DDOS_PROTOCOL_VIOLATION_SET

Maps to the ietf-alarm YANG model.

Implemented for

  • junos

Syslog message example

<28>Nov  9 01:02:40  some-switch jddosd[4223]: DDOS_PROTOCOL_VIOLATION_SET: Warning: Host-bound traffic for protocol/exception  Redirect:aggregate exceeded its allowed bandwidth at fpc 0 for 6661 times, started at 2020-11-09 01:02:39 UTC

Structured message example

{
  "error": "DDOS_PROTOCOL_VIOLATION_SET",
  "facility": 3,
  "host": "some-switch",
  "ip": "127.0.0.1",
  "message_details": {
      "date": "Nov  9",
      "facility": 3,
      "host": "some-switch",
      "hostPrefix": null,
      "message": "Warning: Host-bound traffic for protocol/exception  Redirect:aggregate exceeded its allowed bandwidth at fpc 0 for 6661 times, started at 2020-11-09 01:02:39 UTC",
      "pri": "28",
      "processId": "4223",
      "processName": "jddosd",
      "severity": 4,
      "tag": "DDOS_PROTOCOL_VIOLATION_SET",
      "time": "01:02:40"
  },
  "os": "junos",
  "severity": 4,
  "timestamp": 1604883760,
  "yang_message": {
      "alarms": {
          "alarm": {
              "additional-text": "aggregate exceeded its allowed bandwidth at fpc 0",
              "alarm-time": "2020-11-09 01:02:39 UTC",
              "entity-type": "Redirect",
              "event-type": 10
          }
      }
  },
  "yang_model": "ietf-alarm"
}