Pi-hole spamming auth.log

Hi everyone.
Did anyone else notice the auth.log getting spammed by their Pi-hole?
I get ca. 3 entries per second written to that log.
Just took a couple of hours to bloat the log to currently over 13mb.
The entries all look like this:

Feb 16 11:09:46 rpi sudo: www-data : PWD=/var/www/html/admin ; USER=root ; COMMAND=/usr/local/bin/pihole status web
Feb 16 11:09:46 rpi sudo: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=33)
Feb 16 11:09:46 rpi sudo: pam_unix(sudo:session): session closed for user root

I've put my logs into RAM to reduce the wear on the sdcard. But still, this can not / should not be regular behavior, right?!

So, anyone noticing the same? Or is this a "me"-problem?

Yes.

1 Like

Thanks for the quick reply!

So it's not just me.

Anything I can provide to help find a solution?!
(e.g. logs/outputs, info about my system, ...)

Thanks for your offer. We are working already on a solution. If we need more help, we come back to you.

https://github.com/pi-hole/AdminLTE/pull/2126

I also seem to have the same issue. Glad that you guys are working on it :slight_smile:

Mar  2 22:20:01 pihole CRON[15376]: pam_unix(cron:session): session opened for user root by (uid=0)
Mar  2 22:20:01 pihole CRON[15376]: pam_unix(cron:session): session closed for user root
Mar  2 22:30:01 pihole CRON[15455]: pam_unix(cron:session): session opened for user root by (uid=0)
Mar  2 22:30:01 pihole CRON[15455]: pam_unix(cron:session): session closed for user root

This topic was automatically closed 21 days after the last reply. New replies are no longer allowed.