First event: @@STARTTIME@@
- Last event: @@ENDTIME@@
Brought to you by - @@VERSION@@
- - diff --git a/roles/epylog/files/merged/trojans.list b/roles/epylog/files/merged/trojans.list deleted file mode 100644 index 09b795b4c3..0000000000 --- a/roles/epylog/files/merged/trojans.list +++ /dev/null @@ -1,410 +0,0 @@ -1/udp Sockets des Troie -2/tcp Death -30/tcp Agent 40421 -31/tcp Agent 31 -41/tcp Deep Throat -48/tcp DRAT -58/tcp DMSetup -59/tcp DMSetup -79/tcp CDK -81/tcp RemoConChubo -99/tcp Hidden Port -121/tcp Attack Bot -133/tcp Farnaz -142/tcp NetTaxi -146/tcp Infector -146/udp Infector -170/tcp A-trojan -334/tcp Backage -411/tcp Backage -420/tcp Breach -421/tcp TCP Wrappers trojan -455/tcp Fatal Connections -456/tcp Hackers Paradise -513/tcp Grlogin -514/tcp RPC Backdoor -531/tcp Net666, Rasmin -555/tcp Seven-Eleven -605/tcp Secret Service -666/tcp The Ripperz -667/tcp SniperNet -669/tcp DP trojan -692/tcp GayOL -777/tcp AimSpy -808/tcp WinHole -911/tcp Dark Shadow -999/tcp Deep Throat -1000/tcp Der Spaeher -1001/tcp Der Spaeher -1010/tcp Doly Trojan -1011/tcp Doly Trojan -1012/tcp Doly Trojan -1015/tcp Doly Trojan -1016/tcp Doly Trojan -1020/tcp Vampire -1024/tcp NetSpy -1025/tcp Remote Storm -1025/udp Remote Storm -1035/tcp Multidropper -1042/tcp BLA trojan -1045/tcp Rasmin -1049/tcp /sbin/initd -1050/tcp MiniCommand -1053/tcp The Thief -1054/tcp AckCmd -1080/tcp WinHole -1081/tcp WinHole -1082/tcp WinHole -1083/tcp WinHole -1090/tcp Xtreme -1095/tcp RAT -1097/tcp RAT -1098/tcp RAT -1099/tcp RAT -1150/tcp Orion -1151/tcp Orion -1170/tcp PSS -1200/udp NoBackO -1201/udp NoBackO -1207/tcp SoftWAR -1208/tcp Infector -1212/tcp Kaos -1234/tcp SubSeven -1243/tcp BackDoor-G -1245/tcp VooDoo Doll -1255/tcp Scarab -1256/tcp Project nEXT -1269/tcp Matrix -1272/tcp The Matrix -1313/tcp NETrojan -1338/tcp Millenium Worm -1349/tcp Bo dll -1394/tcp GoFriller -1441/tcp Remote Storm -1492/tcp FTP99CMP -1524/tcp Trinoo -1568/tcp Remote Hack -1600/tcp Shivka-Burka -1703/tcp Exploiter -1777/tcp Scarab -1807/tcp SpySender -1966/tcp Fake FTP -1967/tcp WM FTP Server -1969/tcp OpC BO -1981/tcp Bowl, Shockrave -1999/tcp SubSeven -2000/tcp Der Spaeher -2001/tcp Der Späher -2023/tcp Ripper Pro -2080/tcp WinHole -2115/tcp Bugs -2130/udp Mini Backlash -2140/tcp The Invasor -2140/udp Deep Throat -2155/tcp Illusion Mailer -2255/tcp Nirvana -2283/tcp Hvl RAT -2300/tcp Xplorer -2311/tcp Studio 54 -2330/tcp Contact -2331/tcp Contact -2332/tcp Contact -2333/tcp Contact -2334/tcp Contact -2335/tcp Contact -2336/tcp Contact -2337/tcp Contact -2338/tcp Contact -2339/tcp Contact -2339/udp Voice Spy -2345/tcp Doly Trojan -2565/tcp Striker trojan -2583/tcp WinCrash -2600/tcp Digital RootBeer -2716/tcp The Prayer -2773/tcp SubSeven -2774/tcp SubSeven -2801/tcp Phineas Phucker -2989/udp RAT -3000/tcp Remote Shut -3024/tcp WinCrash -3031/tcp Microspy -3128/tcp Ringzero -3129/tcp Masters Paradise -3150/tcp The Invasor -3150/udp Deep Throat -3456/tcp Terror trojan -3459/tcp Eclipse 2000 -3700/tcp Portal of Doom -3777/tcp PsychWard -3791/tcp Total Solar Eclypse -3801/tcp Total Solar Eclypse -4000/tcp SkyDance -4092/tcp WinCrash -4242/tcp VHM -4321/tcp BoBo -4444/tcp Prosiak -4567/tcp File Nail -4590/tcp ICQ Trojan -4950/tcp ICQ Trogen (Lm) -5000/tcp Back Door Setup -5001/tcp Back Door Setup -5002/tcp cd00r -5010/tcp Solo -5011/tcp OOTLT -5025/tcp WM Remote KeyLogger -5031/tcp Net Metropolitan -5032/tcp Net Metropolitan -5321/tcp Firehotcker -5333/tcp Backage -5343/tcp wCrat -5400/tcp Back Construction -5401/tcp Back Construction -5402/tcp Back Construction -5512/tcp Illusion Mailer -5534/tcp The Flu -5550/tcp Xtcp -5555/tcp ServeMe -5556/tcp BO Facil -5557/tcp BO Facil -5569/tcp Robo-Hack -5637/tcp PC Crasher -5638/tcp PC Crasher -5742/tcp WinCrash -5760/tcp Portmap Remote Root Linux Exploit -5880/tcp Y3K RAT -5882/tcp Y3K RAT -5882/udp Y3K RAT -5888/tcp Y3K RAT -5888/udp Y3K RAT -5889/tcp Y3K RAT -6000/tcp The Thing -6006/tcp Bad Blood -6272/tcp Secret Service -6400/tcp The Thing -6661/tcp TEMan -6666/tcp Dark Connection Inside -6667/tcp Dark FTP -6669/tcp Host Control, Vampire -6670/tcp BackWeb Server -6711/tcp BackDoor-G -6712/tcp Funny trojan -6713/tcp SubSeven -6723/tcp Mstream -6771/tcp Deep Throat -6776/tcp 2000 Cracks -6838/udp Mstream -6883/tcp Delta Source DarkStar (??) -6912/tcp Shit Heep -6939/tcp Indoctrination -6969/tcp GateCrasher -6970/tcp GateCrasher -7000/tcp Exploit Translation Server -7001/tcp Freak88 -7215/tcp SubSeven -7300/tcp NetMonitor -7301/tcp NetMonitor -7306/tcp NetMonitor -7307/tcp NetMonitor -7308/tcp NetMonitor -7424/tcp Host Control -7424/udp Host Control -7597/tcp Qaz -7626/tcp Glacier -7777/tcp God Message, Tini -7789/tcp Back Door Setup, ICKiller -7891/tcp The ReVeNgEr -7983/tcp Mstream -8080/tcp Brown Orifice -8787/tcp Back Orifice 2000 -8988/tcp BacHack -8989/tcp Rcon -9000/tcp Netministrator -9325/udp Mstream -9400/tcp InCommand -9872/tcp Portal of Doom -9873/tcp Portal of Doom -9874/tcp Portal of Doom -9875/tcp Portal of Doom -9876/tcp Cyber Attacker, Rux -9878/tcp TransScout -9989/tcp Ini-Killer -9999/tcp The Prayer -10000/tcp OpwinTRojan -10005/tcp OpwinTRojan -10067/udp Portal of Doom -10085/tcp Syphillis -10086/tcp Syphillis -10100/tcp Control Total -10101/tcp BrainSpy -10167/udp Portal of Doom -10520/tcp Acid Shivers -10528/tcp Host Control -10607/tcp Coma -10666/udp Ambush -11000/tcp Senna Spy Trojan Generator -11050/tcp Host Control -11051/tcp Host Control -11223/tcp Progenic trojan -12076/tcp Gjamer -12223/tcp Hack-99 KeyLogger -12345/tcp Ashley -12346/tcp Fat Bitch -12349/tcp BioNet -12361/tcp Whack-a-mole -12362/tcp Whack-a-mole -12363/tcp Whack-a-mole -12623/udp DUN Control -12624/tcp ButtMan -12631/tcp Whack Job -12754/tcp Mstream -13000/tcp Senna Spy -13010/tcp Hacker Brasil - HBR -13013/tcp PsychWard -13014/tcp PsychWard -13223/tcp Hack´99 KeyLogger -13473/tcp Chupacabra -14500/tcp PC Invader -14501/tcp PC Invader -14502/tcp PC Invader -14503/tcp PC Invader -15000/tcp NetDemon -15092/tcp Host Control -15104/tcp Mstream -15382/tcp SubZero -15858/tcp CDK -16484/tcp