====== Log et service ====== Comme vous le savez, le raspberry tourne sur une SDcard, et cette mémoire flash n'aime pas trop les écritures à outrance. Je vais donc essayer de trouver des solutions pour limiter les logs qui ne sont pas importants. ===== Les logs ===== # cd /var/log # find -mtime -1 -type f -exec ls -l {} \; -rw-r--r-- 1 root root 86111 juil. 2 21:41 ./samba/log.smbd -rw-r--r-- 1 root root 1829 juil. 1 21:49 ./samba/log.nmbd -rw-r----- 1 root adm 1552222 juil. 2 21:17 ./auth.log -rw-r----- 1 root adm 563699 juil. 2 19:24 ./messages -rw-r----- 1 root adm 5876077 juil. 2 21:48 ./syslog -rw-r----- 1 root adm 12252 juil. 2 19:24 ./user.log -rw-rw-r-- 1 root utmp 2688 juil. 2 07:22 ./wtmp -rw-r--r-- 1 root root 2408 juil. 2 19:24 ./rsnapshot.log -rw-r----- 1 root adm 6718716 juil. 2 19:24 ./kern.log -rw-r----- 1 root adm 1176251 juil. 2 06:25 ./syslog.1 -rw-r--r-- 1 root root 24048 juil. 1 22:05 ./faillog -rw-rw-r-- 1 root utmp 292584 juil. 2 07:22 ./lastlog -rw-r--r-- 1 root root 6405 juil. 1 22:12 ./aptitude -rw-r----- 1 root adm 548236 juil. 2 21:48 ./daemon.log On va analyser tous les fichiers qui ont été modifié récemment et qui ont une taille élevée. ==== Samba ==== Extrait [2013/07/03 21:13:36.351018, 0] printing/print_cups.c:110(cups_connect) Unable to connect to CUPS server localhost:631 - Connection refused [2013/07/03 21:13:36.352343, 0] printing/print_cups.c:487(cups_async_callback) failed to retrieve printer list: NT_STATUS_UNSUCCESSFUL [2013/07/03 21:26:37.070193, 0] printing/print_cups.c:110(cups_connect) Unable to connect to CUPS server localhost:631 - Connection refused [2013/07/03 21:26:37.071525, 0] printing/print_cups.c:487(cups_async_callback) failed to retrieve printer list: NT_STATUS_UNSUCCESSFUL [2013/07/03 21:39:37.829379, 0] printing/print_cups.c:110(cups_connect) Unable to connect to CUPS server localhost:631 - Connection refused [2013/07/03 21:39:37.830682, 0] printing/print_cups.c:487(cups_async_callback) failed to retrieve printer list: NT_STATUS_UNSUCCESSFUL [2013/07/03 21:52:38.517540, 0] printing/print_cups.c:110(cups_connect) Unable to connect to CUPS server localhost:631 - Connection refused [2013/07/03 21:52:38.518854, 0] printing/print_cups.c:487(cups_async_callback) failed to retrieve printer list: NT_STATUS_UNSUCCESSFUL [2013/07/03 22:05:39.251127, 0] printing/print_cups.c:110(cups_connect) Unable to connect to CUPS server localhost:631 - Connection refused [2013/07/03 22:05:39.252537, 0] printing/print_cups.c:487(cups_async_callback) failed to retrieve printer list: NT_STATUS_UNSUCCESSFUL [2013/07/03 22:18:40.010082, 0] printing/print_cups.c:110(cups_connect) Unable to connect to CUPS server localhost:631 - Connection refused [2013/07/03 22:18:40.011400, 0] printing/print_cups.c:487(cups_async_callback) failed to retrieve printer list: NT_STATUS_UNSUCCESSFUL [2013/07/03 22:31:40.778366, 0] printing/print_cups.c:110(cups_connect) Unable to connect to CUPS server localhost:631 - Connection refused [2013/07/03 22:31:40.779682, 0] printing/print_cups.c:487(cups_async_callback) failed to retrieve printer list: NT_STATUS_UNSUCCESSFUL [2013/07/03 22:44:41.517855, 0] printing/print_cups.c:110(cups_connect) Unable to connect to CUPS server localhost:631 - Connection refused [2013/07/03 22:44:41.519169, 0] printing/print_cups.c:487(cups_async_callback) failed to retrieve printer list: NT_STATUS_UNSUCCESSFUL Editez votre fichier de config **/etc/samba/smb.conf** et passez **load_printer = no** et ajoutez les lignes qui suivent ########## Printing ########## # If you want to automatically load your printer list rather # than setting them up individually then you'll need this load printers = no show add printer wizard = no printcap name = /dev/null disable spoolss = yes Relancez samba service samba restart ==== auth.log ==== Extrait : Jul 4 19:48:59 edmchome sshd[8201]: Failed password for root from 80.84.55.183 port 11919 ssh2 Jul 4 19:48:59 edmchome sshd[8201]: Disconnecting: Too many authentication failures for root [preauth] Jul 4 19:48:59 edmchome sshd[8201]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.84.55.183 user=root Jul 4 19:48:59 edmchome sshd[8201]: PAM service(sshd) ignoring max retries; 6 > 3 Jul 4 19:49:01 edmchome sshd[8205]: reverse mapping checking getaddrinfo for 183-55-84-80.rackcentre.redstation.net.uk [80.84.55.183] failed - POSSIBLE BREAK-IN ATTEMPT! Jul 