What's new

Release [Fork] Asuswrt-Merlin 374 LTS release 45EC

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

. /jffs/addons/diversion/mount-entware.div
need this one too....

Quick fix for your first script.....change it from
Code:
SDx="sda1"                                          # Default - Change for sdb1 etc.

to
SDx=`df | grep "tmp/mnt/Data" | cut -d '/' -f 3 | cut -d ' ' -f 1`

and it will always grab the right one
 
Last edited:
need this one too....

Quick fix for your first script.....change it from
Code:
SDx="sda1"                                          # Default - Change for sdb1 etc.

to
[CODE]SDx=`df | grep "tmp/mnt/Data" | cut -d '/' -f 3 | cut -d ' ' -f 1`

and it will always grab the right one

Thank you so much!
 
Make sure you take out the extra [ CODE] tag I just edited out :)
Now I see log inside ASUS WebUI
And also where it should!
Nice!
Not duplicate but interesting!
Nov 21 22:31:07 RT-AC66U-9EE0 syslog.info syslogd started: BusyBox v1.25.1
Nov 21 22:31:07 RT-AC66U-9EE0 user.warn (syslog-move.sh): 2657 SYSLOG 'abnormal' message scanning: ' /tmp/mnt/Data/Syslog/syslog.log-20201121-223106-BOOT.txt'
Nov 21 22:31:07 RT-AC66U-9EE0 user.warn (syslog-move.sh): 2657 SYSLOG 'custom action' message scanning: '/tmp/mnt/Data/Syslog/syslog.log-20201121-223106-BOOT.txt'
Nov 21 22:31:07 RT-AC66U-9EE0 user.warn (syslog-move.sh): 2657 Syslog Housekeeping complete for '/tmp/mnt/Data/Syslog/syslog.log-20201121-223106-BOOT.txt'
 
I can recreate it and see what it's complaining about.....the page calls a javascript function to manage the graph which then calls an svg function to process the data. When the svg tries to return the data to the javascript it dies with a cross domain error when first party isolate is on. Unfortunately, I'm html 'challenged' in this area....is there an html doctor in the house? :)

BTW....it looks like the same code in Merlin, so I'd expect the Merlin builds to have the same problem.

Edit: Fixed at the browser level.

I've done a couple hours researching this. I've decided blame should be laid on Firefox because the firmware seems to be using all first party assets on that tab for that function, no reason it shouldn't work. Anyway, I was going to submit a bug at bugzilla but I've just learned Firefox has basically upgraded FPI to be more dynamic along with what they call Enhanced Tracking Protection 2.0. To enable it in stable, I had to disable FPI in about:config and set cookie behavior to 5 as per instructions here. Traffic monitoring now works. As to whether tracking protection works any better, can't say but it seems FF has made tracking protection more compatible.
 
Nov 22 02:18:09 RT-AC66U-9EE0 user.info kernel: EXT3 FS on sdc1, internal journal
Nov 22 02:18:09 RT-AC66U-9EE0 user.info kernel: EXT3-fs: mounted filesystem with ordered data mode.
Nov 22 02:18:09 RT-AC66U-9EE0 user.info syslog: USB ext3 fs at /dev/sdc1 mounted on /tmp/mnt/Data
Nov 22 02:18:09 RT-AC66U-9EE0 user.notice custom_script: Running /jffs/scripts/post-mount (args: /tmp/mnt/Data )
Nov 22 02:18:09 RT-AC66U-9EE0 user.warn Diversion: (Notice) /tmp/mnt/Data does not contain Entware, skipping device
Nov 22 02:18:09 RT-AC66U-9EE0 user.notice rc_service: hotplug 11876:notify_rc restart_nasapps
Nov 22 02:18:09 RT-AC66U-9EE0 user.notice custom_script: Running /jffs/scripts/service-event (args: restart nasapps)
Nov 22 02:18:09 RT-AC66U-9EE0 user.notice NFS_Server: daemon is stopped
Nov 22 02:18:09 RT-AC66U-9EE0 user.notice MediaServer: daemon is stopped
Nov 22 02:18:09 RT-AC66U-9EE0 user.notice FTP_Server: daemon is stopped
Nov 22 02:18:09 RT-AC66U-9EE0 user.notice Samba_Server: smb daemon is stopped
Nov 22 02:18:09 RT-AC66U-9EE0 daemon.notice miniupnpd[11889]: shutting down MiniUPnPd
Nov 22 02:18:10 RT-AC66U-9EE0 user.notice FTP_server: daemon is started
Nov 22 02:18:10 RT-AC66U-9EE0 daemon.notice miniupnpd[11947]: HTTP listening on port 53025
Nov 22 02:18:10 RT-AC66U-9EE0 daemon.notice miniupnpd[11947]: Listening for NAT-PMP/PCP traffic on port 5351


