Show system information Show last number of messages in master logging buffer <1-9999> if ${vyos_validators_dir}/numeric --range 1-9999 "$3"; then journalctl --no-hostname --boot --lines "$3"; fi Show contents of current master logging buffer journalctl --no-hostname --boot Show audit logs cat /var/log/audit/audit.log Show contents of all master log files sudo bash -c 'eval $(lesspipe); less $_vyatta_less_options --prompt=".logm, file %i of %m., page %dt of %D" -- `printf "%s\n" /var/log/messages* | sort -nr`' Show listing of authorization attempts journalctl --no-hostname --boot --quiet SYSLOG_FACILITY=10 SYSLOG_FACILITY=4 Show log for certbot if sudo test -f /var/log/letsencrypt/letsencrypt.log; then sudo cat /var/log/letsencrypt/letsencrypt.log; else echo "Cerbot log does not exist"; fi Show log for Cluster cat $(printf "%s\n" /var/log/messages* | sort -nr) | grep -e heartbeat -e cl_status -e mach_down -e ha_log Show log for Conntrack-sync journalctl --no-hostname --boot --unit conntrackd.service Show log for console server journalctl --no-hostname --boot --unit conserver-server.service Show log for for Intrusion Detection System Show log for DDOS protection journalctl --no-hostname --boot --unit fastnetmon.service Show log for Dynamic Host Control Protocol (DHCP) Show log for DHCP server journalctl --no-hostname --boot --unit kea-dhcp4-server.service Show DHCP client logs journalctl --no-hostname --boot --unit "dhclient@*.service" Show DHCP client log on specific interface journalctl --no-hostname --boot --unit "dhclient@$6.service" Show log for Dynamic Host Control Protocol IPv6 (DHCPv6) Show log for DHCPv6 server journalctl --no-hostname --boot --unit kea-dhcp6-server.service Show DHCPv6 client logs journalctl --no-hostname --boot --unit "dhcp6c@*.service" Show DHCPv6 client log on specific interface journalctl --no-hostname --boot --unit "dhcp6c@$6.service" Show log for Firewall journalctl --no-hostname --boot -k | egrep "(ipv[46]|bri)-(FWD|INP|OUT|NAM)" Show firewall bridge log journalctl --no-hostname --boot -k | egrep "bri-(FWD|INP|OUT|NAM)" Show Bridge forward firewall log journalctl --no-hostname --boot -k | grep bri-FWD Show Bridge firewall forward filter journalctl --no-hostname --boot -k | grep bri-FWD-filter Show log for a rule in the specified firewall firewall bridge forward filter rule journalctl --no-hostname --boot -k | egrep "\[bri-FWD-filter-$8-[ADRJC]\]" Show Bridge input firewall log journalctl --no-hostname --boot -k | grep bri-INP Show Bridge firewall input filter journalctl --no-hostname --boot -k | grep bri-INP-filter Show log for a rule in the specified firewall firewall bridge input filter rule journalctl --no-hostname --boot -k | egrep "\[bri-INP-filter-$8-[ADRJC]\]" Show Bridge output firewall log journalctl --no-hostname --boot -k | grep bri-OUT Show Bridge firewall output filter journalctl --no-hostname --boot -k | grep bri-OUT-filter Show log for a rule in the specified firewall firewall bridge output filter rule journalctl --no-hostname --boot -k | egrep "\[bri-OUT-filter-$8-[ADRJC]\]" Show Bridge prerouting firewall log journalctl --no-hostname --boot -k | grep bri-PRE Show Bridge firewall prerouting filter journalctl --no-hostname --boot -k | grep bri-PRE-filter Show log for a rule in the specified firewall firewall bridge prerouting filter rule journalctl --no-hostname --boot -k | egrep "\[bri-PRE-filter-$8-[ADRJC]\]" Show custom Bridge firewall log firewall bridge name journalctl --no-hostname --boot -k | grep bri-NAM-$6 Show log for a rule in the specified firewall firewall bridge name ${COMP_WORDS[5]} rule journalctl --no-hostname --boot -k | egrep "\[bri-NAM-$6-$8-[ADRJC]\]" Show firewall IPv4 log journalctl --no-hostname --boot -k | egrep "ipv4-(FWD|INP|OUT|NAM)" Show firewall IPv4 forward log journalctl --no-hostname --boot -k | grep ipv4-FWD Show firewall IPv4 forward filter log journalctl --no-hostname --boot -k | grep ipv4-FWD-filter Show log for a rule in the specified firewall firewall ipv4 forward filter rule journalctl --no-hostname --boot -k | egrep "\[ipv4-FWD-filter-$8-[ADRJCO]\]" Show firewall IPv4 input log journalctl --no-hostname --boot -k | grep ipv4-INP Show firewall IPv4 input filter log journalctl --no-hostname --boot -k | grep ipv4-INP-filter Show log for a rule in the specified firewall firewall ipv4 input filter rule journalctl --no-hostname --boot -k | egrep "\[ipv4-INP-filter-$8-[ADRJC]\]" Show