summaryrefslogtreecommitdiff
path: root/op-mode-definitions/show-log.xml.in
AgeCommit message (Collapse)Author
2025-04-18firewall: T7370: Add conntrack log commands (#4459)l0crian1
* firewall: T7370: Add conntrack log commands Added the following commands: show log conntrack show log conntrack event new show log conntrack event update show log conntrack event destroy * firewall: T7370: Add conntrack log commands Added the following commands: show log conntrack show log conntrack event new show log conntrack event update show log conntrack event destroy * firewall: T7370: Add conntrack log commands Added the following commands: show log conntrack show log conntrack event new show log conntrack event update show log conntrack event destroy * Fix capitalization --------- Co-authored-by: l0crian1 <ryan.claridge13@gmail.com> Co-authored-by: Daniil Baturin <daniil@baturin.org>
2025-04-17firewall: T7369: Match global state policies in show firewalll0crian1
Global state policies were not matched when typing "show firewall"
2025-04-16firewall: T7369: Match global state policies in show firewalll0crian1
Global state policies were not matched when typing "show firewall"
2025-04-15Merge pull request #4214 from dmbaturin/T6919-good-bye-fastnetmonDaniil Baturin
ids: T7241: remove Fastnetmon from the base system
2025-04-14ids: T7241: remove Fastnetmon from the base systemDaniil Baturin
It will eventually be moved to an addon
2025-01-21T6641: Add vyos-network-event-logger Servicekhramshinr
The service parses and logs network events for improved monitoring and diagnostics. Supported event types include: - `RTM_NEWROUTE`, `RTM_DELROUTE` - `RTM_NEWLINK`, `RTM_DELLINK` - `RTM_NEWADDR`, `RTM_DELADDR` - `RTM_NEWNEIGH`, `RTM_DELNEIGH`, `RTM_GETNEIGH` - `RTM_NEWRULE`, `RTM_DELRULE` Added operational mode commands for filtered log retrieval: - `show log network-event <event-type> <interface>`: Retrieve logs filtered by event type and interface. - `show interfaces <type> <name> event-log <event-type>`: Display interface-specific logs filtered by event type.
2024-12-30T6983: treat vyos-domain-resolver as a real service (#4261)Christian Breunig
* op-mode: T6983: add "show log" and "monitor log" commands for vyos-domain-resolver * firewall: T6983: drop unused variable domain_resolver_usage_nat * T6983: introduce Python logging module in vyos-domain-resolver * T6983: treat vyos-domain-resolver as a real service
2024-12-17op-mode: T6746: add "show log frr" and "monitor log frr" commandsChristian Breunig
2024-12-16op-mode: T6746: add CLI options to show/monitor log of vyos-configdChristian Breunig
This is pretty usefull to monitor what's going on under the hood Dec 08 15:27:34 vyos-configd[4324]: Received message: {"type": "init"} Dec 08 15:27:34 vyos-configd[4324]: config session pid is 4400 Dec 08 15:27:34 vyos-configd[4324]: config session sudo_user is cpo Dec 08 15:27:34 vyos-configd[4324]: commit_scripts: ['protocols_babel', 'protocols_bfd', 'protocols_bgp'] Dec 08 15:27:34 vyos-configd[4324]: Received message: {"type": "node", "last": false, "data": "/usr/libexec/vyos/conf_mode/protocols_babel.py"} Dec 08 15:27:34 vyos-configd[4324]: Sending reply: error_code 1 with output Dec 08 15:27:34 vyos-configd[4324]: Received message: {"type": "node", "last": false, "data": "/usr/libexec/vyos/conf_mode/protocols_bgp.py"} Dec 08 15:27:34 vyos-configd[4324]: Sending reply: error_code 1 with output Dec 08 15:27:34 vyos-configd[4324]: Received message: {"type": "node", "last": true, "data": "/usr/libexec/vyos/conf_mode/protocols_bfd.py"} Dec 08 15:27:34 vyos-configd[4324]: Sending reply: error_code 1 with output Dec 08 15:27:34 vyos-configd[4324]: scripts_called: ['protocols_babel', 'protocols_bgp', 'protocols_bfd'] Dec 08 15:27:34 vyos-configd[4324]: FRR: Reloading configuration - tries: 1 Python class ID: 139842739583248 Debugging the new FRRender/vyos-config integration
2024-09-18T6723: firewall: extend op-mode commands <show firewall ..> and a <show log ↵Nicolas Fort
firewall ..> in order to match all chains/priorities
2024-09-04openfabric: T6652: Add support for OpenFabric protocolNataliia Solomko
OpenFabric is a routing protocol providing link-state routing with efficient flooding for topologies like spine-leaf networks. FRR implements OpenFabric in a daemon called fabricd
2024-06-10wireless: T6462: add op-mode command for hostapd and wpa_supplicant logsChristian Breunig
* monitor log wireless hostapd [interface <name>] * monitor log wireless wpa-supplicant [interface <name>] * show log wireless hostapd [interface <name>] * show log wireless wpa-supplicant [interface <name>]
2024-05-21T6375: Fix/Update NAT loggingl0crian1
Fixed broken logging for "show log nat" Added the following commands: show log nat source show log nat source rule <ruleNum> show log nat destination nat show log nat destination nat rule <ruleNum> show log nat static show log nat static rule <ruleNum>
2024-03-18show log: T6127 - Fixed egrep regex for IPv6l0crian1
