Just to follow up on my original thread, I had two clients with this issue. In both cases disabling Content Awareness, reinstalling policy, rebooting and re-enabling it did seem to clean up files under /var/log/jail (which is strange as I thought only Threat Extraction used that directory) but there were still thousands/millions of files in /var/log/dlp/ftp that we were able to manually clean up with the following procedure, and the thousands of files do not seem to be returning after the cleanup as both customers are running a relatively recent JHFA.
THE FOLLOWING COMMAND IS DANGEROUS AND IF YOU MAKE A TYPO IT CAN DESTROY THE ENTIRE FIREWALL! TAKE A SNAPSHOT, THEN TAKE A BACKUP OF THE FIREWALL AND EXPORT THE BACKUP VIA BROWSER, AND THEN ENSURE THE BACKUP FILE CAN BE SUCCESSFULLY BROWSED WITH 7-ZIP OR SIMILAR!
1) On the standby member of the cluster, run this command:
find /var/log/dlp/ftp/* -mtime +5 -exec rm -rf {} \;
VERIFY THIS COMMAND HAS NO TYPOS BEFORE RUNNING IT! USE AT YOUR OWN RISK!
2) At one client site this took over three hours to complete, at the other one it only took about 20 minutes. You may see a few error messages about trying to remove directories that do not exist, these can be ignored. Once it completes, reboot the standby.
3) When the standby comes back up, make sure that it rejoins the cluster as STANDBY (not DOWN/PROBLEM). I also poked around in $FWDIR/log/dlpu.elg looking for errors and ran cpwd_admin list to ensure the dlp* daemons were stable and not experiencing issues.
4) Fail over to the cleaned member, and verify basic functionality via manual tests or observing your Network Monitoring System.
5) Once validation has been achieved, repeat the above steps on the other firewall and fail back onto it and retest. You may need to set ClusterXL to "maintain active member" ahead of time to ensure that a failover does not happen until you are ready.
Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com