DDOS_PROTOCOL_VIOLATION_SET¶
Maps to the ietf-alarm YANG model.
Implemented for¶
- junos
Syslog message example¶
<28>Nov 9 01:02:40 some-switch jddosd[4223]: DDOS_PROTOCOL_VIOLATION_SET: Warning: Host-bound traffic for protocol/exception Redirect:aggregate exceeded its allowed bandwidth at fpc 0 for 6661 times, started at 2020-11-09 01:02:39 UTC
Structured message example¶
{
"error": "DDOS_PROTOCOL_VIOLATION_SET",
"facility": 3,
"host": "some-switch",
"ip": "127.0.0.1",
"message_details": {
"date": "Nov 9",
"facility": 3,
"host": "some-switch",
"hostPrefix": null,
"message": "Warning: Host-bound traffic for protocol/exception Redirect:aggregate exceeded its allowed bandwidth at fpc 0 for 6661 times, started at 2020-11-09 01:02:39 UTC",
"pri": "28",
"processId": "4223",
"processName": "jddosd",
"severity": 4,
"tag": "DDOS_PROTOCOL_VIOLATION_SET",
"time": "01:02:40"
},
"os": "junos",
"severity": 4,
"timestamp": 1604883760,
"yang_message": {
"alarms": {
"alarm": {
"additional-text": "aggregate exceeded its allowed bandwidth at fpc 0",
"alarm-time": "2020-11-09 01:02:39 UTC",
"entity-type": "Redirect",
"event-type": 10
}
}
},
"yang_model": "ietf-alarm"
}