sdc1?
Where did this came from?
With blkid I get this:
/dev/sdb1: LABEL="Entware" UUID="0773d962-....."
/dev/sda1: LABEL="Data" UUID="1f1c157a-....."
and there are no other devices connected

Someone in this thread mentioned to change long for short for Preamble Type!
I will try and see what's happening!
But this was repeating at 3-6 hours with EA
Now it's repeating at almost 10 hours so it's way better...

Guess the culpable could be

SyslogEventMonitor.sh


which points to FN="/tmp/syslog.log"
 
@Mircica Those are the normal messages you would expect to see after a USB device has been plugged in. That might indicate that the "Data" device has a physical problem, like a loose connection or is going through a hub. To understand any more we'd have to see your entire unedited syslog.

Preamble type is WiFi setting and therefore has nothing to do with this.
 
Nov 22 19:58:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 10556 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)

Nov 22 19:58:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 10556 Monitoring pass 1 out of 3

Nov 22 19:58:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 10556 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 19:58:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 10556 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule

Nov 22 20:00:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 10745 cmd /jffs/scripts/IPSET_Block.sh save

Nov 22 20:00:00 RT-AC66U-9EE0 user.warn (IPSET_Block.sh): 10746 v3.05 © 2016-2017 Martineau, Dynamic IPSET Blacklist banning request.....

Nov 22 20:00:00 RT-AC66U-9EE0 user.warn (IPSET_Block.sh): 10746 Saving IPSET Block rules to /tmp/IPSET_Block.config.....

Nov 22 20:00:00 RT-AC66U-9EE0 user.warn (IPSET_Block.sh): 10746 Summary Blacklist: 0 Successful blocks! ( 0 IPs currently banned - 0 added )

Nov 22 20:00:00 RT-AC66U-9EE0 user.warn (HackerPorts.sh): 10810 v2.03 Hacker Port attacks Report.....

Nov 22 20:00:01 RT-AC66U-9EE0 user.warn (HackerPorts.sh): 10810 Hacker report created '/tmp/HackerReport.txt' - Statistics: Total Unique Ports attacked: 0 (out of 0 attempts) tracked using SYSLOG , Nov 22 14:33:57 - Nov 22 20:00:00

Nov 22 20:08:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 10970 cmd /jffs/scripts/ChkWAN.sh wan nowait

Nov 22 20:08:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 10971 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)

Nov 22 20:08:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 10971 Monitoring pass 1 out of 3

Nov 22 20:08:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 10971 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 20:08:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 10971 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule

Nov 22 20:18:10 RT-AC66U-9EE0 user.info kernel: EXT3 FS on sda1, internal journal

Nov 22 20:18:10 RT-AC66U-9EE0 user.info kernel: EXT3-fs: mounted filesystem with ordered data mode.

