Syslog
Cumulus Linux uses rsyslog
to collect, filter, store, and forward system logs from various services, applications, and network components. rsyslog
enables efficient troubleshooting, centralized log management, and compliance enforcement with custom rules for log processing.
You can configure logging based on severity, program name, and facility while specifying transport settings such as VRF, protocol (UDP or TCP), and port. Cumulus Linux also provides advanced filtering using match conditions and actions so that you can capture and forward only relevant logs. Additionally, you can configure rate limiting to ensure controlled log forwarding and prevent overwhelming the system.
Log Details
rsyslog
provides both local logging to the syslog
file and the ability to export logs to an external syslog
server. All rsyslog
log files use high precision timestamps:
2015-08-14T18:21:43.337804+00:00 cumulus switchd[3629]: switchd.c:1409 switchd version 1.0-cl2.5+5
Local Logging
Cumulus Linux sends logs through rsyslog
, which writes them to files in the /var/log
directory. There are default rules in the /etc/rsyslog.d/
directory that define where the logs write:
Rule | Purpose |
---|---|
10-rules.conf |
Sets defaults for log messages. |
11-remotesyslog.conf |
Configuration settings for remote syslog servers and log format. |
15-crit.conf |
Logs crit , alert or emerg log messages to /var/log/crit.log to ensure they do not rotate away. |
20-clagd.conf |
Logs clagd messages to /var/log/clagd.log for MLAG. |
22-linkstate.conf |
Logs link state changes for all physical and logical network links to /var/log/linkstate . |
25-switchd.conf |
Logs switchd messages to /var/log/switchd.log . |
30-ptmd.conf |
Logs ptmd messages to /var/log/ptmd.log for Prescription Topology Manager. |
35-rdnbrd.conf |
Logs rdnbrd messages to /var/log/rdnbrd.log for Redistribute Neighbor. |
42-nvued.conf |
Logs nvued messages to /var/log/nvued.log for NVUE. |
45-frr.conf |
Logs routing protocol messages to /var/log/frr/frr.log . This includes BGP and OSPF log messages. |
50-netq-agent.conf |
Logs NetQ agent messages to /var/log/netq-agent.log . |
50-netqd.conf |
Logs netqd messages to /var/log/netqd.log . |
55-dhcpsnoop.conf |
Logs DHCP snooping messages to /var/log/dhcpsnoop.log . |
66-ptp4l.conf |
Logs PTP messages to /var/log/ptp4l.log . |
99-syslog.conf |
Sends all remaining processes that use rsyslog to /var/log/syslog . |
Cumulus Linux rotates and compresses log files into an archive. Processes that do not use rsyslog
write to their own log files within the /var/log
directory. For more information on specific log files, see Troubleshooting Log Files.
Configure syslog Servers
You can configure Cumulus Linux to send log files to one or more remote syslog servers. By default, Cumulus Linux uses port 514, the UDP protocol, and the default
VRF for logging transport settings.
The following example configures Cumulus Linux to send log files to the remote syslog server with the 192.168.0.254 IP address on the default port using the default protocol.
cumulus@switch:~$ nv set system syslog server 192.168.0.254
cumulus@switch:~$ nv config apply
The following example configures Cumulus Linux to send log files to the remote syslog server with the 192.168.0.254 IP address on port 601 using the TCP protocol.
cumulus@switch:~$ nv set system syslog server 192.168.0.254 port 601
cumulus@switch:~$ nv set system syslog server 192.168.0.254 protocol tcp
cumulus@switch:~$ nv config apply
By default, the syslog server runs in the default VRF. To set a different server VRF, run the nv set system syslog server <server-id> vrf <vrf-id>
command. The following example sets the syslog server to run in the management VRF:
cumulus@switch:~$ nv set system syslog server 192.168.0.254 vrf mgmt
cumulus@switch:~$ nv config apply
-
Create a file in the
/etc/rsyslog.d/
directory and add the server IP address, port and protocol. Make sure the filename starts with a number lower than 99 so that it executes before log messages go in.cumulus@switch:~$ sudo nano /etc/rsyslog.d/11-remotesyslog-default.conf ... action(type="omfwd" Target="@@192.168.0.254" Port="601" Protocol="tcp")
- For TCP-based syslog, use two @@ before the IP address @@192.168.1.2:514.
