This proposal is to merge the Elastic Common Schema (ECS) with the OpenTelemetry Semantic Conventions (SemConv) and provide full interoperability in OpenTelemetry component implementations. We propose to implement this by aligning the OpenTelemetry Semantic Conventions with ECS FieldSets and vice versa where feasible. The long-term goal is to achieve convergence of ECS and OTel Semantic Conventions into a single open schema so that OpenTelemetry Semantic Conventions truly is a successor of the Elastic Common Schema.
- Long-term, ECS and OTel SemConv will converge into one open standard that is maintained by OpenTelemetry. To kick off this effort, Elastic will nominate several domain experts to join the OpenTelemetry Semantic Convention Approvers to help with maintaining the new standard.
- OTel SemConv will adopt ECS in its full scope (except for individual adjustments in detail where inevitable), including the logging, observability and security domain fields, to make the new schema a true successor of ECS and OTel SemConv.
- Elastic and OpenTelemetry will coordinate and officially announce the direction of the merger (e.g. through official websites, blog posts, etc.)
- Migrate ECS and OTel SemConv users to the new common schema over time and provide utilities to allow the migration to be as easy as possible.
ECS and OTel SemConv have some overlap today, but also significant areas of mutually enriching fields. The following diagram illustrates the different areas:
A
: ECS comes with a rich set of fields that cover broad logging, observability and security use cases. Many fields are additive to the OTel SemConv and would enrich the OTel SemConv without major conflicts. Examples are Geo information fields, Threat Fields, and many others.B
: Conversely, there are attributes in the OTel SemConv that do not exist in ECS and would be an enrichment to ECS. Examples are the Messaging semantic conventions or technology-specific conventions, such as the AWS SDK conventions.C
: There is some significant area of overlap between ECS and OTel SemConv. The areC
represents overlapping fields/attributes that are very similar in ECS and OTel SemConv. The field conflicts inC
can be resolved through simple field renames and simple transformations.D
: For some of the fields and attributes there will be conflicts that cannot be resolved through simple renaming or transformation and would require introducing breaking changes on ECS or OTel SemConv side for the purpose of merging the schemas.
The process of merging ECS with OTel SemConv will take time and we propose to do it as part of the stabilization effort for OTel SemConv. During that period and also for a significant period after the merger (sunset period), Elastic will continue to support ECS as a schema. However, further evolution of ECS will happen on the basis of the new, common schema. Elastic will nominate ECS experts to help with maintaining the new schema and will require the approver role for the semantic conventions in OpenTelemetry for the new schema.
With the merger there will be different categories of field conflicts between ECS fields and Otel SemConv attributes (as illustrated in the above figure). We expect the areas A
and B
to be less controversial and potentially low-hanging fruits for an enriched, new schema.
For the areas C
and D
we propose to resolve conflicts through a close collaboration as part of the stabilization initiative of the OTel SemConv. Where feasible, the goal is to align the OTel SemConv attributes as close as possible with the existing, stable ECS fields. Where alignment is not feasible, the goal is to identify ways to address field conflicts through technical transformations and aliasing, to bridge existing fields and formats into the new schema and vice versa (e.g. through OpenTelemetry Collector Processors).
While realistically truly breaking changes on ECS and OTel SemConv won't be avoidable as part of the merger, they should be the last resort and need to be discussed on a field-by-field basis.
Adding the Elastic Common Schema (ECS) to OpenTelemetry (OTel) is a great way to accelerate the integration of vendor-created logging and OTel component logs (i.e. OTel Collector Logs Receivers). The goal is to define vendor neutral semantic conventions for most popular types of systems and support vendor-created or open-source components (for example HTTP access logs, network logs, system access/authentication logs) extending OTel correlation to these new signals.
Adding the coverage of ECS to OTel would provide guidance to authors of OpenTelemetry Collector Logs Receivers and help establish the OTel Collector as a de facto standard log collector with a well-defined schema to allow for richer data definition.
In addition to the use case of structured logs, the maturity of ECS for SIEM (Security Information and Event Management) is a great opportunity for OpenTelemetry to expand its scope to the security use cases.
Another significant use case is providing first-class support for Kubernetes application logs, system logs, and application introspection events. We would also like to see support for structured events (e.g. k8seventsreceiver) and using 'content-type' to identify event types.
We'd like to see different categories of structured logs being well-supported in the OTel Log Data Model, presumably through semantic conventions for log attributes. For example, NGINX access logs and Apache access logs should be processed the same way as structured logs. This would help in trace and metric correlation with such log data as well as it would help grow the ecosystem of curated UIs provided by observability backends and monitoring dashboards (e.g. one single HTTP access log dashboard benefiting Apache httpd, Nginx, and HAProxy).
