Henk,
[tt]logread[/tt] is a standard part of OpenWRT, but what you log into it is up to the apps running on the box. In this case, [tt]Rotate_Logs.sh[/tt] is a script from MiOS.
It wakes every minute (roughly) and works out if it needs to log anything, terminating if not. Since this script is run by [tt]cron[/tt], a standard Unix scheduling module, that reports the error code.
Eventually the log rotation itself kicks in, and you’ll see log lines like:
Jun 7 04:21:01 MiOS_1xxxx cron.err crond[987]: USER root pid 11912 cmd /usr/bin/Rotate_Logs.sh
Jun 7 04:22:01 MiOS_1xxxx cron.err crond[987]: USER root pid 12048 cmd /usr/bin/Rotate_Logs.sh
Jun 7 04:23:01 MiOS_16577 cron.err crond[987]: USER root pid 12208 cmd /usr/bin/Rotate_Logs.sh
Jun 7 04:24:01 MiOS_1xxxx cron.err crond[987]: USER root pid 12345 cmd /usr/bin/Rotate_Logs.sh
Jun 7 04:24:02 MiOS_16577 user.notice Rotate_Logs[12346]: SYSROTATE: Starting
Jun 7 04:25:01 MiOS_1xxxx cron.err crond[987]: user root: process already running: /usr/bin/Rotate_Logs.sh
Jun 7 04:25:16 MiOS_1xxxx user.notice Rotate_Logs[12346]: SYSROTATE: done at: 2011-06-07_04-24-01
Jun 7 04:26:01 MiOS_16577 cron.err crond[987]: USER root pid 12782 cmd /usr/bin/Rotate_Logs.sh
Jun 7 04:27:01 MiOS_1xxxx cron.err crond[987]: USER root pid 12918 cmd /usr/bin/Rotate_Logs.sh
This type of question is safe to post in the general forum, where you might get others responding. There’s nothing sensitive in what’s being asked.
The URL-based log access only shows “current” stuff. If you want to look back at the historical stuff, then you need to SSH into Vera itself and look at [tt]/var/log/cmh/LuaUPnP.log[/tt] directly.
Even then, this log file rotates out fairly frequently (depends upon log level) so you won’t be able to go back too far.
You can also use WinSCP to copy the LuaUPnP.log file out. You still need the login credentials, the same ones you’d use if you were SSH’ing in, but it’s a GUI interface to copy the files out.
Each time I’ve tried that UI, I’ve found it to be woefully incomplete so I stopped using it.
and use it to “reset” the password of the “root” account (either with passwd root, or by editing the /etc/passwd file directly (after making a backup, of course)
and use it to “reset” the password of the “root” account (either with passwd root, or by editing the /etc/passwd file directly (after making a backup, of course)[/quote]
Thanks a lot, passwd root did the trick and that winscp program made it easy to access the log. Now to decipher it!