<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Log spammed with &amp;quot;secd.authsys.lookup.failed&amp;quot; in ONTAP Discussions</title>
    <link>https://community.netapp.com/t5/ONTAP-Discussions/Log-spammed-with-quot-secd-authsys-lookup-failed-quot/m-p/143026#M31732</link>
    <description>&lt;P&gt;I have seen similar events in the past and opened a case as well. NetApp is unable to identify the source because there is no logging of the client address. Also there is no auditing for NFSv3 access available. The log messages are completely useless this way. I complained about it, but as usual nobody cares at NetApp.&lt;/P&gt;</description>
    <pubDate>Fri, 28 Sep 2018 08:42:21 GMT</pubDate>
    <dc:creator>moep</dc:creator>
    <dc:date>2018-09-28T08:42:21Z</dc:date>
    <item>
      <title>Log spammed with "secd.authsys.lookup.failed"</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/Log-spammed-with-quot-secd-authsys-lookup-failed-quot/m-p/142580#M31636</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Recently our logs get spammed with "secd.authsys.lookup.failed" events on one of our nfs svms.&lt;/P&gt;
&lt;P&gt;We can see that that an invalid UID is used but we can't see from which client.&lt;/P&gt;
&lt;P&gt;How can we find the culprit, is this done by activating a security audit or is it hidden somewhere inside the logs?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any tip would be appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;
&lt;P&gt;Marco&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 13:20:22 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/Log-spammed-with-quot-secd-authsys-lookup-failed-quot/m-p/142580#M31636</guid>
      <dc:creator>gfz-marco</dc:creator>
      <dc:date>2025-06-04T13:20:22Z</dc:date>
    </item>
    <item>
      <title>Re: Log spammed with "secd.authsys.lookup.failed"</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/Log-spammed-with-quot-secd-authsys-lookup-failed-quot/m-p/142795#M31697</link>
      <description>&lt;P&gt;Since we get around 1500-2000 events per day, i've opened a case now.&lt;/P&gt;
&lt;P&gt;Lets wait and see about the outcome...&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 11:53:43 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/Log-spammed-with-quot-secd-authsys-lookup-failed-quot/m-p/142795#M31697</guid>
      <dc:creator>gfz-marco</dc:creator>
      <dc:date>2018-09-18T11:53:43Z</dc:date>
    </item>
    <item>
      <title>Re: Log spammed with "secd.authsys.lookup.failed"</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/Log-spammed-with-quot-secd-authsys-lookup-failed-quot/m-p/143026#M31732</link>
      <description>&lt;P&gt;I have seen similar events in the past and opened a case as well. NetApp is unable to identify the source because there is no logging of the client address. Also there is no auditing for NFSv3 access available. The log messages are completely useless this way. I complained about it, but as usual nobody cares at NetApp.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Sep 2018 08:42:21 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/Log-spammed-with-quot-secd-authsys-lookup-failed-quot/m-p/143026#M31732</guid>
      <dc:creator>moep</dc:creator>
      <dc:date>2018-09-28T08:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: Log spammed with "secd.authsys.lookup.failed"</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/Log-spammed-with-quot-secd-authsys-lookup-failed-quot/m-p/144711#M32103</link>
      <description>&lt;P&gt;After working for many days on this case with a netapp supporter, we could not find an "easy" way to identify these uids but i was presented with a workaround.&lt;/P&gt;
&lt;P&gt;This involves a tcpdump on a node and filtering through the tracefile with wireshark.&lt;/P&gt;
&lt;P&gt;Not really what i was looking for but this works for now and the supporter even created a feature request from our findings.&lt;/P&gt;
&lt;P&gt;We'll see how that comes out...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would say that they care at netapp, but it involves work on both sides.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 13:34:03 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/Log-spammed-with-quot-secd-authsys-lookup-failed-quot/m-p/144711#M32103</guid>
      <dc:creator>gfz-marco</dc:creator>
      <dc:date>2018-11-16T13:34:03Z</dc:date>
    </item>
  </channel>
</rss>

