Are Syslog Levels?

Explore syslog severity levels and their importance in log management.

What Are Syslog Levels?

  • Syslog is a standard protocol that devices and applications can use to send log and event messages to a centralized server for storage, monitoring, and analysis. The original BSD format (RFC3164) for syslog messages has a structure that indicates the message’s priority level, the time of creation, the machine responsible for generating the message, and the message itself. It is written as <priority>timestamp hostname: message. The priority value is a numerical code that represents both the facility (the source of the log, such as a kernel, mail system, or authentication service) and the severity levels of the message.

    Syslog logging levels can help you understand the urgency of messages, enabling you to quickly assess problems, prioritize issues, and take appropriate action. They are categorized into eight levels, ranging from 0 (Emergency) through 7 (Debug). Lower numbers indicate more extreme events, such as system-wide failures, while higher syslog security levels provide helpful information for monitoring and troubleshooting.

  • There are eight syslog severity levels, numbered zero through seven, including:

    0: Emergency

    This is the most critical syslog severity level, indicating that a system is completely unusable and requires immediate attention and resolution. For example, if your database server crashes and applications that rely on it become unresponsive, you may receive a log with an Emergency syslog severity level. Extensive network failures, power outages, major cyberattacks, and hardware malfunctions that make several applications, servers, sites, or your entire system inoperable can also result in syslog messages at the Emergency level.

    When faced with an Emergency severity level, it’s crucial to immediately minimize downtime and prevent issues from worsening. Otherwise, your system may suffer severe downtime, data loss, and irreparable damage. Immediately notify the appropriate IT personnel and implement any emergency recovery procedures, such as activating failover systems, rerouting traffic, or restoring backups. You may also want to isolate any impacted systems to contain the issue and prevent further damage.

    It’s also a good idea to closely examine your system logs and error messages to try and pinpoint the root cause of the issue. Not only can this help resolve your current problem faster, but it can also help prevent similar issues from recurring in the future.

    1: Alert

    Log messages at the Alert syslog severity level are signs of serious issues you need to correct immediately but aren’t rendering your entire system unusable. If you lose a backup internet service provider (ISP) connection, a security breach or database corruption is detected, you may receive an Alert-level  log message.

    When you receive a message with an Alert syslog severity level, notify your IT and security teams quickly so they can review system logs and diagnostic reports to get to the root cause of the issue. It’s also essential to apply any necessary fixes as soon as possible. This can involve switching to an alternative service, patching security vulnerabilities, restoring corrupted data, or restarting failed services. By addressing Alert-level logs as quickly as possible, you can prevent disruptions from escalating into more severe issues that could impact your organization’s entire infrastructure and cause an Emergency-level crisis.

    2: Critical

    While not as urgent as Emergency or Alert levels, log messages at this syslog security level signify a serious situation or condition that requires attention and indicate a failure that could significantly impact system operations if not addressed promptly. Critical conditions often involve hardware failures, major software crashes, and other problems that could quickly escalate into system-wide outages or severe performance degradation.

    Common examples of events that could result in Critical syslog levels include failing hard drives in RAID arrays, major application crashes, redundant server power supply failures, failed backup processes, and high CPU or memory usage. While these issues may not immediately bring down your entire system, they can cause significant disruptions and ultimately hamper all operations if left unresolved. That’s why it’s essential to investigate logs and diagnostics to determine the cause of the issue and apply the appropriate fixes, whether replacing faulty hardware or restoring lost data.

    3: Error

    You may receive Error-level syslog messages when your system experiences non-critical errors that require investigation and troubleshooting. Error-level logs can occur when a scheduled task fails to execute correctly, an application exceeds its file storage limit and is unable to save new data, a hardware component malfunctions, or a software application crashes without impacting other services.

    While these issues don’t threaten a system’s stability, they can impact performance, reliability, and user experience if left unaddressed. For example, suppose your application can’t write logs because it has run out of disk space. The application will still be able to run, but diagnosing the root cause of future issues will be extremely difficult without logs to refer to.

    4: Warning

    Warning-level syslog messages indicate that your system has potential issues that aren’t immediately critical. These issues may require your attention and should be monitored to prevent future failures. Often, you can use Warning log messages to take preventative action and avoid failures in the future.

    Warning-level log messages include performance irregularities, CPU or memory usage nearing critical levels, repeated authentication failures, low but not yet exhausted entire disk space, higher-than-normal packet loss, increased network latency, and non-critical configuration issues.