4 19:49:02 edmchome sshd[8205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.84.55.183 user=root Jul 4 19:49:03 edmchome sshd[8205]: Failed password for root from 80.84.55.183 port 12041 ssh2 Jul 4 19:49:07 edmchome sshd[8205]: Failed password for root from 80.84.55.183 port 12041 ssh2 Jul 4 19:49:09 edmchome sshd[8205]: Failed password for root from 80.84.55.183 port 12041 ssh2 Jul 4 19:49:11 edmchome sshd[8205]: Failed password for root from 80.84.55.183 port 12041 ssh2 Jul 4 19:49:13 edmchome sshd[8205]: Failed password for root from 80.84.55.183 port 12041 ssh2 Jul 4 19:49:16 edmchome sshd[8205]: Failed password for root from 80.84.55.183 port 12041 ssh2 Jul 4 19:49:16 edmchome sshd[8205]: Disconnecting: Too many authentication failures for root [preauth] Jul 4 19:49:16 edmchome sshd[8205]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.84.55.183 user=root Jul 4 19:49:16 edmchome sshd[8205]: PAM service(sshd) ignoring max retries; 6 > 3 Jul 4 19:49:18 edmchome sshd[8209]: reverse mapping checking getaddrinfo for 183-55-84-80.rackcentre.redstation.net.uk [80.84.55.183] failed - POSSIBLE BREAK-IN ATTEMPT! Jul 4 19:49:19 edmchome sshd[8209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.84.55.183 user=root Jul 4 19:49:20 edmchome sshd[8209]: Failed password for root from 80.84.55.183 port 12167 ssh2 Jul 4 19:49:22 edmchome sshd[8209]: Failed password for root from 80.84.55.183 port 12167 ssh2 Jul 4 19:49:25 edmchome sshd[8209]: Failed password for root from 80.84.55.183 port 12167 ssh2 Jul 4 19:49:28 edmchome sshd[8209]: Failed password for root from 80.84.55.183 port 12167 ssh2 Jul 4 19:49:31 edmchome sshd[8209]: Failed password for root from 80.84.55.183 port 12167 ssh2 Jul 4 19:49:33 edmchome sshd[8209]: Failed password for root from 80.84.55.183 port 12167 ssh2 Jul 4 19:49:33 edmchome sshd[8209]: Disconnecting: Too many authentication failures for root [preauth] Jul 4 19:49:33 edmchome sshd[8209]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.84.55.183 user=root Jul 4 19:49:33 edmchome sshd[8209]: PAM service(sshd) ignoring max retries; 6 > 3 Jul 4 19:49:35 edmchome sshd[8213]: reverse mapping checking getaddrinfo for 183-55-84-80.rackcentre.redstation.net.uk [80.84.55.183] failed - POSSIBLE BREAK-IN ATTEMPT! Jul 4 19:49:35 edmchome sshd[8213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.84.55.183 user=root Jul 4 19:49:37 edmchome sshd[8213]: Failed password for root from 80.84.55.183 port 12290 ssh2 Jul 4 19:49:40 edmchome sshd[8213]: Failed password for root from 80.84.55.183 port 12290 ssh2 Jul 4 19:49:43 edmchome sshd[8213]: Failed password for root from 80.84.55.183 port 12290 ssh2 Jul 4 19:49:45 edmchome sshd[8213]: Failed password for root from 80.84.55.183 port 12290 ssh2 Jul 4 19:49:47 edmchome sshd[8213]: Failed password for root from 80.84.55.183 port 12290 ssh2 Jul 4 19:49:50 edmchome sshd[8213]: Failed password for root from 80.84.55.183 port 12290 ssh2 Jul 4 19:49:50 edmchome sshd[8213]: Disconnecting: Too many authentication failures for root [preauth] Jul 4 19:49:50 edmchome sshd[8213]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.84.55.183 user=root Jul 4 19:49:50 edmchome sshd[8213]: PAM service(sshd) ignoring max retries; 6 > 3 A peine un port ssh ouvert sur la toile que déjà des milliers de tentative de connexions qui génère des logs à n'en plus finir. On va donc modifier le niveau de verbosité des logs de sshd >LogLevel > Donne le niveau de verbosité utilisé lors de l'enregistrement des messages du démon sshd Les valeurs possibles sont : QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3. > Par défaut INFO. DEBUG et DEBUG1 sont équivalents. DEBUG2 et DEBUG3 spécifient des niveaux plus élevés de sortie de débogage. L'enregistrement à l'aide d'un niveau DEBUG a tendance à empiéter sur la vie privée des utilisateurs et n'est pas recommandé. vi /etc/ssh/sshd_config LogLevel QUIET service ssh reload Inconvénient, plus de trace en cas de piratage, assurez vous d'avoir un bon mot de passe. voir aussi dans /etc/rsyslog.conf Commenter la ligne suivante pour ne plus rien recevoir dans /var/log/auth.log #auth,authpriv.