- The file numbering in
/etc/rsyslog.d/
dictates how the rules install intorsyslog.d
. Lower numbered rules process first andrsyslog
processing terminates with thestop
keyword. For example, thersyslog
configuration for FRR is in the45-frr.conf
file with an explicitstop
at the bottom of the file. FRR messages log to the/var/log/frr/frr.log
file on the local disk only (these messages do not go to a remote server using the default configuration). To log FRR messages remotely in addition to writing FRR messages to the local disk, rename the99-syslog.conf
file to11-remotesyslog.conf
. The11-remotesyslog.conf
rule (transmit to remote server) processes FRR messages first, then the45-frr.conf
file continues to process the messages (write to local disk in the/var/log/frr/frr.log
file).
-
Restart
rsyslog
.cumulus@switch:~$ sudo systemctl restart rsyslog.service
By default, the syslog server runs in the default VRF. You can write to syslog with management VRF enabled by applying the following configuration:
cumulus@switch:~$ sudo nano /etc/rsyslog.d/11-remotesyslog.conf
...
action(type="omfwd" Target="192.168.0.254" Port="514" Protocol="tcp" Device="mgmt")
For each syslog server, configure a unique action
line. For example, to configure two syslog servers at 192.168.0.254 and 10.0.0.1:
cumulus@switch:~$ cat /etc/rsyslog.d/11-remotesyslog.conf
...
action(type="omfwd" Target="192.168.0.254" Port="514" Protocol="tcp" Device="mgmt" )
action(type="omfwd" Target="10.0.0.1" Port="514" Protocol="tcp" Device="mgmt" )
If you configure remote logging to use the TCP protocol, local logging might stop when the remote syslog server is unreachable. Also, if you configure remote logging to use the UDP protocol, local logging might stop if the UDP servers are unreachable because there are no routes available for the destination IP addresses. To avoid this issue, configure a disk queue size and maximum retry count in your rsyslog
configuration:
For TCP:
action(type="omfwd" Target="172.28.240.15" Device="mgmt" Port="1720" Protocol="tcp" action.resumeRetryCount="100" queue.type="linkedList" queue.size="10000")
For UDP:
action(type="omfwd" Target="172.28.240.15" Device="mgmt" Port="540" Protocol="udp" action.resumeRetryCount="100" queue.type="linkedList" queue.size="10000")
Configure Log Format
You can set the log format to:
- Standard (the default syslog format with a standard template).
- WELF (WebTrends Enhanced Log Format), which enables you to provide an optional firewall name. The WELF format structures logs as key-value pairs. Each log entry consists of a key that identifies the data field and a corresponding value. This format is easy to parse and often used for web traffic analysis and security logs.
The following example sets the log format to WELF and sets the firewall name to nvidia
:
cumulus@switch:~$ nv set system syslog format welf firewall-name nvidia
cumulus@switch:~$ nv config apply
To set the log format back to the default setting (standard), run the nv unset system syslog format
command.
NVUE writes the configuration to the /etc/rsyslog.d/11-remotesyslog.conf
file:
cumulus@switch:~$ sudo cat /etc/rsyslog.d/11-remotesyslog.conf
...