custom IPv4 firewall log firewall ipv4 name journalctl --no-hostname --boot -k | grep ipv4-NAM-$6 Show log for a rule in the specified firewall firewall ipv4 name ${COMP_WORDS[5]} rule journalctl --no-hostname --boot -k | egrep "\[ipv4-NAM-$6-$8-[ADRJC]\]" Show firewall IPv4 output log journalctl --no-hostname --boot -k | grep ipv4-OUT Show firewall IPv4 output filter log journalctl --no-hostname --boot -k | grep ipv4-OUT-filter Show log for a rule in the specified firewall firewall ipv4 output filter rule journalctl --no-hostname --boot -k | egrep "\[ipv4-OUT-filter-$8-[ADRJC]\]" Show firewall IPv4 prerouting log journalctl --no-hostname --boot -k | grep ipv4-PRE Show firewall IPv4 prerouting raw log journalctl --no-hostname --boot -k | grep ipv4-PRE-raw Show log for a rule in the specified firewall firewall ipv4 prerouting raw rule journalctl --no-hostname --boot -k | egrep "\[ipv4-PRE-raw-$8-[ADRJC]\]" Show firewall IPv6 log journalctl --no-hostname --boot -k | egrep "ipv6-(FWD|INP|OUT|NAM)" Show firewall IPv6 forward log journalctl --no-hostname --boot -k | grep ipv6-FWD Show firewall IPv6 forward filter log journalctl --no-hostname --boot -k | grep ipv6-FWD-filter Show log for a rule in the specified firewall firewall ipv6 forward filter rule journalctl --no-hostname --boot -k | egrep "\[ipv6-FWD-filter-$8-[ADRJCO]\]" Show firewall IPv6 input log journalctl --no-hostname --boot -k | grep ipv6-INP Show firewall IPv6 input filter log journalctl --no-hostname --boot -k | grep ipv6-INP-filter Show log for a rule in the specified firewall firewall ipv6 input filter rule journalctl --no-hostname --boot -k | egrep "\[ipv6-INP-filter-$8-[ADRJC]\]" Show custom IPv6 firewall log firewall ipv6 name journalctl --no-hostname --boot -k | grep ipv6-NAM-$6 Show log for a rule in the specified firewall firewall ipv6 name ${COMP_WORDS[5]} rule journalctl --no-hostname --boot -k | egrep "\[ipv6-NAM-$6-$8-[ADRJC]\]" Show firewall IPv6 output log journalctl --no-hostname --boot -k | grep ipv6-OUT Show firewall IPv6 output filter log journalctl --no-hostname --boot -k | grep ipv6-OUT-filter Show log for a rule in the specified firewall firewall ipv6 output filter rule journalctl --no-hostname --boot -k | egrep "\[ipv6-OUT-filter-$8-[ADRJC]\]" Show firewall IPv6 prerouting log journalctl --no-hostname --boot -k | grep ipv6-PRE Show firewall IPv6 prerouting raw log journalctl --no-hostname --boot -k | grep ipv6-PRE-raw Show log for a rule in the specified firewall firewall ipv6 prerouting raw rule journalctl --no-hostname --boot -k | egrep "\[ipv6-PRE-raw-$8-[ADRJC]\]" Show log for flow-accounting journalctl --no-hostname --boot --unit uacctd.service Show log for HTTPs journalctl --no-hostname --boot --unit nginx.service Show contents of master log file for image less $_vyatta_less_options --prompt=".log, page %dt of %D" -- /lib/live/mount/persistence/boot/$4/rw/var/log/messages Show contents of all master log files for image eval $(lesspipe); less $_vyatta_less_options --prompt=".log?m, file %i of %m., page %dt of %D" -- `printf "%s\n" /lib/live/mount/persistence/boot/$4/rw/var/log/messages* | sort -nr` Show listing of authorization attempts for image less $_vyatta_less_options --prompt=".log, page %dt of %D" -- /lib/live/mount/persistence/boot/$4/rw/var/log/auth.log Show last changes to messages <NUMBER> tail -n "$6" /lib/live/mount/persistence/boot/$4/rw/var/log/messages | ${VYATTA_PAGER:-cat} Show log for IPoE server journalctl --no-hostname --boot --unit accel-ppp@ipoe.service Show log for Linux Kernel journalctl --no-hostname --boot --dmesg Show log for Link Layer Discovery Protocol (LLDP) journalctl --no-hostname --boot --unit lldpd.service Show log for Network Address Translation (NAT) Show NAT destination log journalctl --no-hostname --boot -k | egrep "\[DST-NAT-[0-9]+\]" Show NAT destination log for specified rule journalctl --no-hostname --boot -k | egrep "\[DST-NAT-$6\]" Show NAT source log journalctl --no-hostname --boot -k | egrep "\[SRC-NAT-[0-9]+(-MASQ)?\]""" Show NAT source log for specified rule journalctl --no-hostname --boot -k | egrep "\[SRC-NAT-$6(-MASQ)?\]" Show NAT static log journalctl --no-hostname --boot -k | egrep "\[STATIC-(SRC|DST)-NAT-[0-9]+\]" Show NAT static log for specified rule journalctl --no-hostname --boot -k | egrep "\[STATIC-(SRC|DST)-NAT-$6\]" journalctl --no-hostname --boot -k | egrep "\[(STATIC-)?(DST|SRC)-NAT-[0-9]+(-MASQ)?