* /var/log/auth.log et relancez le service des journaux service rsyslog restart --- Dans auth.log il y a aussi un paquet de ligne venant de cron Jun 24 20:35:01 edmchome CRON[9024]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:35:01 edmchome CRON[9024]: pam_unix(cron:session): session closed for user root Jun 24 20:36:01 edmchome CRON[9040]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:36:01 edmchome CRON[9040]: pam_unix(cron:session): session closed for user root Jun 24 20:37:01 edmchome CRON[9056]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:37:02 edmchome CRON[9056]: pam_unix(cron:session): session closed for user root Jun 24 20:38:01 edmchome CRON[9072]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:38:01 edmchome CRON[9072]: pam_unix(cron:session): session closed for user root Jun 24 20:39:01 edmchome CRON[9088]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:39:01 edmchome CRON[9088]: pam_unix(cron:session): session closed for user root Jun 24 20:40:01 edmchome CRON[9104]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:40:02 edmchome CRON[9104]: pam_unix(cron:session): session closed for user root Jun 24 20:41:01 edmchome CRON[9120]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:41:01 edmchome CRON[9120]: pam_unix(cron:session): session closed for user root Jun 24 20:42:01 edmchome CRON[9136]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:42:02 edmchome CRON[9136]: pam_unix(cron:session): session closed for user root Jun 24 20:43:01 edmchome CRON[9152]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:43:01 edmchome CRON[9152]: pam_unix(cron:session): session closed for user root Jun 24 20:44:01 edmchome CRON[9168]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:44:01 edmchome CRON[9168]: pam_unix(cron:session): session closed for user root Jun 24 20:45:01 edmchome CRON[9184]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:45:02 edmchome CRON[9184]: pam_unix(cron:session): session closed for user root Jun 24 20:46:01 edmchome CRON[9200]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:46:01 edmchome CRON[9200]: pam_unix(cron:session): session closed for user root Jun 24 20:47:01 edmchome CRON[9216]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:47:02 edmchome CRON[9216]: pam_unix(cron:session): session closed for user root Jun 24 20:48:01 edmchome CRON[9232]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:48:01 edmchome CRON[9232]: pam_unix(cron:session): session closed for user root Jun 24 20:49:01 edmchome CRON[9248]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:49:01 edmchome CRON[9248]: pam_unix(cron:session): session closed for user root Jun 24 20:50:01 edmchome CRON[9264]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:50:02 edmchome CRON[9264]: pam_unix(cron:session): session closed for user root Jun 24 20:51:01 edmchome CRON[9280]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:51:01 edmchome CRON[9280]: pam_unix(cron:session): session closed for user root Jun 24 20:52:01 edmchome CRON[9296]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:52:02 edmchome CRON[9296]: pam_unix(cron:session): session closed for user root Jun 24 20:53:01 edmchome CRON[9312]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:53:01 edmchome CRON[9312]: pam_unix(cron:session): session closed for user root Jun 24 20:54:01 edmchome CRON[9328]: pam_unix(cron:session): session opened for user root by (uid=0) Jun 24 20:54:01 edmchome CRON[9328]: pam_unix(cron:session): session closed for user root Jun 24 20:55:01 edmchome CRON[9344]: pam_unix(cron:session): session opened for user root by (uid=0) === 1ère méthode trouvé sur le net mais qui ne marche pas pour moi === Pour éviter ça, modifiez **/etc/pam.d/common-session-noninteractive** vi /etc/pam.d/common-session-noninteractive après la ligne session required pam_unix.so ajoutez session [success=1 default=ignore] pam_succeed_if.so service in cron quiet use_uid Redémarrez le service crond service cron restart === 2ème méthode qui marche pour moi :) === Configurer le rsyslog pour exclure ce type d'entrée dans les logs. Editez le fichier **/etc/rsyslog.conf** vi /etc/rsyslog.conf Modifiez la ligne auth,authpriv.* /var/log/auth.log par :msg, contains, "pam_unix(cron:session)" ~ auth,authpriv.