// SPDX-License-Identifier: GPL-3.0-or-later #include "systemd-cat-native.h" #include "../required_dummies.h" #ifdef __FreeBSD__ #include #endif #ifdef __APPLE__ #include #endif static void log_message_to_stderr(BUFFER *msg) { CLEAN_BUFFER *tmp = buffer_create(0, NULL); for(size_t i = 0; i < msg->len ;i++) { if(isprint(msg->buffer[i])) buffer_putc(tmp, msg->buffer[i]); else { buffer_putc(tmp, '['); buffer_print_uint64_hex(tmp, msg->buffer[i]); buffer_putc(tmp, ']'); } } fprintf(stderr, "SENDING: %s\n", buffer_tostring(tmp)); } static inline buffered_reader_ret_t get_next_line(struct buffered_reader *reader, BUFFER *line, int timeout_ms) { while(true) { if(unlikely(!buffered_reader_next_line(reader, line))) { buffered_reader_ret_t ret = buffered_reader_read_timeout(reader, STDIN_FILENO, timeout_ms, false); if(unlikely(ret != BUFFERED_READER_READ_OK)) return ret; continue; } else { // make sure the buffer is NULL terminated line->buffer[line->len] = '\0'; // remove the trailing newlines while(line->len && line->buffer[line->len - 1] == '\n') line->buffer[--line->len] = '\0'; return BUFFERED_READER_READ_OK; } } } static inline size_t copy_replacing_newlines(char *dst, size_t dst_len, const char *src, size_t src_len, const char *newline) { if (!dst || !src) return 0; const char *current_src = src; const char *src_end = src + src_len; // Pointer to the end of src char *current_dst = dst; size_t remaining_dst_len = dst_len; size_t newline_len = newline && *newline ? strlen(newline) : 0; size_t bytes_copied = 0; // To track the number of bytes copied while (remaining_dst_len > 1 && current_src < src_end) { if (newline_len > 0) { const char *found = strstr(current_src, newline); if (found && found < src_end) { size_t copy_len = found - current_src; if (copy_len >= remaining_dst_len) copy_len = remaining_dst_len - 1; memcpy(current_dst, current_src, copy_len); current_dst += copy_len; *current_dst++ = '\n'; remaining_dst_len -= (copy_len + 1); bytes_copied += copy_len + 1; // +1 for the newline character current_src = found + newline_len; continue; } } // Copy the remaining part of src to dst size_t copy_len = src_end - current_src; if (copy_len >= remaining_dst_len) copy_len = remaining_dst_len - 1; memcpy(current_dst, current_src, copy_len); current_dst += copy_len; remaining_dst_len -= copy_len; bytes_copied += copy_len; break; } // Ensure the string is null-terminated *current_dst = '\0'; return bytes_copied; } static inline void buffer_memcat_replacing_newlines(BUFFER *wb, const char *src, size_t src_len, const char *newline) { if(!src) return; const char *equal; if(!newline || !*newline || !strstr(src, newline) || !(equal = strchr(src, '='))) { buffer_memcat(wb, src, src_len); buffer_putc(wb, '\n'); return; } size_t key_len = equal - src; buffer_memcat(wb, src, key_len); buffer_putc(wb, '\n'); char *length_ptr = &wb->buffer[wb->len]; uint64_t le_size = 0; buffer_memcat(wb, &le_size, sizeof(le_size)); const char *value = ++equal; size_t value_len = src_len - key_len - 1; buffer_need_bytes(wb, value_len + 1); size_t size = copy_replacing_newlines(&wb->buffer[wb->len], value_len + 1, value, value_len, newline); wb->len += size; buffer_putc(wb, '\n'); le_size = htole64(size); memcpy(length_ptr, &le_size, sizeof(le_size)); } // ---------------------------------------------------------------------------- // log to a systemd-journal-remote #ifdef HAVE_CURL #include #ifndef HOST_NAME_MAX #define HOST_NAME_MAX 256 #endif char global_hostname[HOST_NAME_MAX] = ""; char global_boot_id[UUID_COMPACT_STR_LEN] = ""; char global_machine_id[UUID_COMPACT_STR_LEN] = ""; char global_stream_id[UUID_COMPACT_STR_LEN] = ""; char