Mosucker -16660/tcp Stacheldraht -16772/tcp ICQ Revenge -16959/tcp SubSeven -16969/tcp Priority -17166/tcp Mosaic -17300/tcp Kuang2 the virus -17449/tcp Kid Terror -17499/tcp CrazzyNet -17500/tcp CrazzyNet -17569/tcp Infector -17593/tcp Audiodoor -17777/tcp Nephron -18753/udp Shaft -19864/tcp ICQ Revenge -20000/tcp Millenium -20001/tcp Millenium -20002/tcp AcidkoR -20005/tcp Mosucker -20023/tcp VP Killer -20034/tcp NetBus -20203/tcp Chupacabra -20331/tcp BLA trojan -20432/tcp Shaft -20433/udp Shaft -21544/tcp GirlFriend, Kid Terror -21554/tcp Exploiter -22222/tcp Donald Dick -23005/tcp NetTrash -23006/tcp NetTrash -23023/tcp Logged -23032/tcp Amanda -23432/tcp Asylum -23456/tcp Evil FTP -23476/tcp Donald Dick -23476/udp Donald Dick -23477/tcp Donald Dick -23777/tcp InetSpy -24000/tcp Infector -25685/tcp Moonpie -25686/tcp Moonpie -25982/tcp Moonpie -26274/udp Delta Source -26681/tcp Voice Spy -27374/tcp Bad Blood -27444/udp Trinoo -27573/tcp SubSeven -27665/tcp Trinoo -28678/tcp Exploiter -29104/tcp NetTrojan -29369/tcp ovasOn -29891/tcp The Unexplained -30000/tcp Infector -30001/tcp ErrOr32 -30003/tcp Lamers Death -30029/tcp AOL trojan -30100/tcp NetSphere -30101/tcp NetSphere -30102/tcp NetSphere -30103/tcp NetSphere -30103/udp NetSphere -30133/tcp NetSphere -30303/tcp Sockets des Troie -30947/tcp Intruse -30999/tcp Kuang2 -31335/tcp Trinoo -31336/tcp Bo Whack, Butt Funnel -31337/tcp Back Fire -31337/udp Back Orifice -31338/tcp Back Orifice -31338/udp Deep BO -31339/tcp NetSpy (DK) -31666/tcp BOWhack -31785/tcp Hack´a´Tack -31787/tcp Hack´a´Tack -31788/tcp Hack´a´Tack -31789/udp Hack´a´Tack -31790/tcp Hack´a´Tack -31791/udp Hack´a´Tack -31792/tcp Hack´a´Tack -32001/tcp Donald Dick -32100/tcp Peanut Brittle -32418/tcp Acid Battery -33270/tcp Trinity -33333/tcp Blakharaz -33577/tcp Son of PsychWard -33777/tcp Son of PsychWard -33911/tcp Spirit 2000 -34324/tcp Big Gluck -34444/tcp Donald Dick -34555/udp Trinoo -35555/udp Trinoo -37237/tcp Mantis -37651/tcp Yet Another Trojan - YAT -40412/tcp The Spy -40421/tcp Agent 40421 -40422/tcp Masters Paradise -40423/tcp Masters Paradise -40425/tcp Masters Paradise -40426/tcp Masters Paradise -41337/tcp Storm -41666/tcp RBT -44444/tcp Prosiak -44575/tcp Exploiter -47262/udp Delta Source -49301/tcp OnLine KeyLogger -50130/tcp Enterprise -50505/tcp Sockets des Troie -50766/tcp Fore -51966/tcp Cafeini -52317/tcp Acid Battery 2000 -53001/tcp RWS -54283/tcp SubSeven -54320/tcp Back Orifice 2000 -54321/tcp Back Orifice 2000 -55165/tcp File Manager trojan -55166/tcp WM Trojan Generator -57341/tcp NetRaider -58339/tcp Butt Funnel -60000/tcp Deep Throat -60001/tcp Trinity -60068/tcp Xzip 6000068 -60411/tcp Connection -61348/tcp Bunker-Hill -61466/tcp TeleCommando -61603/tcp Bunker-Hill -63485/tcp Bunker-Hill -64101/tcp Taskman -65000/tcp Devil -65390/tcp Eclypse -65421/tcp Jade -65432/tcp The Traitor (= th3tr41t0r) -65432/udp The Traitor (= th3tr41t0r) -65534/tcp /sbin/initd -65535/tcp RC1 trojan diff --git a/roles/epylog/files/merged/weed_dist.cf b/roles/epylog/files/merged/weed_dist.cf deleted file mode 100644 index dd87e2d351..0000000000 --- a/roles/epylog/files/merged/weed_dist.cf +++ /dev/null @@ -1,179 +0,0 @@ -## -# NOTE: -# Editing this file is not recommended. If you do, you might miss newer -# revisions of this list in the future versions. -# See weed_local.cf for instructions on how to add or delete rules. -# - -[pam] -\(pam_unix\).