Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2024-04-09 07:33:02.058399 daemon-err , modulelauncher[17898]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2024-04-09 07:33:02.063555 daemon-err , modulelauncher[17898]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2024-04-09 07:33:02.063612 daemon-err , modulelauncher[17898]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2024-04-09 07:33:02.068970 daemon-err , modulelauncher[17898]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2024-04-09 07:33:02.069029 daemon-err , modulelauncher[17898]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2024-04-09 07:33:02.849051 auth-err , sshd[17962]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2024-04-09 07:33:02.849140 auth-err , sshd[17962]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2024-04-09 07:33:02.863567 auth-err , sshd[17962]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2024-04-09 07:33:02.863659 auth-err , sshd[17962]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2024-04-09 07:33:03.298576 authpriv-err , login[18004]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2024-04-09 07:33:03.298737 authpriv-err , login[18004]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2024-04-09 07:33:03.303616 authpriv-err , login[18004]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2024-04-09 07:33:03.303709 authpriv-err , login[18004]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2024-04-09 07:33:05.154525 daemon-err , modulelauncher[18064]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0 2024-04-09 07:33:05.154598 daemon-err , modulelauncher[18064]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2024-04-09 07:33:05.160410 daemon-err , modulelauncher[18064]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2024-04-09 07:33:05.160481 daemon-err , modulelauncher[18064]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2024-04-09 07:33:05.166260 daemon-err , modulelauncher[18064]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2024-04-09 07:33:05.166328 daemon-err , modulelauncher[18064]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2024-04-09 07:33:05.172756 daemon-err , modulelauncher[18064]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0 2024-04-09 07:33:05.172833 daemon-err , modulelauncher[18064]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2024-04-09 07:33:05.179173 daemon-err , modulelauncher[18064]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2024-04-09 07:33:05.179271 daemon-err , modulelauncher[18064]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2024-04-09 07:33:05.185563 daemon-err , modulelauncher[18064]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2024-04-09 07:33:05.185634 daemon-err , modulelauncher[18064]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2024-04-09 07:33:05.740163 auth-err , sshd[18100]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2024-04-09 07:33:05.740256 auth-err , sshd[18100]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2024-04-09 07:33:16.098342 authpriv-err , login[18109]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2024-04-09 07:33:16.098432 authpriv-err , login[18109]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2024-04-09 07:33:20.827077 daemon-err , modulelauncher[18140]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-04-09 07:33:20.827133 daemon-err , modulelauncher[18140]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-04-09 07:33:20.831467 daemon-err , modulelauncher[18140]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-04-09 07:33:20.831608 daemon-err , modulelauncher[18140]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-04-09 07:33:21.336641 authpriv-err , sshd[18233]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2024-04-09 07:33:21.336734 authpriv-err , sshd[18233]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-04-09 07:33:21.790631 authpriv-err , login[18275]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2024-04-09 07:33:21.790730 authpriv-err , login[18275]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-04-09 07:33:23.466451 daemon-err , modulelauncher[18333]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-04-09 07:33:23.466536 daemon-err , modulelauncher[18333]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-04-09 07:33:23.470989 daemon-err , modulelauncher[18333]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-04-09 07:33:23.471080 daemon-err , modulelauncher[18333]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-04-09 07:33:23.476045 daemon-err , modulelauncher[18333]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-04-09 07:33:23.476117 daemon-err , modulelauncher[18333]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-04-09 07:33:23.480545 daemon-err , modulelauncher[18333]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-04-09 07:33:23.480623 daemon-err , modulelauncher[18333]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-04-09 07:33:23.952180 authpriv-err , sshd[18367]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2024-04-09 07:33:23.952279 authpriv-err , sshd[18367]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-04-09 07:33:34.458502 authpriv-err , login[18376]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2024-04-09 07:33:34.458576 authpriv-err , login[18376]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-04-09 07:33:38.775161 