Adoption of OTel logs will accelerate greatly if ECS is leveraged as the common standard, using this basis for normalization. OTel Logs adoption will be accelerated by this support. For example, ECS can provide the unified structured format for handling vendor-generated logs along with open source logs.
Customers will benefit from turnkey logs integrations that will be fully recognized by OTel-compatible observability products and services.
OpenTelemetry logging is today mostly structured when instrumentation libraries are used. However, most of the logs which exist today are generated by software, hardware, and cloud services which the user cannot control. OpenTelemetry provides a limited set of "reference integrations" to structure logs: primarily the OpenTelemetry Collector Kubernetes Events Receiver and an example of a regexp based parsing of Tomcat access logs with OpenTelemetry Collector File Receiver (here).
By expanding the OTel semantic conventions with further namespaces already defined in ECS, a broader coverage of such mappings from different sources can be defined and implemented in the OTel collector.
This, for example, includes logs from network appliances (mapping to the network
and interface
namespaces in ECS).
The semantic conventions of a log are a challenge. What is a specific component defined in a log and how does it relate to other logs which have the same semantic component defined differently? ECS has already done some heavy-lifting on defining a unified set of semantic conventions which can be adopted in OTel.
OpenTelemetry has the potential to grow exponentially if the data from these other services can be correlated with instrumented code and components. In order to do this, industry stakeholders should leverage a common and standard logging data model which allows for the mapping of these different data types. The OpenTelemetry data protocol can provide this interoperable open standard. This unlocks countless use cases, and ensures that OpenTelemetry can work with other technologies which are not OpenTelemetry compliant.
The Elastic Common Schema (ECS) is an open source specification, developed with support from Elastic's user community. ECS defines a common set of fields to be used when storing data in Elasticsearch, such as logs, metrics, and security and audit events. The goal of ECS is to enable and encourage users of Elasticsearch to normalize their event data, so that they can better analyze, visualize, and correlate the data represented in their events. Learn more at: https://www.elastic.co/guide/en/ecs/current/ecs-reference.html
The coverage of ECS is very broad including in depth support for logs, security, and network events such as "logs.* fields" , "geo.* fields", "tls.* fields", "dns.* fields", or "vulnerability.* fields".
ECS has the following guiding principles:
- ECS favors human readability in order to enable broader adoption as many fields can be understood without having to read up their meaning in the reference,
- ECS events include metadata to enable correlations across any dimension (host, data center, docker image, ip address...),
- ECS does not differentiate the metadata fields that are specific to each event of the event source and the metadata that is shared by all the events of the source in the way OTel does, which differentiates between Resource Attributes and Log/Span/Metrics Attributes,
- ECS groups fields in namespaces in order to:
- Offer consistency and readability,
- Enable reusability of namespaces in different contexts,
- For example, the "geo" namespace is nested in the "client.geo", "destination.geo", "host.geo" or "threat.indicator.geo" namespaces
- Enable extensibility by adding fields to namespaces and adding new namespaces,
- Prevent field name conflicts
- ECS covers a broad spectrum of events with 40+ namespaces including detailed coverage of security and network events. It's much broader than simple logging use cases.
Example of a Nginx Access Log entry structured with ECS
{
"@timestamp":"2020-03-25T09:51:23.000Z",
"client":{
"ip":"10.42.42.42"
},
"http":{
"request":{
"referrer":"-",
"method":"GET"
},
"response":{
"status_code":200,
"body":{
"bytes":2571
}
},
"version":"1.1"
},
"url":{
"path":"/blog"
},
"user_agent":{
"original":"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36",
"os":{
"name":"Mac OS X",
"version":"10.14.0",
"full":"Mac OS X 10.14.0"
},
"name":"Chrome",
"device":{
"name":"Other"
},
"version":"70.0.3538.102"
},
"log":{
"file":{
"path":"/var/log/nginx/access.log"
},
"offset":33800
},
"host": {
"hostname": "cyrille-laptop.home",
"os": {
"build": "19D76",
"kernel": "19.3.0",
"name": "Mac OS X",
"family": "darwin",
"version": "10.15.3",
"platform": "darwin"
},
"name": "cyrille-laptop.home",
"id": "04A12D9F-C409-5352-B238-99EA58CAC285",
"architecture": "x86_64"
}
}
Description | OTel Logs and Event Record | Elastic Common Schema (ECS) |
---|---|---|
Metadata shared by all the Log Messages / Spans / Metrics of an application instance | Resource Attributes | ECS fields |
Metadata specific to each Log Message / Span / Metric data point | Attributes | ECS Fields |
Message of log events | Body | message field |
Naming convention | Dotted names | Dotted names |
Reusability of namespaces | Namespaces are intended to be composed | Namespaces are intended to be composed |
Extensibility | Attributes can be extended by either adding a user defined field to an existing namespaces or introducing new namespaces. | Extra attributes can be added in each namespace and users can create their own namespaces |
Category | OTel Logs and Event Record (all or a subset of GRPC data types) | ECS Data Types |
---|---|---|
Text | string | text, match_only_text, keyword constant_keyword, wildcard |
Dates | uint64 nanoseconds since Unix epoch | date, date_nanos |
Numbers | number | long, double, scaled_float, boolean… |
Objects | uint32, uint64… | object (JSON object), flattened (An entire JSON object as a single field value) |
Structured Objects | No complex semantic data type specified for the moment (e.g. string is being used for ip addresses rather than having an "ip" data structure in OTel). Note that OTel supports arrays and nested objects. |
ip, geo_point, geo_shape, version, long_range, date_range, ip_range |
Binary data | Byte sequence | binary |
Some differences exist on fields that are both defined in OpenTelemetry Semantic Conventions and in ECS. In this case, it would make sense for overlapping ECS fields to not be integrated in the new specification.