global_namespace[1024] = ""; char global_systemd_invocation_id[1024] = ""; #define BOOT_ID_PATH "/proc/sys/kernel/random/boot_id" #define MACHINE_ID_PATH "/etc/machine-id" #define DEFAULT_PRIVATE_KEY "/etc/ssl/private/journal-upload.pem" #define DEFAULT_PUBLIC_KEY "/etc/ssl/certs/journal-upload.pem" #define DEFAULT_CA_CERT "/etc/ssl/ca/trusted.pem" struct upload_data { char *data; size_t length; }; static size_t systemd_journal_remote_read_callback(void *ptr, size_t size, size_t nmemb, void *userp) { struct upload_data *upload = (struct upload_data *)userp; size_t buffer_size = size * nmemb; if (upload->length) { size_t copy_size = upload->length < buffer_size ? upload->length : buffer_size; memcpy(ptr, upload->data, copy_size); upload->data += copy_size; upload->length -= copy_size; return copy_size; } return 0; } CURL* initialize_connection_to_systemd_journal_remote(const char* url, const char* private_key, const char* public_key, const char* ca_cert, struct curl_slist **headers) { CURL *curl = curl_easy_init(); if (!curl) { fprintf(stderr, "Failed to initialize curl\n"); return NULL; } *headers = curl_slist_append(*headers, "Content-Type: application/vnd.fdo.journal"); *headers = curl_slist_append(*headers, "Transfer-Encoding: chunked"); curl_easy_setopt(curl, CURLOPT_HTTPHEADER, *headers); curl_easy_setopt(curl, CURLOPT_URL, url); curl_easy_setopt(curl, CURLOPT_POST, 1L); curl_easy_setopt(curl, CURLOPT_READFUNCTION, systemd_journal_remote_read_callback); if (strncmp(url, "https://", 8) == 0) { if (private_key) curl_easy_setopt(curl, CURLOPT_SSLKEY, private_key); if (public_key) curl_easy_setopt(curl, CURLOPT_SSLCERT, public_key); if (strcmp(ca_cert, "all") != 0) { curl_easy_setopt(curl, CURLOPT_CAINFO, ca_cert); } else { curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0L); } } // curl_easy_setopt(curl, CURLOPT_VERBOSE, 1L); // Remove for less verbose output return curl; } static void journal_remote_complete_event(BUFFER *msg, usec_t *monotonic_ut) { usec_t ut = now_monotonic_usec(); if(monotonic_ut) *monotonic_ut = ut; buffer_sprintf(msg, "" "__REALTIME_TIMESTAMP=%llu\n" "__MONOTONIC_TIMESTAMP=%llu\n" "_MACHINE_ID=%s\n" "_BOOT_ID=%s\n" "_HOSTNAME=%s\n" "_TRANSPORT=stdout\n" "_LINE_BREAK=nul\n" "_STREAM_ID=%s\n" "_RUNTIME_SCOPE=system\n" "%s%s\n" , now_realtime_usec() , ut , global_machine_id , global_boot_id , global_hostname , global_stream_id , global_namespace , global_systemd_invocation_id ); } static CURLcode journal_remote_send_buffer(CURL* curl, BUFFER *msg) { // log_message_to_stderr(msg); struct upload_data upload = {0}; if (!curl || !buffer_strlen(msg)) return CURLE_FAILED_INIT; upload.data = (char *) buffer_tostring(msg); upload.length = buffer_strlen(msg); curl_easy_setopt(curl, CURLOPT_READDATA, &upload); curl_easy_setopt(curl, CURLOPT_INFILESIZE_LARGE, (curl_off_t)upload.length); return curl_easy_perform(curl); } typedef enum { LOG_TO_JOURNAL_REMOTE_BAD_PARAMS = -1, LOG_TO_JOURNAL_REMOTE_CANNOT_INITIALIZE = -2, LOG_TO_JOURNAL_REMOTE_CANNOT_SEND = -3, LOG_TO_JOURNAL_REMOTE_CANNOT_READ = -4, } log_to_journal_remote_ret_t; static log_to_journal_remote_ret_t log_input_to_journal_remote(const char *url, const char *key, const char *cert, const char *trust, const char *newline, int timeout_ms) { if(!url || !*url) { fprintf(stderr, "No URL is given.\n"); return LOG_TO_JOURNAL_REMOTE_BAD_PARAMS; } if(timeout_ms < 10) timeout_ms = 10; global_boot_id[0] = '\0'; char buffer[1024]; if(read_file(BOOT_ID_PATH, buffer, sizeof(buffer)) == 0) { uuid_t uuid; if(uuid_parse_flexi(buffer, uuid) == 0) uuid_unparse_lower_compact(uuid, global_boot_id); else fprintf(stderr, "WARNING: cannot parse the UUID found in '%s'.