\]" Show log for Neighbor Discovery Protocol (NDP) Proxy journalctl --no-hostname --boot --unit ndppd.service Show log for Next Hop Resolution Protocol (NHRP) journalctl --no-hostname --boot --unit opennhrp.service Show log for Network Time Protocol (NTP) journalctl --no-hostname --boot --unit chrony.service Show log for MACsec journalctl --no-hostname --boot --unit "wpa_supplicant-macsec@*.service" Show MACsec log on specific interface interfaces macsec SRC=$(cli-shell-api returnValue interfaces macsec "$5" source-interface); journalctl --no-hostname --boot --unit "wpa_supplicant-macsec@$SRC.service" Show log for OpenVPN journalctl --no-hostname --boot --unit openvpn@*.service Show OpenVPN log on specific interface interfaces openvpn journalctl --no-hostname --boot --unit openvpn@$5.service Show log for PPPoE interface journalctl --no-hostname --boot --unit "ppp@pppoe*.service" Show PPPoE log on specific interface interfaces pppoe journalctl --no-hostname --boot --unit "ppp@$5.service" Show log for PPPoE server journalctl --no-hostname --boot --unit accel-ppp@pppoe.service Show log for Routing Protocol Show log for OSPF journalctl --boot /usr/lib/frr/ospfd Show log for OSPF for IPv6 journalctl --boot /usr/lib/frr/ospf6d Show log for BGP journalctl --boot /usr/lib/frr/bgpd Show log for RIP journalctl --boot /usr/lib/frr/ripd Show log for RIPng journalctl --boot /usr/lib/frr/ripngd Show log for static route journalctl --boot /usr/lib/frr/staticd Show log for Multicast protocol journalctl --boot /usr/lib/frr/pimd Show log for ISIS journalctl --boot /usr/lib/frr/isisd Show log for OpenFabric journalctl --boot /usr/lib/frr/fabricd Show log for NHRP journalctl --boot /usr/lib/frr/nhrpd Show log for BFD journalctl --boot /usr/lib/frr/bfdd Show log for MPLS journalctl --boot /usr/lib/frr/ldpd Show log for Router Advertisement Daemon (radvd) journalctl --no-hostname --boot --unit radvd.service Show log for Simple Network Monitoring Protocol (SNMP) journalctl --no-hostname --boot --unit snmpd.service Show log for Secure Shell (SSH) journalctl --no-hostname --boot --unit ssh.service Show SSH guard log journalctl --no-hostname --boot --unit sshguard.service Show last n changes to messages <NUMBER> tail -n "$4" /var/log/messages | ${VYATTA_PAGER:-cat} Show last 10 lines of /var/log/messages file tail -n 10 /var/log/messages Monitor last lines of ALL Virtual Private Network services journalctl --no-hostname --boot --unit strongswan.service --unit accel-ppp@*.service --unit ocserv.service Show log for IPsec journalctl --no-hostname --boot --unit strongswan.service Show log for L2TP journalctl --no-hostname --boot --unit accel-ppp@l2tp.service Show log for OpenConnect journalctl --no-hostname --boot --unit ocserv.service Show log for PPTP journalctl --no-hostname --boot --unit accel-ppp@pptp.service Show log for Secure Socket Tunneling Protocol (SSTP) server journalctl --no-hostname --boot --unit accel-ppp@sstp.service Show log for Secure Socket Tunneling Protocol (SSTP) client journalctl --no-hostname --boot --unit "ppp@sstpc*.service" Show SSTP client log on specific interface interfaces sstpc journalctl --no-hostname --boot --unit "ppp@$5.service" Show log for Virtual Router Redundancy Protocol (VRRP) journalctl --no-hostname --boot --unit keepalived.service Show log for Wireless interface Show log for WPA supplicant if cli-shell-api existsActive interfaces wireless; then journalctl --no-hostname --boot --unit "wpa_supplicant@*.service"; else echo "No wireless interface configured!"; fi Show log for specific wireless interface supplicant interfaces wireless if [[ $(cli-shell-api returnActiveValue interfaces wireless $6 type) == "station" ]]; then journalctl --no-hostname --boot --unit "wpa_supplicant@$6.service"; else echo "Wireless interface $6 not configured as station!"; fi Show log for host access point daemon if cli-shell-api existsActive interfaces wireless; then journalctl --no-hostname --boot --unit "hostapd@*.service"; else echo "No wireless interface configured!"; fi Show log for specific host access point daemon interface interfaces wireless if [[ $(cli-shell-api returnActiveValue interfaces wireless $6 type) == "access-point" ]]; then journalctl --no-hostname --boot --unit "hostapd@$6.service"; else echo "Wireless interface $6 not configured as access-point!"; fi Show log for Webproxy journalctl --no-hostname --boot --unit squid.service