* /var/log/auth.log et redémarrez le service des journaux service rsyslog restart ==== messages ==== ==== syslog ==== Extrait: Jul 4 06:26:19 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:26:31 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:26:43 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:26:59 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:27:18 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:27:33 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:27:49 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:28:05 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:28:15 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:28:34 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:28:46 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:28:57 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:29:11 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:29:21 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:29:31 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:29:50 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:30:00 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:30:10 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:30:25 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:30:32 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:30:46 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:30:56 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:31:11 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:31:20 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:31:31 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:31:45 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:31:55 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:32:09 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:32:18 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:32:26 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:32:35 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:32:55 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:33:11 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:33:30 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:33:44 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:33:54 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:34:08 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:34:20 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:34:30 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Jul 4 06:34:39 edmchome dhclient: DHCPREQUEST on eth0 to 192.168.0.254 port 67 Rien trouvé de concret sur le net à part configurer son réseau en ip static ce dont je n'ai pas envie de faire. Ma solution un peu brut mais qui marche est de faire un killall dhclient ---- Extrait Jul 5 09:17:01 edmchome /USR/SBIN/CRON[9951]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly > /dev/null) Jul 5 10:17:01 edmchome /USR/SBIN/CRON[9996]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly > /dev/null) Jul 5 11:17:01 edmchome /USR/SBIN/CRON[10117]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly > /dev/null) Jul 5 12:17:01 edmchome /USR/SBIN/CRON[10163]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly > /dev/null) Jul 5 13:17:01 edmchome /USR/SBIN/CRON[10592]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly > /dev/null) Jul 5 14:17:01 edmchome /USR/SBIN/CRON[13626]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly > /dev/null) Jul 5 15:17:01 edmchome /USR/SBIN/CRON[16127]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly > /dev/null) Jul 5 16:17:01 edmchome /USR/SBIN/CRON[16790]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly > /dev/null) Jul 5 17:17:01 edmchome /USR/SBIN/CRON[16832]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly > /dev/null) Jul 5 18:17:01 edmchome /USR/SBIN/CRON[16876]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly > /dev/null) Jul 5 19:17:01 edmchome /USR/SBIN/CRON[16920]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly > /dev/null) Jul 5 20:17:01 edmchome /USR/SBIN/CRON[16961]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly > /dev/null) Jul 5 21:17:01 edmchome /USR/SBIN/CRON[17163]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly > /dev/null) > Solution trouvé ici http://serverfault.com/questions/432718/avoiding-log-noise-from-cron-jobs-with-syslog-ng-rather-than-syslog Editer le fichier **/etc/default/cron** puis dé-commentez la dernière ligne en spécifiant EXTRA_OPTS='-L 4' Ce qui permet de logguer tout de même les erreurs, sinon remplacez 4 par 0 Un petit redémarrage du service au cas ou service cron restart ==== user.log ==== ==== wtmp ==== ==== rsnapshot.log ==== ==== kern.log ==== Extrait : Jul 3 00:49:15 edmchome kernel: [219188.969066] net_ratelimit: 2423 