\n", BOOT_ID_PATH); } if(global_boot_id[0] == '\0') { fprintf(stderr, "WARNING: cannot read '%s'. Will generate a random _BOOT_ID.\n", BOOT_ID_PATH); uuid_t uuid; uuid_generate_random(uuid); uuid_unparse_lower_compact(uuid, global_boot_id); } if(read_file(MACHINE_ID_PATH, buffer, sizeof(buffer)) == 0) { uuid_t uuid; if(uuid_parse_flexi(buffer, uuid) == 0) uuid_unparse_lower_compact(uuid, global_machine_id); else fprintf(stderr, "WARNING: cannot parse the UUID found in '%s'.\n", MACHINE_ID_PATH); } if(global_machine_id[0] == '\0') { fprintf(stderr, "WARNING: cannot read '%s'. Will generate a random _MACHINE_ID.\n", MACHINE_ID_PATH); uuid_t uuid; uuid_generate_random(uuid); uuid_unparse_lower_compact(uuid, global_boot_id); } if(global_stream_id[0] == '\0') { uuid_t uuid; uuid_generate_random(uuid); uuid_unparse_lower_compact(uuid, global_stream_id); } if(global_hostname[0] == '\0') { if(gethostname(global_hostname, sizeof(global_hostname)) != 0) { fprintf(stderr, "WARNING: cannot get system's hostname. Will use internal default.\n"); snprintfz(global_hostname, sizeof(global_hostname), "systemd-cat-native-unknown-hostname"); } } if(global_systemd_invocation_id[0] == '\0' && getenv("INVOCATION_ID")) snprintfz(global_systemd_invocation_id, sizeof(global_systemd_invocation_id), "_SYSTEMD_INVOCATION_ID=%s\n", getenv("INVOCATION_ID")); if(!key) key = DEFAULT_PRIVATE_KEY; if(!cert) cert = DEFAULT_PUBLIC_KEY; if(!trust) trust = DEFAULT_CA_CERT; char full_url[4096]; snprintfz(full_url, sizeof(full_url), "%s/upload", url); CURL *curl; CURLcode res = CURLE_OK; struct curl_slist *headers = NULL; curl_global_init(CURL_GLOBAL_ALL); curl = initialize_connection_to_systemd_journal_remote(full_url, key, cert, trust, &headers); if(!curl) return LOG_TO_JOURNAL_REMOTE_CANNOT_INITIALIZE; struct buffered_reader reader; buffered_reader_init(&reader); CLEAN_BUFFER *line = buffer_create(sizeof(reader.read_buffer), NULL); CLEAN_BUFFER *msg = buffer_create(sizeof(reader.read_buffer), NULL); size_t msg_full_events = 0; size_t msg_partial_fields = 0; usec_t msg_started_ut = 0; size_t failures = 0; size_t messages_logged = 0; log_to_journal_remote_ret_t ret = 0; while(true) { buffered_reader_ret_t rc = get_next_line(&reader, line, timeout_ms); if(rc == BUFFERED_READER_READ_POLL_TIMEOUT) { if(msg_full_events && !msg_partial_fields) { res = journal_remote_send_buffer(curl, msg); if(res != CURLE_OK) { fprintf(stderr, "journal_remote_send_buffer() failed: %s\n", curl_easy_strerror(res)); failures++; ret = LOG_TO_JOURNAL_REMOTE_CANNOT_SEND; goto cleanup; } else messages_logged++; msg_full_events = 0; buffer_flush(msg); } } else if(rc == BUFFERED_READER_READ_OK) { if(!line->len) { // an empty line - we are done for this message if(msg_partial_fields) { msg_partial_fields = 0; usec_t ut; journal_remote_complete_event(msg, &ut); if(!msg_full_events) msg_started_ut = ut; msg_full_events++; if(ut - msg_started_ut >= USEC_PER_SEC / 2) { res = journal_remote_send_buffer(curl, msg); if(res != CURLE_OK) { fprintf(stderr, "journal_remote_send_buffer() failed: %s\n", curl_easy_strerror(res)); failures++; ret = LOG_TO_JOURNAL_REMOTE_CANNOT_SEND; goto cleanup; } else messages_logged++; msg_full_events = 0; buffer_flush(msg); } } } else { buffer_memcat_replacing_newlines(msg, line->buffer, line->len, newline); msg_partial_fields++; } buffer_flush(line); } else { fprintf(stderr, "cannot read input data, failed with code %d\n", rc); ret = LOG_TO_JOURNAL_REMOTE_CANNOT_READ; break; } } if (msg_full_events || msg_partial_fields) { if(msg_partial_fields) { msg_partial_fields = 0; msg_full_events++; journal_remote_complete_event(msg, NULL); } if(msg_full_events) { res = journal_remote_send_buffer(curl, msg); if(res != CURLE_OK) { fprintf(stderr, "journal_remote_send_buffer() failed: %s\n", curl_easy_strerror(res)); failures++; } else messages_logged++; msg_full_events = 0; buffer_flush(msg); } } cleanup: curl_easy_cleanup(curl); curl_slist_free_all(headers); curl_global_cleanup(); return ret; } #endif static int help(void) { fprintf(stderr, "\n" "Netdata systemd-cat-native " PACKAGE_VERSION "\n" "\n" "This program reads from its standard input, lines in the format:\n" "\n" "KEY1=VALUE1\\n\n" "KEY2=VALUE2\\n\n" "KEYN=VALUEN\\n\n" "\\n\n" "\n" "and sends them to systemd-journal.\n" "\n" " - Binary journal fields are not accepted at its input\n" " - Binary journal fields can be generated after newline processing\n" " - Messages have to be separated by an empty line\n" " - Keys starting with underscore are not accepted (by journald)\n" " - Other rules imposed by systemd-journald are imposed (by journald)\n" "\n" "Usage:\n" "\n" " %s\n" " [--newline=STRING]\n" " [--log-as-netdata|-N]\n" " [--namespace=NAMESPACE] [--socket=PATH]\n" #ifdef HAVE_CURL " [--url=URL [--key=FILENAME] [--cert=FILENAME] [--trust=FILENAME|all]]\n" #endif "\n" "The program has the following modes of logging:\n" "\n" " * Log to a local systemd-journald or stderr\n" "\n" " This is the default mode. If systemd-journald is available, logs will be\n" " sent to systemd, otherwise logs will be printed on stderr, using logfmt\n" " formatting. Options --socket and --namespace are available to configure\n" " the journal destination:\n" "\n" " --socket=PATH\n" " The path of a systemd-journald UNIX socket.\n" " The program will use the default systemd-journald socket when this\n" " option is not used.\n" "\n" " --namespace=NAMESPACE\n" " The name of a configured and running systemd-journald namespace.\n" " The program will produce the socket path based on its internal\n" " defaults, to send the messages to the systemd journal namespace.\n" "\n" " * Log as Netdata, enabled with --log-as-netdata or -N\n" "\n" " In this mode the program uses environment variables set by Netdata for\n" " the log destination. Only log fields defined by Netdata are accepted.\n" " If the environment variables expected by Netdata are not found, it\n" " falls back to stderr logging in logfmt format.\n" #ifdef HAVE_CURL "\n" " * Log to a systemd-journal-remote TCP socket, enabled with --url=URL\n" "\n" " In this mode, the program will directly sent logs to a remote systemd\n" " journal (systemd-journal-remote expected at the destination)\n" " This mode is available even when the local system does not support\n" " systemd, or even it is not Linux, allowing a remote Linux systemd\n" " journald to become the logs database of the local system.\n" "\n" " Unfortunately systemd-journal-remote does not accept compressed\n" " data over the network, so the stream will be uncompressed.\n" "\n" " --url=URL\n" " The destination systemd-journal-remote address and port, similarly\n" " to what /etc/systemd/journal-upload.conf accepts.\n" " Usually it is in the form: https://ip.address:19532\n" " Both http and https URLs are accepted. When using https, the\n" " following additional options are accepted:\n" "\n" " --key=FILENAME\n" " The filename of the private key of the server.\n" " The default is: " DEFAULT_PRIVATE_KEY "\n" "\n" " --cert=FILENAME\n" " The filename of the public key of the server.\n" " The default is: " DEFAULT_PUBLIC_KEY "\n" "\n" " --trust=FILENAME | all\n" " The filename of the trusted CA public key.\n" " The default is: " DEFAULT_CA_CERT "\n" " The keyword 'all' can be used to trust all CAs.\n" "\n" " --namespace=NAMESPACE\n" " Set the namespace of the messages sent.