Support
 
Support Get Quote
 
 
 
 

Syslog levels 0 to 7: How to determine the severity of logs

Last updated on:

What are syslog levels?

Syslog levels are numerical values that determine the severity of an event. These levels are standardized by RFC 5424, using the mandatory priority (PRI) component in the message header. Therefore, the severity levels are by default applicable to all syslog messages.

The severity levels include eight distinct levels that range from 0 to 7. The below table lists the syslog levels from the most to least level of severity.

Value Severity Keyword Description
0 Emergency emerg System is unusable
1 Alert alert Action must be taken immediately
2 Critical crit Critical conditions
3 Error err Error conditions
4 Warning warning Warning conditions
5 Notice notice Normal but significant condition
6 Informational info Informational messages
7 Debug debug Debug-level messages
Table1: List of syslog severity levels

What each severity level denotes

Each syslog level is associated with specific events pertaining to their severity as follows:

Emergency (0)

This is the highest level, usually indicating a complete failure that affects the entire system or cluster. It denotes a critical event that might render the system futile.

Examples:

  • A kernel panic on a critical server that causes the entire OS to halt and restart immediately.
  • The corruption of the OS that makes it impossible to initiate a reboot.
  • Other catastrophic events that freeze the operating system completely.

Alert (1)

This level of severity is as critical as the emergency level which, with immediate intervention, can be contained. Events under this syslog level require instantaneous action in order to prevent major damage or loss of service.

Examples:

  • A situation of complete service outage caused due to the loss of connection with the primary database while the system is running on the last available backup.
  • The failure of the database authentication system that interrupts logon, hindering regular operations.

Critical (2)

Events that cause disruptions in the system such as an application crash or failure but do not sabotage the functioning of the entire system fall under the critical level. Though the situation requires immediate action, the system remains partially functional, buying some more time for remediation.

Examples:

  • Hardware component failure
  • Firewall policy failure
  • Errors in the storage device
  • Loss of redundant power supply

Error (3)

Events that fail to execute according to the network or security policies are denoted by severity level three. These events do not impact system functions or cause operational disturbances but act as initial indications that flag suspicious activity. These events serve as IoCs of an ongoing or impending cyberattack.

Examples:

  • Authentication failures due to wrong passwords
  • Multiple failed logons
  • DNS lookup failures

Warning (4)

Events of this level are mostly non-critical and act as an intimation for an impending issue or problem.

Examples:

Instances of high disk usage, high CPU load, and certificate expiration.

Notice (5)

This severity level is used to indicate events that are important to be notified and recorded but not potentially errors or events that cause detrimental issues to the system.

Examples:

Events such as service started or stopped or critical configuration changes.

Informational (6)

Events of this level are mostly routine processes or tasks that possess only informational context about system operations with no significant impact on the system.

Examples:

Successful logon or log off events, process completions, and backup status updates.

Debug (7)

This level includes granular telemetry data that is useful for system diagnostics and troubleshooting.

How to configure syslog levels

Syslog level configuration occurs at two stages as follows:

Configuration of log source

At the log source (router, server, firewall), the minimum severity level of logs to be sent out are configured using a command specifying the logging trap. A logging trap is the configuration setting on the network device that determines the minimum severity level of system messages that will be sent to an external syslog server.

For instance, if the logging trap is set to Warning (level 4), it will cause the device to forward all logs with severity level 4 to the syslog server.

Configuration of log receiver

At the log receiver i.e., a syslog server or the log management tool, logging rules are configured to receive, filter, and store the incoming messages from the log sources. The server rules typically use the severity level as a filter to collect only messages of the configured level. For instance, a rule might direct all messages of Error (level 3) to a specific facility to trigger an alert.

To filter noise, prioritize alerts, and boost your operational efficiency using standardized syslog practices, take a look at our syslog basics guide.

Significance of severity levels in syslog monitoring

The severity levels serve as filters that help reduce noise, streamline syslog monitoring, and prioritize critical events. The core functionalities of these levels include:

  • Message filtering: The severity levels help administrators configure the log collector to accept messages at a specific level and set up a filter threshold to prevent the syslog monitoring system from being overwhelmed with noise.
  • Event prioritization: The levels facilitate monitoring, and alerting tools map the severity level directly to a response procedure. This ensures that critical issues are addressed before minor ones, preventing alert fatigue in security analysts.
  • Alerting: Severity levels are directly tied to automated alerting systems in modern monitoring tools. These tools are configured with thresholds that execute predefined actions based on the incoming level, enabling proactive alerting.
  • Automation enablement: Log analysis tools such as SIEM, EDR, or XDR use the severity levels as a trigger for automated workflows that help automate incident management and response.
  • Compliance tracking: Compliance requirements often mandate specific events like failed login attempts or configuration changes to be logged. As such events are assigned clear severity levels, the security logs can be easily filtered and audited, allowing seamless compliance tracking.

How severity levels are leveraged in EventLog Analyzer

ManageEngine EventLog Analyzer leverages the syslog severity levels for alerting, reporting, and filtering logs. When EventLog Analyzer receives a syslog message, the log is parsed based on the severity. This allows administrators to perform the following activities:

  • Configure real-time alerts for critical events, ensuring immediate notification via email or SMS when an Emergency or Critical log is received.
  • Generate severity-based reports, allowing quick filtering to see all Warning logs from firewalls or all Error logs from a specific server.
  • Perform forensic analysis by searching logs, quickly narrowing down millions of records to only those with a high severity to investigate a security incident.

This enables efficient prioritization of security and operational issues.

Frequently asked questions

There are eight severity levels in syslogs, ranging from 0 to 7. These include: Emergency (0), Alert (1), Critical (2), Error (3), Warning (4), Notice (5), Informational (6), and Debug (7).

Syslog level 6 (Informational) is used for informational messages. These logs record normal system operations that do not require urgent action, such as successful user logins or routine status updates.

Syslog level 0 (Emergency) is the most severe. Events at this level indicate complete system failure or outages requiring immediate attention to prevent widespread disruption.

Syslog level 7 (Debug) is the lowest severity level. It is primarily used for diagnostic messages and detailed troubleshooting information that typically does not require user attention.

Syslog levels describe the urgency or severity of an event, while syslog facilities identify the source or category of the process that generated the message. Severity indicates importance; facility indicates origin.

It is not possible to create custom syslog severity levels, as levels 0–7 are standardized by the syslog protocol. However, applications can internally map custom categories to existing severity levels to match their own event-classification needs.

Security events often use Warning or Error levels for suspicious activity or policy violations. More severe incidents requiring immediate investigation may use Alert or Critical, whereas routine observations may be logged under Informational or Notice.

EventLog Analyzer is a comprehensive syslog server with SIEM capabilities that helps you optimize and streamline log collection with severity level filters.

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Infosys
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
A Single Pane of Glass for Comprehensive Log Management