daemon-err , modulelauncher[18405]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-04-09 07:33:38.775341 daemon-err , modulelauncher[18405]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-04-09 07:33:38.779814 daemon-err , modulelauncher[18405]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-04-09 07:33:38.779885 daemon-err , modulelauncher[18405]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-04-09 07:33:38.785913 daemon-err , modulelauncher[18405]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-04-09 07:33:38.785986 daemon-err , modulelauncher[18405]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-04-09 07:33:38.791743 daemon-err , modulelauncher[18405]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-04-09 07:33:38.791808 daemon-err , modulelauncher[18405]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-04-09 07:33:39.332582 authpriv-err , sshd[18467]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-04-09 07:33:39.332676 authpriv-err , sshd[18467]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-04-09 07:33:39.817039 authpriv-err , login[18509]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-04-09 07:33:39.817232 authpriv-err , login[18509]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-04-09 07:33:41.749280 daemon-err , modulelauncher[18570]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-04-09 07:33:41.749469 daemon-err , modulelauncher[18570]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-04-09 07:33:41.754249 daemon-err , modulelauncher[18570]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-04-09 07:33:41.754392 daemon-err , modulelauncher[18570]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-04-09 07:33:41.759210 daemon-err , modulelauncher[18570]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-04-09 07:33:41.759265 daemon-err , modulelauncher[18570]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-04-09 07:33:41.763789 daemon-err , modulelauncher[18570]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-04-09 07:33:41.763947 daemon-err , modulelauncher[18570]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-04-09 07:33:42.247555 authpriv-err , sshd[18604]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-04-09 07:33:42.247626 authpriv-err , sshd[18604]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-04-09 07:33:52.587047 authpriv-err , login[18613]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-04-09 07:33:52.587231 authpriv-err , login[18613]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-04-09 07:33:58.390266 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 7 2024-04-09 07:33:58.390351 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 7 2024-04-09 07:36:16.639899 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 13 2024-04-09 07:36:16.639996 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 13 2024-04-09 07:36:16.732742 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 12 2024-04-09 07:36:16.732985 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 12 2024-04-09 07:36:37.832095 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 16 2024-04-09 07:36:37.832171 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 16 2024-04-09 07:36:37.912020 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 15 2024-04-09 07:36:37.912111 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 15 2024-04-09 07:39:09.283389 daemon-err , nhrpd[24682]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-04-09 07:39:47.135887 daemon-err , nhrpd[25297]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-04-09 07:40:26.206374 daemon-err , nhrpd[25899]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-04-09 07:40:26.484195 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 32 2024-04-09 07:40:26.484286 daemon-err , nhrpd[25899]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 32 2024-04-09 07:40:26.484357 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 32 2024-04-09 07:40:26.484415 daemon-err , nhrpd[25899]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 32 2024-04-09 07:41:05.433046 daemon-err , nhrpd[26578]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-04-09 07:41:05.695497 daemon-err , nhrpd[26578]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 34 2024-04-09 07:41:05.695583 daemon-err , nhrpd[26578]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 34 2024-04-09 07:41:05.696212 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 34 2024-04-09 07:41:05.696295 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 34 2024-04-09 07:41:44.028633 daemon-err , nhrpd[27241]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-04-09 07:41:44.355868 daemon-err , nhrpd[27241]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 36 2024-04-09 07:41:44.356162 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 36 2024-04-09 07:41:44.356224 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 36 2024-04-09 07:41:44.356381 daemon-err , nhrpd[27241]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 36 2024-04-09 07:41:44.435817 daemon-err , nhrpd[27241]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 37 2024-04-09 07:41:44.435898 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 37 2024-04-09 07:41:44.435938 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 37 2024-04-09 07:41:44.436006 daemon-err , nhrpd[27241]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 