\n" "\n" " --keep-trying\n" " Keep trying to send the message, if the remote journal is not there.\n" #endif "\n" " NEWLINES PROCESSING\n" " systemd-journal logs entries may have newlines in them. However the\n" " Journal Export Format uses binary formatted data to achieve this,\n" " making it hard for text processing.\n" "\n" " To overcome this limitation, this program allows single-line text\n" " formatted values at its input, to be binary formatted multi-line Journal\n" " Export Format at its output.\n" "\n" " To achieve that it allows replacing a given string to a newline.\n" " The parameter --newline=STRING allows setting the string to be replaced\n" " with newlines.\n" "\n" " For example by setting --newline='--NEWLINE--', the program will replace\n" " all occurrences of --NEWLINE-- with the newline character, within each\n" " VALUE of the KEY=VALUE lines. Once this this done, the program will\n" " switch the field to the binary Journal Export Format before sending the\n" " log event to systemd-journal.\n" "\n", program_name); return 1; } // ---------------------------------------------------------------------------- // log as Netdata static void lgs_reset(struct log_stack_entry *lgs) { for(size_t i = 1; i < _NDF_MAX ;i++) { if(lgs[i].type == NDFT_TXT && lgs[i].set && lgs[i].txt) freez((void *)lgs[i].txt); lgs[i] = ND_LOG_FIELD_TXT(i, NULL); } lgs[0] = ND_LOG_FIELD_TXT(NDF_MESSAGE, NULL); lgs[_NDF_MAX] = ND_LOG_FIELD_END(); } static const char *strdupz_replacing_newlines(const char *src, const char *newline) { if(!src) src = ""; size_t src_len = strlen(src); char *buffer = mallocz(src_len + 1); copy_replacing_newlines(buffer, src_len + 1, src, src_len, newline); return buffer; } static int log_input_as_netdata(const char *newline, int timeout_ms) { struct buffered_reader reader; buffered_reader_init(&reader); CLEAN_BUFFER *line = buffer_create(sizeof(reader.read_buffer), NULL); ND_LOG_STACK lgs[_NDF_MAX + 1] = { 0 }; ND_LOG_STACK_PUSH(lgs); lgs_reset(lgs); size_t fields_added = 0; size_t messages_logged = 0; ND_LOG_FIELD_PRIORITY priority = NDLP_INFO; while(get_next_line(&reader, line, timeout_ms) == BUFFERED_READER_READ_OK) { if(!line->len) { // an empty line - we are done for this message nd_log(NDLS_HEALTH, priority, "added %d fields", // if the user supplied a MESSAGE, this will be ignored fields_added); lgs_reset(lgs); fields_added = 0; messages_logged++; } else { char *equal = strchr(line->buffer, '='); if(equal) { const char *field = line->buffer; size_t field_len = equal - line->buffer; ND_LOG_FIELD_ID id = nd_log_field_id_by_name(field, field_len); if(id != NDF_STOP) { const char *value = ++equal; if(lgs[id].txt) freez((void *) lgs[id].txt); lgs[id].txt = strdupz_replacing_newlines(value, newline); lgs[id].set = true; fields_added++; if(id == NDF_PRIORITY) priority = nd_log_priority2id(value); } else { struct log_stack_entry backup = lgs[NDF_MESSAGE]; lgs[NDF_MESSAGE] = ND_LOG_FIELD_TXT(NDF_MESSAGE, NULL); nd_log(NDLS_COLLECTORS, NDLP_ERR, "Field '%.*s' is not a Netdata field. Ignoring it.", field_len, field); lgs[NDF_MESSAGE] = backup; } } else { struct log_stack_entry backup = lgs[NDF_MESSAGE]; lgs[NDF_MESSAGE] = ND_LOG_FIELD_TXT(NDF_MESSAGE, NULL); nd_log(NDLS_COLLECTORS, NDLP_ERR, "Line does not contain an = sign; ignoring it: %s", line->buffer); lgs[NDF_MESSAGE] = backup; } } buffer_flush(line); } if(fields_added) { nd_log(NDLS_HEALTH, priority, "added %d fields", fields_added); messages_logged++; } return messages_logged ? 