template(name="WelfRemoteFormat" type="string" string="%TIMESTAMP% id=firewall time=\"%timereported:::date-year%-%timereported:::date-month%-%timereported:::date-day% %timereported:::date-hour%-%timereported:::date-minute%-%timereported:::date-second%\" fw=\"nvidia\" severity=\"%syslogseverity-text%\" facility=\"%syslogfacility-text%\" program=\"%programname%\" msg=\"%syslogtag%%msg:::sp-if-no-1st-sp%%msg:::drop-last-lf%\"\n")
action(type="omfwd" Target="192.168.0.254" Port="514" Protocol="tcp" Device="mgmt" Template="WelfRemoteFormat")
The following example shows a syslog file in WELF format:
2025-04-28T13:38:11+03:00 qa-sys-eth-vt43-1-5600dev.mtl.labs.mlnx id=nvidia time="2025-04-28 13-38-11" fw="nvidia" severity="err" facility="daemon" program="ntpd" msg="ntpd[86516]: LOG: frequency file /var/lib/ntp/ntp.drift-tmp: No such file or directory"
2025-04-28T13:38:23+03:00 qa-sys-eth-vt43-1-5600dev.mtl.labs.mlnx id=nvidia time="2025-04-28 13-38-23" fw="nvidia" severity="debug" facility="user" program="nvued" msg="nvued: DEBUG: safe_sh.py:116 <Running: 'ledmgrd -j'>"
2025-04-28T13:38:23+03:00 qa-sys-eth-vt43-1-5600dev.mtl.labs.mlnx id=nvidia time="2025-04-28 13-38-23" fw="nvidia" severity="debug" facility="user" program="nvued" msg="nvued: DEBUG: safe_sh.py:207 <Finished: 'ledmgrd -j'>"
2025-04-28T13:38:23+03:00 qa-sys-eth-vt43-1-5600dev.mtl.labs.mlnx id=nvidia time="2025-04-28 13-38-23" fw="nvidia" severity="notice" facility="authpriv" program="sudo" msg="sudo: nvue : PWD=/var/lib/nvue ; USER=root ; COMMAND=/usr/bin/cat /var/log/syslog"
The following example shows a syslog file in standard format:
09:07:38.031030 IP6 (flowlabel 0xf4e84, hlim 64, next-header UDP (17) payload length: 96) fe80::202:ff:fe00:9.37794 > fe80::202:ff:fe00:29.syslog: [udp sum ok] SYSLOG, length: 88
Facility user (1), Severity info (6)
Msg: Apr 17 09:07:38 leaf-11 nv-cli INFO cumulus (cli_id=9Scssp_M): nv show system syslog
`.N..`.@............... ...............).....`:;<14>Apr 17 09:07:38 leaf-11 nv-cli INFO cumulus (cli_id=9Scssp_M): nv show system syslog
09:14:00.317002 IP6 (flowlabel 0xf4e84, hlim 64, next-header UDP (17) payload length: 107) fe80::202:ff:fe00:9.37794 > fe80::202:ff:fe00:29.syslog: [udp sum ok] SYSLOG, length: 99
Facility user (1), Severity error (3)
Msg: Apr 17 09:14:00 leaf-11 nvued: ERROR: native.py:558 Could not get info about voltage sensors.
`.N..k.@............... ...............).....k{.<11>Apr 17 09:14:00 leaf-11 nvued: ERROR: native.py:558 Could not get info about voltage sensors.
09:14:00.563760 IP6 (flowlabel 0xf4e84, hlim 64, next-header UDP (17) payload length: 121) fe80::202:ff:fe00:9.37794 > fe80::202:ff:fe00:29.sysl
og: [udp sum ok] SYSLOG, length: 113
Facility authpriv (10), Severity notice (5)
Msg: Apr 17 09:14:00 leaf-11 sudo: nvue : PWD=/var/lib/nvue ; USER=root ; COMMAND=/usr/bin/cat /var/log/syslog
`.N..y.@............... ...............).....y.i<85>Apr 17 09:14:00 leaf-11 sudo: nvue : PWD=/var/lib/nvue ; USER=root ; COMMAND=/usr/bin/cat /var/log/syslog
Selectors and Filters
You can control which logs to capture using selectors. A selector enables you to choose options such as facility, program name, severity, filters (with match conditions and actions for log selection), and rate limit, for precise and targeted log management. You define the selectors you want to use for a specific server.