    5: Notice

    Notice-level messages indicate normal but significant events that don’t necessarily require immediate action. However, you should review them, as they can provide early warnings of potential issues, confirm important system changes, and assist with compliance tracking.

    Examples of Notice-level logs include users modifying configuration files and gaining elevated privileges. Re-establishing a network connection after a disruption or completing a scheduled system update can also generate Notice-level messages.

    While none of these are necessarily indicative of an error, they may require special attention or handling. By reviewing notice logs and correlating them with other log levels to uncover trends or anomalies, you can more easily track system changes, identify patterns that could turn into higher-severity issues, and better maintain compliance with regulations.

    6: Informational

    Messages at the Informational level provide operational information and status updates. For example, you can learn about status reports, network traffic, and the completion of routine operations, such as user logins, scheduled jobs, database backups, and system bootups. Essentially, Informational logs can confirm whether systems are running as intended and expected.

    While Informational logs don’t contain directly actionable information, they can provide much-needed visibility into your system operations, performance, and resource allocation. You will also be able to more easily monitor and identify trends, which could prevent potential issues from escalating into more serious problems. For example, by regularly reviewing Informational logs, you might notice patterns of increased login failures, system reboots, or network activity that could indicate underlying concerns, enabling you to take targeted action before they develop into Warning or Error-level issues.

    It’s a good idea to keep all your Informational logs carefully organized and easily accessible. This can help in the case of security incidents or data breaches and demonstrate compliance with industry regulations, such as HIPAA, GDPR, and PCI DSS. To reduce the consumption of storage and processing resources, you can move, compress, and delete logs on a regular schedule.

    7: Debug

    Debug-level messages contain information that can be useful to developers while they are debugging, troubleshooting, and fine-tuning your application. Debug logs can help you gain valuable insights into system behavior, processes, database queries, and system resource allocations. This will enable you to identify and resolve issues efficiently, ensuring your application runs smoothly and performs optimally.

    However, once the application is launched, keeping track of Debug-level messages can be more of a hassle than a help. They can quickly generate a significant volume of data, rapidly consuming storage and processing resources if left unchecked. That’s why most people turn off Debug logging once their application runs or use strict log filtering and retention policies.

  • Understanding syslog severity levels is crucial for maintaining a secure and efficient IT environment. These levels help categorize log messages by urgency, making it easier to prioritize responses and prevent minor issues from escalating. Without a clear grasp of severity levels, your team may struggle to differentiate routine events from critical threats, leading to slower troubleshooting, increased downtime, and a poorer user experience.

    Syslog levels are also helpful in automating monitoring and alerting systems, as many teams use log management tools and security Information and event management (SIEM) platforms. These solutions can filter logs, trigger alerts, and take automatic action based on a log’s severity level. This can lead to reduced alert fatigue, improved incident response, stronger cybersecurity, better resource allocation, improved compliance with regulatory requirements, and a stronger understanding of your overall system health.

  • Syslog severity levels categorize incoming log messages based on importance, enabling IT teams to efficiently manage and respond to events. Syslog daemons will process log messages based on their syslog severity level.

    First, a device or application creates a log message and assigns it a specific severity level, ranging from 0 (Emergency) through 7 (Debug). The syslog daemon receives this log message and processes it based on predefined rules. For example, an Emergency-level log might trigger an immediate alert to IT personnel, ensuring they take action to prevent catastrophic failures. Meanwhile, an Informational-level log might be recorded for future reference.

    By configuring your log management system to filter, store, or forward logs based on their severity level, you can prioritize critical issues while ensuring lower severity messages are archived for future troubleshooting, compliance, or performance monitoring efforts.

  • Most of the time, organizations configure their syslog servers with default settings to help more efficiently manage and prioritize log messages. Usually, it makes sense to set logs at the Emergency, Critical, and Alert levels to trigger immediate alerts to ensure your IT team is informed of major incidents quickly and can act.

    You might prefer to store Error and Warning logs and use them for regular monitoring. They can help your team identify recurring issues and visualize trends, allowing your team to proactively step in and address problems before they escalate.

    On the other hand, Notice, Informational, and Debug logs don’t usually require active monitoring. They are recorded and can provide insights into normal system operations. However, this isn’t particularly useful on a day-to-day basis. Instead, you may need to consult these log levels during an audit or while troubleshooting specific issues.

Featured in this Resource
Like what you see? Try out the products.
Kiwi Syslog Server NG

New generation of affordable on-premises software to manage syslog messages, SNMP traps, and Windows event logs.

Email Link To TrialFully functional for 14 days
Papertrail

Cloud-hosted log management for faster troubleshooting of infrastructure and application issues.