37 2024-04-09 07:42:23.774621 daemon-err , nhrpd[27967]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-04-09 07:42:24.092530 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 39 2024-04-09 07:42:24.092618 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 39 2024-04-09 07:42:24.093067 daemon-err , nhrpd[27967]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 39 2024-04-09 07:42:24.093130 daemon-err , nhrpd[27967]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 39 2024-04-09 07:42:24.164266 daemon-err , nhrpd[27967]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 40 2024-04-09 07:42:24.164369 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 40 2024-04-09 07:42:24.164424 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 40 2024-04-09 07:42:24.165110 daemon-err , nhrpd[27967]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 40 2024-04-09 07:43:04.511910 daemon-err , nhrpd[28735]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-04-09 07:43:04.794090 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 43 2024-04-09 07:43:04.794158 daemon-err , nhrpd[28735]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 43 2024-04-09 07:43:04.794202 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 43 2024-04-09 07:43:04.794244 daemon-err , nhrpd[28735]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 43 2024-04-09 07:43:04.873922 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 44 2024-04-09 07:43:04.873992 daemon-err , nhrpd[28735]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 44 2024-04-09 07:43:04.874030 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 44 2024-04-09 07:43:04.874065 daemon-err , nhrpd[28735]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 44 2024-04-09 07:43:04.961932 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 42 2024-04-09 07:43:04.962034 daemon-err , nhrpd[28735]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 42 2024-04-09 07:43:04.962115 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 42 2024-04-09 07:43:04.962178 daemon-err , nhrpd[28735]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 42 2024-04-09 07:43:46.328772 daemon-err , nhrpd[29563]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-04-09 07:43:46.645625 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 47 2024-04-09 07:43:46.645717 daemon-err , nhrpd[29563]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 47 2024-04-09 07:43:46.645774 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 47 2024-04-09 07:43:46.645824 daemon-err , nhrpd[29563]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 47 2024-04-09 07:43:46.713385 daemon-err , nhrpd[29563]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 48 2024-04-09 07:43:46.713458 daemon-err , nhrpd[29563]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 48 2024-04-09 07:43:46.713495 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 48 2024-04-09 07:43:46.713531 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 48 2024-04-09 07:43:46.801421 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 46 2024-04-09 07:43:46.801505 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 46 2024-04-09 07:43:46.801548 daemon-err , nhrpd[29563]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 46 2024-04-09 07:43:46.801597 daemon-err , nhrpd[29563]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 46 2024-04-09 07:44:25.464655 daemon-err , nhrpd[30351]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-04-09 07:44:25.904422 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 51 2024-04-09 07:44:25.904548 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 51 2024-04-09 07:44:25.904627 daemon-err , nhrpd[30351]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 51 2024-04-09 07:44:25.904701 daemon-err , nhrpd[30351]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 51 2024-04-09 07:44:25.987747 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 52 2024-04-09 07:44:25.987826 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 52 2024-04-09 07:44:25.987867 daemon-err , nhrpd[30351]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 52 2024-04-09 07:44:25.987906 daemon-err , nhrpd[30351]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 52 2024-04-09 07:44:26.059828 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 50 2024-04-09 07:44:26.059896 daemon-err , nhrpd[30351]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 50 2024-04-09 07:44:26.059958 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 50 2024-04-09 07:44:26.060006 daemon-err , nhrpd[30351]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 50 2024-04-09 07:45:20.665933 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 54 2024-04-09 07:45:20.666021 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 54 2024-04-09 07:45:48.407289 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 55 2024-04-09 07:45:48.407379 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 55 2024-04-09 07:46:15.257482 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 56 2024-04-09 07:46:15.257579 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 56 2024-04-09 07:46:42.834558 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 58 2024-04-09 07:46:42.834649 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 58 2024-04-09 07:46:42.926187 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 57 2024-04-09 