Severity
The following table describes the severity levels you can use in a selector:
Level | NVUE Option | Description |
---|---|---|
0 | emerg |
Emergency messages (the system is about to crash or is unstable). |
1 | alert |
Serious conditions (alerts); you must take action immediately. |
2 | crit |
Critical conditions (serious hardware or software failures). |
3 | err |
Error conditions (often used by drivers to indicate difficulties with the hardware). |
4 | warning |
Warning messages (nothing serious but might indicate problems). |
5 | notice |
Notifications for many conditions, including security events. |
6 | info |
Informational messages. |
7 | debug |
Debug messages. |
If you set the severity to warning
(4), the forwarding process does not include logs with severity levels debug
(7), info
(6), and notice
(5). The forwarding process only forwards logs with severity level warning
(4) or higher (err
(3), crit
(2), alert
(1), and emerg
(0)).
The following example defines the selector called SELECTOR1 and groups logs based on the source cron
with severity levels up to and including debug
(all logs with severity levels debug
, info
, notice
, warning
, and higher
):
cumulus@switch:~$ nv set system syslog selector SELECTOR1 facility cron
cumulus@switch:~$ nv set system syslog selector SELECTOR2 severity debug
cumulus@switch:~$ nv config apply
Filters
You can define filters to include or exclude messages that match certain regex patterns.
The following example configures the selector SELECTOR2. The syslog process searches for messages that match the regex patterns issu_start=true.+$
and smonctl -v -j -t fan
, excluding any that contain Running
. rsyslog
forwards only the filtered messages to the syslog server.
cumulus@switch:~$ nv set system syslog selector SELECTOR2 program-name switchd
cumulus@switch:~$ nv set system syslog selector SELECTOR2 severity debug
cumulus@switch:~$ nv set system syslog selector SELECTOR2 filter 10 match issu_start=true.+$
cumulus@switch:~$ nv set system syslog selector SELECTOR2 filter 10 action include
cumulus@switch:~$ nv set system syslog selector SELECTOR2 filter 15 match 'smonctl -v -j -t fan'
cumulus@switch:~$ nv set system syslog selector SELECTOR2 filter 15 action include
cumulus@switch:~$ nv set system syslog selector SELECTOR2 filter 2 match Running
cumulus@switch:~$ nv set system syslog selector SELECTOR2 filter 2 action exclude
cumulus@switch:~$ nv config apply
Rate Limit
You can specify a rate-limiting rule with an interval (between 1 and 65535) and a burst limit (between 1 and 65535) to control log message processing or forwarding within a defined time period. The interval defines the time window within which log messages are limited after reaching the burst threshold. The burst limit specifies the maximum number of log messages that can be processed instantly before rate limiting takes effect.
The following example sets a rate limiting rule with an interval of 240 and a burst limit of 2. With a burst limit of 2, rsyslog
sends up to two log messages at the specified interval and drops any additional messages beyond this limit. After 240 seconds, rsyslog
resumes processing and forwarding logs to the syslog server.
cumulus@switch:~$ nv set system syslog selector SELECTOR1 rate-limit interval 240
cumulus@switch:~$ nv set system syslog selector SELECTOR1 rate-limit burst 2
cumulus@switch:~$ nv config apply
NVUE writes the configuration to the /etc/rsyslog.d/11-remotesyslog.conf
file:
cumulus@switch:~$ sudo cat /etc/rsyslog.d/11-remotesyslog.conf
if (
$Programname == "nvued" and
$syslogfacility-text == "user" and
$syslogseverity <= 5
) then {
action(type="omfwd" Target="fe80::202:ff:fe00:29" Port="514" Protocol="udp" RateLimit.Interval="240" RateLimit.Burst="2")
}
The following example shows the resulting syslog file.
