On 11/04/2006 Todd Troxell wrote:
> Thanks for you report.

no problem.

> > Security Events
> > =-=-=-=-=-=-=-=
> > Mar 16 22:31:56 resivo syslog-ng[6932]: Log statistics; 
> > processed='source(s_all)=2186', processed='destination(df_auth)=407', 
> > processed='destination(df_news_dot_notice)=0', 
> > processed='destination(df_news_dot_err)=0', 
> > processed='destination(df_uucp)=0', processed='destination(df_mail)=0', 
> > processed='destination(df_user)=126', 
> > processed='destination(df_facility_dot_notice)=0', 
> > processed='destination(df_daemon)=1415', 
> > processed='destination(df_facility_dot_crit)=0', 
> > processed='destination(df_debug)=28'
> 
> I have tested this with a couple of versions of logcheck and I'm unable to
> reproduce.  It is worth nothing that the string caught above contains
> substrings that would trigger a violation, and therefore needs a line in
> violations.ignore.d as well.  I suspect this is a configuration issue.
> 
> Please let me know your findings.

i used latest logcheck from debian/unstable, and i've reproduced this
bug on at least three machines. i found out now, that not the line
length is the problem, but the word 'debug' in the line.

if i change the word 'debug' to 'debux' or whatever else, logcheck
doesn't stumble over the line.

so are there some rules to not ignore lines containing 'debug',
regardless whether a ignore rule matches them or not?

...
 jonas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to