*: session closed for -\(pam_unix\).*: check pass; - -[dhcpd] -dhcpd: DHCPREQUEST -dhcpd: DHCPACK -dhcpd: DHCPDISCOVER -dhcpd: DHCPOFFER -dhcpd: DHCPRELEASE -dhcpd: DHCPINFORM - -[rpc] -rpc.mountd: authenticated mount request from -rpc.mountd: authenticated unmount request -rpc.statd.*: Version .* Starting -rpc.statd.*: Caught signal 15, un-registering and exiting - -[automount] -automount.*: expired -automount.*: attempting to mount entry -automount.*: lookup\(file\): .* failed -automount.*: starting automounter -automount.*: using kernel protocol -automount.*: shutting down -automount.*: .* No such key in map - -[crond] -CROND.*: \(mailman\) CMD \(/usr/bin/python -CROND.*: \(root\) CMD \(.*/sbin/rmmod -as\) -CROND.*: \(root\) CMD \(/usr/lib/sa/sa\d -CROND.*: \(root\) CMD \(run-parts -anacron.*: Updated timestamp for job - -[bind] -named.*: lame server resolving -named.*: .* NS points to CNAME -named.*: Response from unexpected source -named.*: .* All possible A RR's lame -named.*: bad referral -named.*: Cleaned cache -named.*: USAGE -named.*: NSTATS -named.*: XSTATS -named.*: .* points to a CNAME -named.*: denied update from -named.*: .* Bogus LOOPBACK - -[gnome] -gnome-name-server.*: input condition is: -gnome-name-server.*: name server starting -gnome-name-server.*: starting -gnome-name-server.*: name server was running -gconfd.*: Resolved address -gconfd.*: GConf server is not in use -gconfd.*: Exiting -gconfd.*: starting -gconfd.*: .* shutting down cleanly -gdm.*: Couldn't authenticate user -xscreensaver.*: FAILED LOGIN - -[sshd] -sshd.*: Generating new .* key. -sshd.*: .* key generation complete -sshd.*: Connection closed -sshd.*: Could not reverse map address -sshd.*: Received disconnect from -sshd.*: error: Could not get shadow information for -sshd.*: Invalid user .* from - -[xinetd] -xinetd.*: .* Transport endpoint is not connected -xinetd.*: EXIT: - -[uw-imap] -imapd.*: AUTHENTICATE -imapd.*: Logout -imapd.*: Killed -imapd.*: imap.*service init -imapd.*: Command stream end of file -imapd.*: Autologout -imapd.*: Connection reset by peer -ipop3d.*: AUTHENTICATE -ipop3d.*: Logout -ipop3d.*: Killed -ipop3d.*: Autologout -ipop3d.*: pop3.*service init - -[courier-imap] -imapd.*: Connection, ip=\[\S+\] -imapd.*: LOGOUT, user=\S+, ip=\[\S+\] -imapd.*: Disconnected, ip=\[\S+\] -imapd.*: DISCONNECTED, user=\S+, ip=\[\S+\] -imapd.*: LOGOUT, ip=\[\S+\] -pop3d.*: Connection, ip=\[\S+\] -pop3d.*: LOGOUT, user=\S+, ip=\[\S+\] -pop3d.*: Disconnected, ip=\[\S+\] -pop3d.*: DISCONNECTED, user=\S+, ip=\[\S+\] -pop3d.