callbacks suppressed Jul 3 00:49:15 edmchome kernel: [219188.969107] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:15 edmchome kernel: [219188.969815] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:15 edmchome kernel: [219188.969866] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:15 edmchome kernel: [219188.969968] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:15 edmchome kernel: [219188.970058] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:15 edmchome kernel: [219188.970093] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:15 edmchome kernel: [219188.970121] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:15 edmchome kernel: [219188.970146] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:15 edmchome kernel: [219188.970188] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:15 edmchome kernel: [219188.970215] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:22 edmchome kernel: [219196.272645] net_ratelimit: 3043 callbacks suppressed Jul 3 00:49:22 edmchome kernel: [219196.272699] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:22 edmchome kernel: [219196.273692] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:22 edmchome kernel: [219196.273777] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:22 edmchome kernel: [219196.273889] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:22 edmchome kernel: [219196.273941] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:22 edmchome kernel: [219196.273967] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:22 edmchome kernel: [219196.274021] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:22 edmchome kernel: [219196.274191] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:22 edmchome kernel: [219196.274233] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:49:22 edmchome kernel: [219196.274259] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:51:44 edmchome kernel: [219338.219244] net_ratelimit: 3633 callbacks suppressed Jul 3 00:51:44 edmchome kernel: [219338.219286] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:51:44 edmchome kernel: [219338.219383] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:51:44 edmchome kernel: [219338.219516] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:51:44 edmchome kernel: [219338.219554] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:51:44 edmchome kernel: [219338.219598] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:51:44 edmchome kernel: [219338.219664] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:51:44 edmchome kernel: [219338.219705] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:51:44 edmchome kernel: [219338.219732] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:51:44 edmchome kernel: [219338.219754] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Jul 3 00:51:44 edmchome kernel: [219338.219830] smsc95xx 1-1.1:1.0: eth0: kevent 2 may have been dropped Solution trouvé : http://wood1978.dyndns.org/~wood/wordpress/2013/04/03/fix-smsc95xx-1-1-11-0-eth0-kevent-2-may-have-been-dropped-on-raspberry-pi-with-arch-linux Ajouter smsc95xx.turbo_mode=N dans le fichier **/boot/cmdline.txt** smsc95xx.turbo_mode=N dwc_otg.lpm_enable=0 console=ttyAMA0,115200 kgdboc=ttyAMA0,115200 console=tty1 root=/dev/mmcblk0p2 rootfstype=ext4 elevator=noop rootdelay=24 Modifier ou ajoutez les valeurs suivantes dans le fichier **/etc/sysctl.conf** #vm.vfs_cache_pressure = 100 vm.vfs_cache_pressure = 300 #vm.min_free_kbytes=8192 vm.min_free_kbytes=32768 Mettez à jour sysctl sysctl -p ==== lastlog ==== ==== daemon.log ==== ===== Les services ===== ==== console-kit-daemon ==== Le paquet ConsoleKit est un environnement pour garder une trace des différents utilisateurs, des sessions, et des places présents sur un système. Il offre aux logiciels un mécanisme pour réagir aux modifications de ces éléments ou d'une des métadonnées qui y est associée. ==== polkitd ==== ==== triggerhappy ==== ==== dbus-daemon ==== ===== Stopper tous les logs ===== Solution radicale pour éviter l'écriture des logs sudo systemctl stop rsyslog sudo systemctl disable rsyslog ou Edit the file /etc/rsyslog.conf and just after the section starting ############### #### RULES #### ############### add the following line. *.* ~ If you want to be more fine-grained you will need to read the file comments. Do not forget to restart rsyslog daemon: sudo service rsyslog restart