09:58:39.030499 IP6 (flowlabel 0x3b3ac, hlim 64, next-header UDP (17) payload length: 156) fe80::202:ff:fe00:9.51952 > fe80::202:ff:fe00:29.syslog: [udp sum ok] SYSLOG, length: 148
Facility user (1), Severity warning (4)
Msg: Apr 17 09:58:39 leaf-11 nvued: WARNING: apply_config.py:995 File '/etc/default/prometheus-node-exporter' being rendered has not been registered.
`......@............... ...............)........<12>Apr 17 09:58:39 leaf-11 nvued: WARNING: apply_config.py:995 File '/etc/default/prometheus-node-exporter' being rendered has not been registered.
10:02:15.227322 IP6 (flowlabel 0x22995, hlim 64, next-header UDP (17) payload length: 102) fe80::202:ff:fe00:9.46796 > fe80::202:ff:fe00:29.syslog: [udp sum ok] SYSLOG, length: 94
Facility user (1), Severity notice (5)
Msg: Apr 17 10:02:15 leaf-11 nvued: testing:: my_important_id syslog feature functional testing
`.)..f.@............... ...............).....f3.<13>Apr 17 10:02:15 leaf-11 nvued: testing:: my_important_id syslog feature functional testing
Set Selectors for a Server
To set a selector for a server, run the nv set system syslog server <server-id> selector 1 selector-id <selector-id>
command.
The following example configures and sets the selector selector-ifreload
for the server fe80::202:ff:fe00:29, which filters logs generated by ifreload
with severity levels up to and including info
(all logs with severity levels info
, notice
, warning
, and higher
).
cumulus@switch:~$ nv set system syslog server fe80::202:ff:fe00:29 selector 1 selector-id selector-ifreload
cumulus@switch:~$ nv set system syslog selector selector-ifreload program-name ifreload
cumulus@switch:~$ nv set system syslog selector selector-ifreload severity info
cumulus@switch:~$ nv config apply
The above commands write to the /etc/rsyslog.d/11-remotesyslog.conf
file:
if (
$Programname == "ifreload" and
$syslogfacility-text == "daemon" and
$syslogseverity <= 6
) then {
action(type="omfwd" Target="fe80::202:ff:fe00:29" Port="514" Protocol="udp")
}
The following example shows the resulting syslog file:
09:22:01.942096 IP6 (flowlabel 0xb2fb6, hlim 64, next-header UDP (17) payload length: 103) fe80::202:ff:fe00:9.41862 > fe80::202:ff:fe00:29.syslog: [udp sum ok] SYSLOG, length: 95
Facility daemon (3), Severity info (6)
Msg: Apr 17 09:22:01 leaf-11 ifreload[2545796]: info: swp4: keeping link down due to user config
`./..g.@............... ...............).....g.M<30>Apr 17 09:22:01 leaf-11 ifreload[2545796]: info: swp4: keeping link down due to user config
09:22:01.942573 IP6 (flowlabel 0xb2fb6, hlim 64, next-header UDP (17) payload length: 101) fe80::202:ff:fe00:9.41862 > fe80::202:ff:fe00:29.syslog: [udp sum ok] SYSLOG, length: 93
Facility daemon (3), Severity info (6)
Msg: Apr 17 09:22:01 leaf-11 ifreload[2545796]: info: swp4: netlink: ip link set dev swp4 down
`./..e.@............... ...............).....eyt<30>Apr 17 09:22:01 leaf-11 ifreload[2545796]: info: swp4: netlink: ip link set dev swp4 down
You can assign multiple selectors to each syslog server based on priority. The following example configures SELECTOR1 with priority 1 and SELECTOR2 with priority 2.