07:46:42.926266 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 57 2024-04-09 07:47:11.910308 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 60 2024-04-09 07:47:11.910381 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 60 2024-04-09 07:47:11.978172 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 59 2024-04-09 07:47:11.978264 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 59 2024-04-09 07:48:58.131411 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 65 2024-04-09 07:48:58.131507 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 65 2024-04-09 07:49:24.295962 daemon-err , zebra[1073]: [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down 2024-04-09 07:49:24.296025 daemon-err , zebra[1073]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=1778, pid=3365670407 2024-04-09 07:49:24.296067 daemon-err , zebra[1073]: [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (771[if 69]) into the kernel 2024-04-09 07:49:24.415440 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 68 2024-04-09 07:49:24.415524 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 68 2024-04-09 07:49:54.468599 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 71 2024-04-09 07:49:54.468690 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 71 2024-04-09 07:49:54.568577 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 72 2024-04-09 07:49:54.568774 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 72 2024-04-09 07:50:22.699193 daemon-err , zebra[1073]: [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down 2024-04-09 07:50:22.699259 daemon-err , zebra[1073]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=1928, pid=3365670407 2024-04-09 07:50:22.699296 daemon-err , zebra[1073]: [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (820[if 76]) into the kernel 2024-04-09 07:50:22.864674 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 74 2024-04-09 07:50:22.864740 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 74 2024-04-09 07:50:22.956474 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 75 2024-04-09 07:50:22.956572 daemon-err , staticd[1078]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 75 2024-04-09 07:50:30.831750 daemon-err , zebra[1073]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (100) vrf 0 2024-04-09 07:50:30.836927 daemon-err , zebra[1073]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0 2024-04-09 07:50:30.836994 daemon-err , zebra[1073]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (100) vrf 0 2024-04-09 07:50:42.920335 daemon-err , zebra[1073]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0 2024-04-09 07:51:42.145007 daemon-info , systemd[1]: Stopping System Logging Service... 2024-04-09 07:51:42.145436 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="5455" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-04-09 07:51:42.156509 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-04-09 07:51:42.156914 daemon-info , systemd[1]: Stopped System Logging Service. 2024-04-09 07:51:42.158535 daemon-info , systemd[1]: Starting System Logging Service... 2024-04-09 07:51:42.165461 syslog-info , rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-04-09 07:51:42.165540 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="6327" x-info="https://www.rsyslog.com"] start 2024-04-09 07:51:42.166898 daemon-info , systemd[1]: Started System Logging Service. 2024-04-09 07:51:42.170686 daemon-notice , cfgd[1120]: [12142]Completed change to active configuration 2024-04-09 07:51:42.175161 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2024-04-09 07:51:42.210471 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2024-04-09 07:51:42.391420 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog file systemd_msg set system syslog file systemd_msg level info set system syslog file systemd_msg app systemd
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output contains the following tokens:
systemd[1]: Started "DHCP Server Service instance main".Show output
2024-04-09 07:51:51.448562 daemon-info , systemd[1]: Stopping System Logging Service... 2024-04-09 07:51:51.449899 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-04-09 07:51:51.450184 daemon-info , systemd[1]: Stopped System Logging Service. 2024-04-09 07:51:51.451276 daemon-info , systemd[1]: Starting System Logging Service... 2024-04-09 07:51:51.455104 daemon-info , systemd[1]: Started System Logging Service. 2024-04-09 07:51:52.191691 daemon-info , systemd[1]: Created slice system-dhcpd.slice. 2024-04-09 07:51:52.192949 daemon-info , systemd[1]: Started "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog file systemd_msg set system syslog file systemd_msg level info set system syslog file systemd_msg app systemd set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output contains the following tokens:
Started "DHCP Server Service instance main".Show output
2024-04-09 07:52:00.836149 daemon-info , systemd[1]: Stopping System Logging Service... 2024-04-09 07:52:00.837407 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-04-09 07:52:00.837760 daemon-info , systemd[1]: Stopped System Logging Service. 2024-04-09 07:52:00.839376 daemon-info , systemd[1]: Starting System Logging Service... 2024-04-09 07:52:00.842607 daemon-info , systemd[1]: Started System Logging Service. 2024-04-09 07:52:01.648499 daemon-info , systemd[1]: Started "DHCP Server Service instance main".