*: LOGOUT, ip=\[\S+\] - -[postfix] -postfix/smtp\[\d+\]: connect to -postfix/smtp\[\d+\]: warning: no MX host -postfix/smtp\[\d+\]: warning: numeric domain name in resource data -postfix/smtp\[\d+\]: warning: host .* with my own hostname -postfix/smtpd.*: connect from -postfix/smtpd.*: disconnect from -postfix/smtpd.*: TLS connection established -postfix/smtpd.*: lost connection -postfix/cleanup -postfix/pickup - -[sendmail] -sendmail\[.*:.*NOQUEUE: Null connection from -sendmail\[.*:.*timeout waiting for input - -[qmail] -qmail:.* new msg -qmail:.* end msg -qmail:.* status: - -[spamd] -spamd\[.*: info: -spamd\[.*: processing message -spamd\[.*: checking message -spamd\[.*: connection from -spamd\[.*: Creating default_prefs - -[printer] -printer: ready to print -printer: status change -printer: printing -printer: peripheral low-power state - -[pumpd] -pumpd.*: renewed lease for interface -pumpd.*: configured interface - -[afpd] -afpd.*: ASIP session: -afpd.*: afp_flushfork: -afpd.*: .*B read,.*B written - -[ntpd] -ntpd.*: kernel time discipline status change - -[kernel] -kernel: application .* uses obsolete OSS audio interface -kernel: SELinux: initialized -kernel: device .* left promiscuous mode -kernel: .*: disabled promiscuous mode -usb-uhci.c: interrupt, status -PCI: Found IRQ -PCI: Sharing IRQ -PCI: Setting latency timer -kernel: agpgart: Found -kernel: agpgart: Putting - -[misc] -modprobe: Can't locate module -logger: punching nameserver .* through the firewall -HORDE\[\S*\s*\[imp\] Logout -LOGIN ON tty. -dhclient: DHCPREQUEST -dhclient: DHCPACK -dhclient: DHCPDISCOVER -dhclient: bound to -dbus: avc: .* buckets used - - - -## $Revision: 1.14.2.4 $ ## diff --git a/roles/epylog/files/merged/weed_local.cf b/roles/epylog/files/merged/weed_local.cf deleted file mode 100644 index f45cc9cee0..0000000000 --- a/roles/epylog/files/merged/weed_local.cf +++ /dev/null @@ -1,491 +0,0 @@ -[ADD] -## -# Here is where you add your own rules -# -atomic-openshift-node:.* -audit.* -ansible.*: Invoked.* -ansible.*: message repeated.* -ansible-accelerate:.* -ansible-async_wrapper.* -auditd.* -autocloud_job.* -avahi-daemon.* -btseed.* -bugyou-cntrl.* -celery.* -check_nrpe: Remote.*accepted a Version.*Packet -check_nrpe: Remote.*does not support Version.*Packets -chronyd.* -collectd.*: Filter subsystem.* -collectd.*: Value too old.* -collectd.*: processes plugin: Failed to read from.* -collectd.*: 0 Success:.*value has been dispatched. -collectd.*: message repeated.*times.*0 Success:.* -collectd.*: exec plugin.*Unable to parse command\, ignoring line.* -conmon:.* -.*libcontainer.* -dbus.*:.*avc:.*received.* -dbus.*:.*Reloaded configuration.* -dbus.*:.*Successfully activated service 'org.fedoraproject.Setroubleshootd'.* -dbus.*:.*Successfully activated service 'org.freedesktop.nm_dispatcher' -dbus.*:.*\[system\].*Activating via systemd: service.* -dbus.*:.*\[system\].*Activating.*using servicehelper.* -dbus.*:.*\[system\].*Successfully activated service.* -dbus-daemon.*:.*Successfully activated service \'org.fedoraproject.Setroubleshootd\'.* -dbus-daemon.*:.*Activating via systemd: service.* -dbus-daemon.*:.