Nov 22 20:18:10 RT-AC66U-9EE0 user.info syslog: USB ext3 fs at /dev/sda1 mounted on /tmp/mnt/Data

Nov 22 20:18:10 RT-AC66U-9EE0 user.notice custom_script: Running /jffs/scripts/post-mount (args: /tmp/mnt/Data )

Nov 22 20:18:10 RT-AC66U-9EE0 user.warn Diversion: (Notice) /tmp/mnt/Data does not contain Entware, skipping device

Nov 22 20:18:10 RT-AC66U-9EE0 user.notice rc_service: hotplug 11435:notify_rc restart_nasapps

Nov 22 20:18:10 RT-AC66U-9EE0 user.notice custom_script: Running /jffs/scripts/service-event (args: restart nasapps)

Nov 22 20:18:10 RT-AC66U-9EE0 user.notice NFS_Server: daemon is stopped

Nov 22 20:18:10 RT-AC66U-9EE0 user.notice MediaServer: daemon is stopped

Nov 22 20:18:10 RT-AC66U-9EE0 user.notice FTP_Server: daemon is stopped

Nov 22 20:18:10 RT-AC66U-9EE0 user.notice Samba_Server: smb daemon is stopped

Nov 22 20:18:10 RT-AC66U-9EE0 daemon.notice miniupnpd[11466]: shutting down MiniUPnPd

Nov 22 20:18:10 RT-AC66U-9EE0 user.notice FTP_server: daemon is started

Nov 22 20:18:10 RT-AC66U-9EE0 daemon.notice miniupnpd[11508]: HTTP listening on port 43676

Nov 22 20:18:10 RT-AC66U-9EE0 daemon.notice miniupnpd[11508]: Listening for NAT-PMP/PCP traffic on port 5351

Nov 22 20:28:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 11534 cmd /jffs/scripts/ChkWAN.sh wan nowait

Nov 22 20:28:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 11535 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)

Nov 22 20:28:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 11535 Monitoring pass 1 out of 3

Nov 22 20:28:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 11535 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 20:28:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 11535 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule

Nov 22 20:38:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 11748 cmd /jffs/scripts/ChkWAN.sh wan nowait

Nov 22 20:38:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 11749 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)

Nov 22 20:38:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 11749 Monitoring pass 1 out of 3

Nov 22 20:38:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 11749 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 20:38:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 11749 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule

Nov 22 20:48:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 11959 cmd /jffs/scripts/ChkWAN.sh reboot nowait

Nov 22 20:48:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 11960 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)

Nov 22 20:48:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 11960 Monitoring pass 1 out of 3

Nov 22 20:48:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 11960 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 20:48:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 11960 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule

Nov 22 20:58:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 12171 cmd /jffs/scripts/ChkWAN.sh wan nowait

Nov 22 20:58:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 12172 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)

Nov 22 20:58:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 12172 Monitoring pass 1 out of 3

Nov 22 20:58:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 12172 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 20:58:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 12172 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule

Nov 22 21:00:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 12361 cmd /jffs/scripts/IPSET_Block.sh save

Nov 22 21:00:00 RT-AC66U-9EE0 user.warn (IPSET_Block.sh): 12362 v3.05 © 2016-2017 Martineau, Dynamic IPSET Blacklist banning request.....

Nov 22 21:00:00 RT-AC66U-9EE0 user.warn (IPSET_Block.sh): 12362 Saving IPSET Block rules to /tmp/IPSET_Block.config.....

Nov 22 21:00:00 RT-AC66U-9EE0 user.warn (IPSET_Block.sh): 12362 Summary Blacklist: 0 Successful blocks! ( 0 IPs currently banned - 0 added )

Nov 22 21:00:00 RT-AC66U-9EE0 user.warn (HackerPorts.sh): 12426 v2.03 Hacker Port attacks Report.....

Nov 22 21:00:01 RT-AC66U-9EE0 user.warn (HackerPorts.sh): 12426 Hacker report created '/tmp/HackerReport.txt' - Statistics: Total Unique Ports attacked: 0 (out of 0 attempts) tracked using SYSLOG , Nov 22 14:33:57 - Nov 22 21:00:00

Nov 22 21:08:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 12583 cmd /jffs/scripts/ChkWAN.sh wan nowait

Nov 22 21:08:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 12584 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)
 
Nov 22 21:08:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 12584 Monitoring pass 1 out of 3

Nov 22 21:08:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 12584 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 21:08:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 12584 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule

Nov 22 21:18:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 12794 cmd /jffs/scripts/ChkWAN.sh reboot nowait

Nov 22 21:18:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 12795 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)

Nov 22 21:18:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 12795 Monitoring pass 1 out of 3

Nov 22 21:18:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 12795 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 21:18:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 12795 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule

Nov 22 21:28:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 13003 cmd /jffs/scripts/ChkWAN.sh wan nowait

Nov 22 21:28:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13004 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)

Nov 22 21:28:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13004 Monitoring pass 1 out of 3

Nov 22 21:28:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13004 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 21:28:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13004 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule

Nov 22 21:38:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 13219 cmd /jffs/scripts/ChkWAN.sh wan nowait

Nov 22 21:38:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13220 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)

Nov 22 21:38:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13220 Monitoring pass 1 out of 3

Nov 22 21:38:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13220 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 21:38:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13220 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule

Nov 22 21:48:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 13428 cmd /jffs/scripts/ChkWAN.sh reboot nowait

Nov 22 21:48:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13429 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)

Nov 22 21:48:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13429 Monitoring pass 1 out of 3

Nov 22 21:48:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13429 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 21:48:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13429 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule

Nov 22 21:58:01 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 13638 cmd /jffs/scripts/ChkWAN.sh wan nowait

Nov 22 21:58:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13639 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)

Nov 22 21:58:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13639 Monitoring pass 1 out of 3

Nov 22 21:58:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13639 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 21:58:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 13639 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule

Nov 22 22:03:10 RT-AC66U-9EE0 user.info kernel: EXT3 FS on sda1, internal journal

Nov 22 22:03:10 RT-AC66U-9EE0 user.info kernel: EXT3-fs: mounted filesystem with ordered data mode.

Nov 22 22:03:10 RT-AC66U-9EE0 user.info syslog: USB ext3 fs at /dev/sda1 mounted on /tmp/mnt/Data

Nov 22 22:03:10 RT-AC66U-9EE0 user.notice custom_script: Running /jffs/scripts/post-mount (args: /tmp/mnt/Data )

Nov 22 22:03:10 RT-AC66U-9EE0 user.warn Diversion: (Notice) /tmp/mnt/Data does not contain Entware, skipping device

Nov 22 22:03:10 RT-AC66U-9EE0 user.notice rc_service: hotplug 14119:notify_rc restart_nasapps

Nov 22 22:03:10 RT-AC66U-9EE0 user.notice custom_script: Running /jffs/scripts/service-event (args: restart nasapps)

Nov 22 22:03:11 RT-AC66U-9EE0 user.notice NFS_Server: daemon is stopped

Nov 22 22:03:11 RT-AC66U-9EE0 user.notice MediaServer: daemon is stopped

Nov 22 22:03:11 RT-AC66U-9EE0 user.notice FTP_Server: daemon is stopped

Nov 22 22:03:11 RT-AC66U-9EE0 user.notice Samba_Server: smb daemon is stopped

Nov 22 22:03:11 RT-AC66U-9EE0 daemon.notice miniupnpd[14120]: shutting down MiniUPnPd

Nov 22 22:03:11 RT-AC66U-9EE0 user.notice FTP_server: daemon is started

Nov 22 22:03:11 RT-AC66U-9EE0 daemon.notice miniupnpd[14180]: HTTP listening on port 36002

Nov 22 22:03:11 RT-AC66U-9EE0 daemon.notice miniupnpd[14180]: Listening for NAT-PMP/PCP traffic on port 5351

Nov 22 22:06:59 RT-AC66U-9EE0 user.info kernel: EXT3 FS on sda1, internal journal

Nov 22 22:06:59 RT-AC66U-9EE0 user.info kernel: EXT3-fs: mounted filesystem with ordered data mode.