2024-03-18show log: T6127 - Fixed egrep regexl0crian1
2024-03-18show log: T6127 - Fixed egrep regexl0crian1
2024-01-06pki: T5886: add op-mode commands for log and renewalChristian Breunig
* show log certbot * monitor log certbot * renew certbot
2023-12-20T2898: add ndp-proxy serviceChristian Breunig
VyOS CLI command set service ndp-proxy interface eth0 prefix 2001:db8::/64 mode 'static' Will generate the following NDP proxy configuration $ cat /run/ndppd/ndppd.conf # autogenerated by service_ndp-proxy.py # This tells 'ndppd' how often to reload the route file /proc/net/ipv6_route route-ttl 30000 # This sets up a listener, that will listen for any Neighbor Solicitation # messages, and respond to them according to a set of rules proxy eth0 { # Turn on or off the router flag for Neighbor Advertisements router no # Control how long to wait for a Neighbor Advertisment message before invalidating the entry (milliseconds) timeout 500 # Control how long a valid or invalid entry remains in the cache (milliseconds) ttl 30000 # This is a rule that the target address is to match against. If no netmask # is provided, /128 is assumed. You may have several rule sections, and the # addresses may or may not overlap. rule 2001:db8::/64 { static } }
2023-12-08dhcp: T3316: Migrate dhcp/dhcpv6 server to Keasarthurdev
2023-11-09T1797: Remove vpp packages and mentionsViacheslav Hletenko
2023-10-29op-mode: T5661: use common journalctl syntax for sshguardChristian Breunig
This makes the code more easy to maintain in the future if everyone uses the same structure when calling journalctl.
2023-10-21T5661: Add show show ssh dynamic-protection attacker and show log ssh ↵JeffWDH
dynamic-protection
2023-09-14T5579: show log firewall - Fix command in order to fit new firewall cli ↵Nicolas Fort
structure; extend command options so it can be used on every layer ; use journalctl to get the logs
2023-08-17console-server: T2490: add op-mode commands to display logChristian Breunig
2023-07-27T5411: add additional monitor log targetsChristian Breunig
2023-07-08vpp: T1797: add op-mode commands to show log buffersChristian Breunig
2023-07-08op-mode: T3201: add support to display last <n> log entriesChristian Breunig
2023-04-04T5142: Add audit tool to monitor security-relevant eventsViacheslav Hletenko
2023-02-27op-mode: T4952: use list_interfaces from vyos-utilsJohn Estabrook
2023-02-14strongSwan: T4593: move to charon-systemdChristian Breunig
2023-01-23op-mode: add "show|monitor log pppoe-server" commandChristian Breunig
2023-01-23op-mode: add "show|monitor log ipoe-server" commandChristian Breunig
2023-01-22op-mode: sstp: T4384: use <path> completion helper over <script>Christian Breunig
The script completion helper will only show SSTP client interfaces already created and beeing active in the Kernel. The path completion helper shows the real CLI deal.
2023-01-22op-mode: macsec: T4537: use <path> completion helper over <script>Christian Breunig
The script completion helper will only show MACsec interfaces already created and beeing active in the Kernel. The path completion helper shows the real CLI deal.
2023-01-22pppoe: T4948: add CLI option to allow definition of host-uniq flagChristian Breunig
Some ISPs seem to use the host-uniq flag to authenticate client equipment. Add CLI option in VyOS to allow specification of the host-uniq flag. set interfaces pppoe pppoeN host-uniq <value>
2023-01-17op-mode: T4861: add "(show|monitor) log vpn openconnect" commandsChristian Breunig
2023-01-14ntp: T3008: migrate from ntpd to chronyChristian Breunig
* Move CLI from "system ntp" -> "service ntp" * Drop NTP server option preempt as not supported by chrony
2023-01-14op-mode: xml: improve help stringsChristian Breunig
2023-01-09Revert "strongSwan: upgrade scripts to work with package version 5.9.8"Christian Poessinger
This reverts commit 6857447bf6acba3537d5e5372cd320aef078b81e.
2022-12-27strongSwan: upgrade scripts to work with package version 5.9.8Christian Poessinger
2022-12-20op-mode: radvd: T4809: add CLI commands for log displayChristian Poessinger
- show log router-advert - monitor log router-advert
2022-12-11sstp: T4384: initial implementation of SSTP client CLIChristian Poessinger
vyos@vyos# show interfaces sstpc sstpc sstpc10 { authentication { password vyos user vyos } server sstp.vyos.net ssl { ca-certificate VyOS-CA } }
2022-11-10op-mode: T4810: fix show/monitor log of pppoe interfaceinitramfs
2022-10-01T4722: consistently use the "IPsec" spelling for IPsecDaniil Baturin
2022-08-24op-mode: T4390: migrate "show log vpn" to journalctlChristian Poessinger
2022-08-24ipsec: T2185: use systemd to start/stop serviceChristian Poessinger
2022-08-01op-mode: macsec: T4537: add "show|monitor log macsec" CLI commandsChristian Poessinger
2022-07-22op-mode: add show|monitor log ssh|snmp commandsChristian Poessinger
2022-07-21op-mode: T2659: show/monitor log - add ddos-protection logsChristian Poessinger
2022-05-21op-mode: T4390: add nhrp and flow-accounting loggingChristian Poessinger