*Successfully activated service.* -dhclient.*: bound to.* -dhclient.*: DHCPDISCOVER.* -dhclient.*: DHCPACK.* -dhclient.*: DHCPREQUEST.* -dhcpd:.*Wrote.*leases file.* -dnsmasq-dhcp.* -dnsmasq.* -# work around bug https://bugzilla.redhat.com/show_bug.cgi?id=947989 -dhclient.*: send_packet: Operation not permitted -dhclient.*: dhclient.c:.*: Failed to send.*byte long packet over fallback interface. -dhclient.*: Internet Systems Consortium DHCP Client.* -dhclient.*: Copyright 2004-2013 Internet Systems Consortium. -dhclient.*: All rights reserved. -dhclient.*: For info, please visit https://www.isc.org/software/dhcp/ -dhclient.*: Listening on.* -dhclient.*: Sending on.* -dhclient.*: Sending on.* -dhclient.*: $ -django-admin.* -dnf:.* -dnf-automatic:.* -docker.* -dracut.* -etcd.* -.*EDAC sbridge.* -fedmsg-hub.* -fedmsg.*:No routing policy defined for.* -mdapi-run.* -moksha-hub.* -mailman3.* -mote-updater.* -odcs-backend.*:.*Checking for expired composes -.*odcs-backend.*: Checking for expired composes -.*.go\: -freshclam.*: Can't connect to port 80 of host.* -freshclam.*: connect_error:.* -freshclam.*: Downloading.* -freshclam.*:.*is up to date.* -freshclam.*:.*updated.* -freshclam.*: Database updated.* -freshclam.*: ClamAV update process started -git-daemon.*: Connection from.* -git-daemon.*: Connection reset by peer -git-daemon.*: .* does not appear to be a git repository -git-daemon.*: Extended attributes.* -git-daemon.*: Request upload-pack.* -git-daemon.*: The remote end hung up unexpectedly -git-daemon.*: userpath.* -git-daemon.*: Request upload-archive for.* -git-daemon.*: fatal: write error: Connection timed out -groupadd.*: group added to.*: name=(mockbuild|dialout|floppy|cdrom|tape|utmp|utempter|dbus|avahi-autoipd|rpc|rpcuser|nfsnobody|ssh_keys).* -(group|user)add.*: new (user|group): name=(mockbuild|dialout|floppy|cdrom|tape|utmp|utempter|dbus|avahi-autoipd|rpc|rpcuser|nfsnobody|ssh_keys).* -heartbeat.* info:.* -heartbeat.*:info.* -heartbeat.*:WARN: Gmain_timeout_dispatch: Dispatch function for retransmit request took too long to execute.* -httpd.*:.*AH0.* -in.tftpd.*: tftp: client does not accept options -journal:.*\[wsgi\:error\] -journal:.*0000\] \"POST .* -journal:.*0000\] \"GET .* -journal: libvirt version.* -journal: Failed to acquire.* -journal: cannot lookup default selinux label for.* -journal: Domain id.* -journal: End of file while reading data\: Input\/output error -journal: hostname.* -journal: 10.131.0.1.* -journal: 10.128.0.1.* -journal: 10.130.0.1.* -journal: - HAProxy port 1936 health check ok : 0 retry attempt(s). -journal:.*Go-http-client.* -journal.*:.*healthz.* -journal.*DEBUG.* -journal.*WARNING.* -kernel: nf_conntrack\: falling back to vmalloc. -kernel:.*CPU.*power limit.* -kernel:.*dma-pl330 fff3d000.dma: Reset Channel.* -kernel: TCPv6: Possible SYN flooding on port 80. Sending cookies. -kernel: TCPv6: Possible SYN flooding on port 80. Dropping request. -kernel: possible SYN flooding on port 80. Sending cookies. -kernel: EXT4-fs \(.*\): mounted filesystem with ordered data mode.