cumulus@switch:~$ nv set system syslog server 192.168.0.254 selector 1 selector-id SELECTOR1
cumulus@switch:~$ nv set system syslog server 192.168.0.254 selector 2 selector-id SELECTOR2
cumulus@switch:~$ nv config apply
Verify syslog Configuration
To check syslog configuration:
To show all syslog configuration settings, run the nv show system syslog
command:
cumulus@switch:~$ nv show system syslog
operational applied
----------------- ----------- -------
format welf welf
welf
firewall-name nvidia nvidia
server
=========
Servers Vrf Protocol Port Priority Selector-Id
-------------------- ------- -------- ---- -------- -----------------
192.168.0.254 default tcp 601 1 SELECTOR1
2 SELECTOR2
fe80::202:ff:fe00:29 default udp 514 1 selector-ifreload
selector
===========
Selectors Severity Program-Name Facility Burst Interval Filter Match Action
----------------- -------- ------------ -------- ----- -------- ------ ------------------ -------
SELECTOR1 notice cron
SELECTOR2 debug switchd daemon 2 Running exclude
10 issu_start=true.+$ include
15 smonctl
selector-ifreload info ifreload daemon
To show the syslog format, run the nv show system syslog format
command:
cumulus@switch:~$ nv show system syslog format
operational applied
--------------- ----------- -------
welf
firewall-name nvidia nvidia
To show the configured syslog servers, run the nv show system syslog server
command:
cumulus@switch:~$ nv show system syslog server
Servers Vrf Protocol Port Priority Selector-Id
-------------------- ------- -------- ---- -------- -----------------
192.168.0.254 default tcp 601 1 SELECTOR1
2 SELECTOR2
fe80::202:ff:fe00:29 default udp 514 1 selector-ifreload
To show information for a specific syslog server, run the nv show system syslog server <server-id>
command:
cumulus@switch:~$ nv show system syslog server 192.168.0.254
operational applied
-------- ----------- -------
port 601 601
protocol tcp tcp
vrf mgmt mgmt
selector
===========
Priority Selector-Id
-------- -----------
1 SELECTOR1
2 SELECTOR2
To show filtering information for a selector, run the nv show system syslog selector <selector-id>
command:
cumulus@switch:~$ nv show system syslog selector SELECTOR2
operational applied
------------ ----------- -------
facility daemon daemon
program-name switchd switchd
severity debug debug
filter
=========
Priority Action Match
-------- ------- ------------------
2 exclude Running
10 include issu_start=true.+$
15 smonctl
To show all filters for a specific selector, run the nv show system syslog selector <selector-id> filter
command:
cumulus@switch:~$ nv show system syslog selector SELECTOR2 filter
Priority Action Match
-------- ------- ------------------
2 exclude Running
10 include issu_start=true.+$
15 smonctl
To show information about a specific filter for a selector, run the nv show system syslog selector <selector-id> filter <filter-id>
command:
cumulus@switch:~$ nv show system syslog selector SELECTOR2 filter 10
operational applied
------ ------------------ ------------------
match issu_start=true.+$ issu_start=true.+$
action include include
To show the rate limit configuration for a selector, run the nv show system syslog selector <selector-id> rate-limit
command:
cumulus@switch:~$ nv show system syslog selector SELECTOR1 rate-limit
operational applied
-------- ----------- -------
burst 2 2
interval 240 240
After making manual changes to any files in the /etc/rsyslog.d
directory, use the sudo rsyslogd -N1
command to identify any errors in the configuration files that prevent the rsyslog
service from starting.
In the following example, a closing parenthesis is missing in the 11-remotesyslog.conf
file, which configures syslog
for management VRF:
cumulus@leaf01:mgmt-vrf:~$ cat /etc/rsyslog.d/11-remotesyslog.conf
action(type="omfwd" Target="192.168.0.254" Device="mgmt" Port="514" Protocol="udp"
cumulus@leaf01:mgmt-vrf:~$ sudo rsyslogd -N1
rsyslogd: version 8.4.2, config validation run (level 1), master config /etc/rsyslog.conf
syslogd: error during parsing file /etc/rsyslog.d/15-crit.conf, on or before line 3: invalid character '$' in object definition - is there an invalid escape sequence somewhere? [try http: /www.rsyslog.com/e/2207 ]
rsyslogd: error during parsing file /etc/rsyslog.d/15-crit.conf, on or before line 3: syntax error on token 'crit_log' [try http://www.rsyslog.com/e/2207 ]
After correcting the invalid syntax, issuing the sudo rsyslogd -N1
command produces the following output.