OTel Logs and Event Record | Elastic Common Schema (ECS) | Description |
Timestamp (uint64 nanoseconds since Unix epoch) | @timestamp (date) | |
TraceId (byte sequence), SpanId (byte sequence) | trace.id (keyword), span.id (keyword) | |
N/A | Transaction.id (keyword) | |
SeverityText (string) | log.syslog.severity.name (keyword), log.level (keyword) | |
SeverityNumber (number) | log.syslog.severity.code | |
Body (any) | message (match_only_text) | |
process.cpu.load (not specified but collected by OTel Collector)
process.cpu.time (async counter) system.cpu.utilization |
host.cpu.usage (scaled_float) with a slightly different measurement than what OTel metrics measure | Note that most metrics have slightly different names and semantics between ECS and OpenTelemetry |
How would OpenTelemetry users practically use the new OpenTelemetry Semantic Conventions Attributes brought by ECS
The concrete usage of ECS-enriched OpenTelemetry Semantic Conventions Attributes depends on the use case and the fieldset. In general, OpenTelemetry users would transparently upgrade to ECS and benefit from the alignment of attributes for new use cases. The main goal of this work is to enable producers of OpenTelemetry signals (collectors/exporters) to create enriched uniform signals for existing and new use cases. The uniformity allows for easier correlation between signals originating from different producers. The richness ensures more options for Root Cause Analysis, correlation and reporting.
While ECS covers many different use cases and scenarios, in the following, we outline two examples:
The author of the "OTel Collector Access logs file receiver for web server XXX" would find in the OTel Semantic Convention specifications all the guidance to map the fields of the web server logs, not only the attributes that the OTel Semantic Conventions has specified today for HTTP calls, but also attributes for the User Agent or the Geo Data.
This completeness of the mapping will help the author of the integration to produce OTel Log messages that will be compatible with access logs of other web components (web servers, load balancers, L7 firewalls...) allowing turnkey integration with observability solutions and enabling richer correlations.
- Logs with sessions (VPN Logs, Network Access Sessions, RUM sessions, etc.)
- Logs from systems processing files
Prometheus is a de facto standard for observability metrics and OpenTelemetry already provides full interoperability with the Prometheus ecosystem.
It would be useful to get interoperability between metrics collected by official Prometheus exporters (e.g. the Node/system metrics exporter or the MySQL server exporter) and their equivalent OpenTelemetry Collector receivers (e.g. OTel Collector Host Metrics Receiver or MySQL Receiver).
Note that one of the challenges with Prometheus metrics naming conventions is that these are implicit conventions defined by each integration author which doesn't enable correlation due to the lack of consistency across integrations. For example, this inconsistency increases the complexity that an end-user has to deal with when configuring and monitoring alerts.
Prometheus' conventions are restricted to the style of the name of the metrics (see Prometheus Metric and label naming) but don't specify unified metric names.
Some areas that need to be addressed in the long run as ECS is integrated into OTel include defining the innovation process, ensuring the OTel specification incorporates the changes to accommodate ECS, and a process for handling breaking changes if any (the proposal Define semantic conventions and instrumentation stability #2180 should tackle this point). Also, migration of existing naming (e.g. Prometheus exporter) to standardized convention (see Semantic Conventions for System Metrics , Semantic Conventions for OS Process Metrics).