Nov 22 22:06:59 RT-AC66U-9EE0 user.info syslog: USB ext3 fs at /dev/sda1 mounted on /tmp/mnt/Data

Nov 22 22:06:59 RT-AC66U-9EE0 user.notice custom_script: Running /jffs/scripts/post-mount (args: /tmp/mnt/Data )

Nov 22 22:06:59 RT-AC66U-9EE0 user.warn Diversion: (Notice) /tmp/mnt/Data does not contain Entware, skipping device

Nov 22 22:06:59 RT-AC66U-9EE0 user.notice rc_service: hotplug 14269:notify_rc restart_nasapps

Nov 22 22:06:59 RT-AC66U-9EE0 user.notice custom_script: Running /jffs/scripts/service-event (args: restart nasapps)

Nov 22 22:06:59 RT-AC66U-9EE0 user.notice NFS_Server: daemon is stopped

Nov 22 22:06:59 RT-AC66U-9EE0 user.notice MediaServer: daemon is stopped

Nov 22 22:06:59 RT-AC66U-9EE0 user.notice FTP_Server: daemon is stopped

Nov 22 22:07:00 RT-AC66U-9EE0 user.notice Samba_Server: smb daemon is stopped

Nov 22 22:07:00 RT-AC66U-9EE0 daemon.notice miniupnpd[14256]: shutting down MiniUPnPd

Nov 22 22:07:00 RT-AC66U-9EE0 user.notice FTP_server: daemon is started

Nov 22 22:07:00 RT-AC66U-9EE0 daemon.notice miniupnpd[14331]: HTTP listening on port 54329

Nov 22 22:07:00 RT-AC66U-9EE0 daemon.notice miniupnpd[14331]: Listening for NAT-PMP/PCP traffic on port 5351

Nov 22 22:08:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 14334 cmd /jffs/scripts/ChkWAN.sh wan nowait

Nov 22 22:08:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14335 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)

Nov 22 22:08:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14335 Monitoring pass 1 out of 3

Nov 22 22:08:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14335 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 22:08:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14335 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule

Nov 22 22:18:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 14544 cmd /jffs/scripts/ChkWAN.sh reboot nowait

Nov 22 22:18:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14545 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)

Nov 22 22:18:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14545 Monitoring pass 1 out of 3

Nov 22 22:18:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14545 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 22:18:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14545 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule

Nov 22 22:28:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 14755 cmd /jffs/scripts/ChkWAN.sh wan nowait

Nov 22 22:28:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14756 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)

Nov 22 22:28:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14756 Monitoring pass 1 out of 3

Nov 22 22:28:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14756 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 22:28:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14756 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule

Nov 22 22:38:00 RT-AC66U-9EE0 cron.info crond[543]: USER Administrator pid 14974 cmd /jffs/scripts/ChkWAN.sh wan nowait

Nov 22 22:38:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14975 v1.15 Monitoring WAN connection using 5 target PING hosts (10.0.0.1 84.200.69.80 84.200.70.40 9.9.9.9 1.1.1.1) (Tries=3)

Nov 22 22:38:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14975 Monitoring pass 1 out of 3

Nov 22 22:38:01 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14975 Private LAN 10.0.0.1 will be skipped for WAN PING check!

Nov 22 22:38:02 RT-AC66U-9EE0 user.warn (ChkWAN.sh): 14975 Monitoring WAN connection OK.....(Successful ping to '84.200.69.80'); Terminating due to ACTIVE cron schedule
 
@Mircica Don't post the contents of large log files directly into the body of a forum post. Upload the contents to somewhere like pastebin.com and provide us with a link to that.

Your log file covers less than 3 hours so is not particularly helpful. It also appears to be missing lots of information. Is this actually the raw log file taken directly from the router (System Log > General Log > Save) or is it mangled version taken from some sort of remote log server?
 
Last edited:
Your syslog settings are set incorrectly so we're missing a lot of information in the log. Specifically the log level should be set to info. I suggest you reset all the syslog settings to their default values:

Untitled.png
 
Constant internet disconnects after upgrading to 45EC (from 44EA) today. Have not rebooted, see if that helps.
 
There's some major internet problems today on the east coast US. Give it a bit and see if it settles down.
 

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top