cumulus@leaf01:mgmt-vrf:~$ cat /etc/rsyslog.d/11-remotesyslog.conf
action(type="omfwd" Target="192.168.0.254" Device="mgmt" Port="514" Protocol="udp")
cumulus@leaf01:mgmt-vrf:~$ sudo rsyslogd -N1
rsyslogd: version 8.4.2, config validation run (level 1), master config /etc/rsyslog.conf
rsyslogd: End of config validation run. Bye.
Troubleshooting
You can use the following Linux commands to troubleshoot syslog
issues.
Verifying that rsyslog is Running
To verify that the rsyslog
service is running, use the sudo systemctl status rsyslog.service
command:
cumulus@leaf01:mgmt-vrf:~$ sudo systemctl status rsyslog.service
rsyslog.service - System Logging Service
Loaded: loaded (/lib/systemd/system/rsyslog.service; enabled)
Active: active (running) since Sat 2017-12-09 00:48:58 UTC; 7min ago
Docs: man:rsyslogd(8)
http://www.rsyslog.com/doc/
Main PID: 11751 (rsyslogd)
Tasks: 4 (limit: 2032)
Memory: 1.1M
CPU: 20ms
CGroup: /system.slice/rsyslog.service
└─8587 /usr/sbin/rsyslogd -n -iNONE
Dec 09 00:48:58 leaf01 systemd[1]: Started System Logging Service.
tcpdump
If a syslog server is not accessible to validate that syslog
messages are exporting, you can use tcpdump
.
In the following example, a syslog server uses 192.168.0.254 for UDP syslog messages on port 514:
cumulus@leaf01:mgmt-vrf:~$ sudo tcpdump -i eth0 host 192.168.0.254 and udp port 514
To generate syslog
messages, use sudo
in another session such as sudo date
. Using sudo
generates an authpriv
log.
cumulus@leaf01:mgmt-vrf:~$ sudo tcpdump -i eth0 host 192.168.0.254 and udp port 514
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
00:57:15.356836 IP leaf01.lab.local.33875 > 192.168.0.254.syslog: SYSLOG authpriv.notice, length: 105
00:57:15.364346 IP leaf01.lab.local.33875 > 192.168.0.254.syslog: SYSLOG authpriv.info, length: 103
00:57:15.369476 IP leaf01.lab.local.33875 > 192.168.0.254.syslog: SYSLOG authpriv.info, length: 85
To see the contents of the syslog
file, use the tcpdump -X
option:
cumulus@leaf01:mgmt-vrf:~$ sudo tcpdump -i eth0 host 192.168.0.254 and udp port 514 -X -c 3
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
00:59:15.980048 IP leaf01.lab.local.33875 > 192.168.0.254.syslog: SYSLOG authpriv.notice, length: 105
0x0000: 4500 0085 33ee 4000 4011 8420 c0a8 000b E...3.@.@.......
0x0010: c0a8 00fe 8453 0202 0071 9d18 3c38 353e .....S...q..<85>
0x0020: 4465 6320 2039 2030 303a 3539 3a31 3520 Dec..9.00:59:15.
0x0030: 6c65 6166 3031 2073 7564 6f3a 2020 6375 leaf01.sudo:..cu
0x0040: 6d75 6c75 7320 3a20 5454 593d 7074 732f mulus.:.TTY=pts/
0x0050: 3120 3b20 5057 443d 2f68 6f6d 652f 6375 1.;.PWD=/home/cu
0x0060: 6d75 6c75 7320 3b20 5553 4552 3d72 6f6f mulus.;.USER=roo
0x0070: 7420 3b20 434f 4d4d 414e 443d 2f62 696e t.;.COMMAND=/bin
0x0080: 2f64 6174 65 /date