* -kernel: ioctl32\(e2fsck.* -kernel: ioctl32\(resize2fs.* -kernel: md: data-check of RAID array.* -kernel: md: delaying data-check of.* -kernel: md: md.*: data-check done. -kernel: md: minimum _guaranteed_ speed.* -kernel: md: using 128k window.* -kernel: md: using maximum available idle IO bandwidth.* -kernel: printk.*suppressed. -kernel: __ratelimit:.*callbacks suppressed -kernel:.*subj=.* -kernel:.*exe=.* \(sauid=.*, hostname=.* addr=.* terminal=.*\) -kernel:.*type=.*audit\(.* -kernel:.*audit_printk_skb:.*callbacks suppressed -kernel:.*usb 3-3: new full-speed USB device number.*using xhci_hcd -kernel:.*usb 3-3: Device not responding to set address. -kernel:.*usb 3-3: Device not responding to set address. -kernel:.*usb 3-3: device not accepting address.*error -71 -kernel:.*kvm.*vcpu.*unhandled rdmsr.* -kernel:.*kvm_get_msr_common:.*callbacks suppressed -kernel:.*device vnet.*entered promiscuous mode -kernel:.*virbr0: port.*entered.*state -kernel:.*virbr0: topology change detected, propagating -kernel: blk_update_request.*I/O error, dev loop0, sector.* -kernel: blk-mq: bad return on queue.* -kernel: XFS.*Ending clean mount -kernel: XFS.*Unmounting Filesystem -kernel: XFS.*Mounting V5 Filesystem -kernel: XFS.*Ending clean mount -kernel: .*added RAID HP P410i controller SSDSmartPathCap.* -kernel: hpsa.*addition failed -19, device not added. -kernel: PC.* -kernel: LR.* -kernel: pc.* -kernel: sp.* -kernel: x.* -kernel: Hardware name.* -kernel: task.* -kernel: kauditd_printk_skb.* -kernel: sd 7.* -kernel: Using.*as fallback implementation. -kernel:.*ready -kojid.* -kojira.* -logrotate.* -lvm.*: Another thread is handling an event. Waiting...* -libvirtd:.*debug.* -libvirtd.*:.*is tainted.* -loopabull.* -nagios.* -named.*: .* general: info:.* -named.*: .* notify: info:.* -named.*: .* general: error: zone.*unchanged. zone may fail to transfer to slaves. -named.*: .* resolver: notice: DNS format error from.*: invalid response -named.*: .* resolver: notice: DNS format error from.*: non-improving referral -named.*: .* resolver: notice: clients-per-query increased to.* -named.*: .* security: info: client.*: view.*: query (cache).*denied -named.*: .* edns-disabled: info: success resolving.*after.* -named.*: .* security: info: client.*denied -named.*: .* rate-limit: info:.* -named.*: .* general: warning: checkhints: view.* -named.*: .* query-errors: info: client.*rate limit slip response to.* -named.*: .* query-errors: info: client.*rate limit drop response to.* -named.*: .*8580 -named.*: .*query-errors.* -named.*: .*cname\: info\: skipping nameserver.* -NetworkManager.*: \Count | Log |
---|---|
%s | %s | \n
\nComplete messages\n\n" - res += ''.join(sorted(open(self.complete, 'r').readlines())) - res += "\n | \n
%s | \n' % (bgcolor, host) - line = line + '\t\t\n' % bgcolor
- for loc in hostloc[host]:
- line = line + '\t\t\t%s \n' % loc - line = line + '\t\t | \n'
- size, marker = self.mk_size_unit(hosttotal[host])
- line = line + '\t\t%s%s | \n' % (bgcolor, size, marker) - line = line + '\t