Hey mhu and mchoubey,
thank you for your answers.
this is the edited configuration, as mhu suggested:
root@vx-sw-b7-01# show system syslog
host 192.168.1.100 {
authorization critical;
daemon error;
ftp none;
security error;
kernel error;
user none;
dfc error;
external error;
firewall none;
pfe error;
conflict-log error;
change-log error;
interactive-commands none;
match "!(last message repeated)";
source-address 192.168.7.40;
}
file messages {
any error;
authorization info;
match "!(.*repeated.*)";
}
file interactive-commands {
interactive-commands error;
match "!(.*repeated.*)";
}
But there are still messages regarding repeated messages.
Regarding filtering the actual message, wich mchoubey suggests - where do I get the informations from, what the actual message looks like in order to filter that?
Greetings,
Julian_V
UPDATE:
So, I digged a bit deeper and found something interesting. The device, which generates the syslog message regading repeadet messages, is connected via MACSec to our Core VC. So there is an encrypted MACSec tunnel.
Every 15 minutes (like really every 15 minutes) I get the following error:
facility
local4
level
3
message
vx-sw-b26a-macsec fpc0 BMACSEC Error: API bmacsec_event_handler((int)macsec_addr) at bcm_macsec_event_handler:562 -> Invalid parameter
source
xxx.xxx.xxx.xxx
timestamp
Maybe the switch has to repeat the messages because the MACSec tunnel establishes a new connection every 15 minutes?
The Device is an EX3400-48t with Junos 18.3r1.
Greetings,
Julian_V