0 : 1; } // ---------------------------------------------------------------------------- // log to a local systemd-journald static bool journal_local_send_buffer(int fd, BUFFER *msg) { // log_message_to_stderr(msg); bool ret = journal_direct_send(fd, msg->buffer, msg->len); if (!ret) fprintf(stderr, "Cannot send message to systemd journal.\n"); return ret; } static int log_input_to_journal(const char *socket, const char *namespace, const char *newline, int timeout_ms) { char path[FILENAME_MAX + 1]; int fd = -1; if(socket) snprintfz(path, sizeof(path), "%s", socket); else journal_construct_path(path, sizeof(path), NULL, namespace); fd = journal_direct_fd(path); if (fd == -1) { fprintf(stderr, "Cannot open '%s' as a UNIX socket (errno = %d)\n", path, errno); return 1; } struct buffered_reader reader; buffered_reader_init(&reader); CLEAN_BUFFER *line = buffer_create(sizeof(reader.read_buffer), NULL); CLEAN_BUFFER *msg = buffer_create(sizeof(reader.read_buffer), NULL); size_t messages_logged = 0; size_t failed_messages = 0; while(get_next_line(&reader, line, timeout_ms) == BUFFERED_READER_READ_OK) { if (!line->len) { // an empty line - we are done for this message if (msg->len) { if(journal_local_send_buffer(fd, msg)) messages_logged++; else { failed_messages++; goto cleanup; } } buffer_flush(msg); } else buffer_memcat_replacing_newlines(msg, line->buffer, line->len, newline); buffer_flush(line); } if (msg && msg->len) { if(journal_local_send_buffer(fd, msg)) messages_logged++; else failed_messages++; } cleanup: return !failed_messages && messages_logged ? 0 : 1; } int main(int argc, char *argv[]) { clocks_init(); nd_log_initialize_for_external_plugins(argv[0]); int timeout_ms = -1; // wait forever bool log_as_netdata = false; const char *newline = NULL; const char *namespace = NULL; const char *socket = getenv("NETDATA_SYSTEMD_JOURNAL_PATH"); #ifdef HAVE_CURL const char *url = NULL; const char *key = NULL; const char *cert = NULL; const char *trust = NULL; bool keep_trying = false; #endif for(int i = 1; i < argc ;i++) { const char *k = argv[i]; if(strcmp(k, "--help") == 0 || strcmp(k, "-h") == 0) return help(); else if(strcmp(k, "--log-as-netdata") == 0 || strcmp(k, "-N") == 0) log_as_netdata = true; else if(strncmp(k, "--namespace=", 12) == 0) namespace = &k[12]; else if(strncmp(k, "--socket=", 9) == 0) socket = &k[9]; else if(strncmp(k, "--newline=", 10) == 0) newline = &k[10]; #ifdef HAVE_CURL else if (strncmp(k, "--url=", 6) == 0) url = &k[6]; else if (strncmp(k, "--key=", 6) == 0) key = &k[6]; else if (strncmp(k, "--cert=", 7) == 0) cert = &k[7]; else if (strncmp(k, "--trust=", 8) == 0) trust = &k[8]; else if (strcmp(k, "--keep-trying") == 0) keep_trying = true; #endif else { fprintf(stderr, "Unknown parameter '%s'\n", k); return 1; } } #ifdef HAVE_CURL if(log_as_netdata && url) { fprintf(stderr, "Cannot log to a systemd-journal-remote URL as Netdata. " "Please either give --url or --log-as-netdata, not both.\n"); return 1; } if(socket && url) { fprintf(stderr, "Cannot log to a systemd-journal-remote URL using a UNIX socket. " "Please either give --url or --socket, not both.\n"); return 1; } #endif if(log_as_netdata && namespace) { fprintf(stderr, "Cannot log as netdata using a namespace. " "Please either give --log-as-netdata or --namespace, not both.\n"); return 1; } if(log_as_netdata) return log_input_as_netdata(newline, timeout_ms); #ifdef HAVE_CURL if(url) { if(url && namespace && *namespace) snprintfz(global_namespace, sizeof(global_namespace), "_NAMESPACE=%s\n", namespace); log_to_journal_remote_ret_t rc; do { rc = log_input_to_journal_remote(url, key, cert, trust, newline, timeout_ms); } while(keep_trying && rc == LOG_TO_JOURNAL_REMOTE_CANNOT_SEND); } #endif return log_input_to_journal(socket, namespace, newline, timeout_ms); }