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set interfaces ethernet eth0 address 10.215.168.64/24
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.158 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.158/0.158/0.158/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-04-09T07:52:10.502922+00:00 10.215.168.64 2024-04-09T07:52:09.652406+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-04-09T07:52:10.503322+00:00 10.215.168.64 2024-04-09T07:52:09.652770+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="7036" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-04-09T07:52:10.503322+00:00 10.215.168.64 2024-04-09T07:52:09.653438+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-04-09T07:52:10.503322+00:00 10.215.168.64 2024-04-09T07:52:09.653707+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-04-09T07:52:10.503322+00:00 10.215.168.64 2024-04-09T07:52:09.655317+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-04-09T07:52:10.503322+00:00 10.215.168.64 2024-04-09T07:52:09.659145+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-04-09T07:52:10.503813+00:00 10.215.168.64 2024-04-09T07:52:09.659545+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="7159" x-info="https://www.rsyslog.com"] start 2024-04-09T07:52:10.503813+00:00 10.215.168.64 2024-04-09T07:52:09.659617+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-04-09T07:52:10.504500+00:00 10.215.168.64 2024-04-09T07:52:09.660766+00:00 daemon-notice osdx cfgd[1120]: [12142]Completed change to active configuration 2024-04-09T07:52:10.507739+00:00 10.215.168.64 2024-04-09T07:52:09.663928+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-04-09T07:52:10.544639+00:00 10.215.168.64 2024-04-09T07:52:09.700834+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-04-09T07:52:10.727978+00:00 10.215.168.64 2024-04-09T07:52:09.884191+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-04-09T07:52:10.816200+00:00 10.215.168.64 2024-04-09T07:52:09.972403+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system syslog host 10.215.168.1 local-vrf VRF0 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than VRF0. PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.147 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.147/0.147/0.147/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-04-09T07:52:11.372228+00:00 10.215.168.64 2024-04-09T07:52:10.528441+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-04-09T07:52:11.684010+00:00 10.215.168.64 2024-04-09T07:52:10.840223+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-04-09T07:52:11.697959+00:00 10.215.168.64 2024-04-09T07:52:10.854146+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-04-09T07:52:13.010185+00:00 10.215.168.64 2024-04-09T07:52:12.166382+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-04-09T07:52:13.752859+00:00 10.215.168.64 2024-04-09T07:52:12.909003+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-04-09T07:52:13.856760+00:00 10.215.168.64 2024-04-09T07:52:13.012874+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-04-09T07:52:13.985777+00:00 10.215.168.64 2024-04-09T07:52:13.141911+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-04-09T07:52:19.443758+00:00 10.215.168.64 2024-04-09T07:52:19.123577+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-04-09T07:52:19.443758+00:00 10.215.168.64 2024-04-09T07:52:19.123834+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="7280" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-04-09T07:52:19.443758+00:00 10.215.168.64 2024-04-09T07:52:19.124133+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-04-09T07:52:19.443758+00:00 10.215.168.64 2024-04-09T07:52:19.124435+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-04-09T07:52:19.443758+00:00 10.215.168.64 2024-04-09T07:52:19.125633+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-04-09T07:52:19.443758+00:00 10.215.168.64 2024-04-09T07:52:19.128619+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-04-09T07:52:19.443758+00:00 10.215.168.64 2024-04-09T07:52:19.128706+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-04-09T07:52:19.443990+00:00 10.215.168.64 2024-04-09T07:52:19.130164+00:00 daemon-notice osdx cfgd[1120]: [12142]Completed change to active configuration 2024-04-09T07:52:19.444058+00:00 10.215.168.64 2024-04-09T07:52:19.130248+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="7429" x-info="https://www.rsyslog.com"] start 2024-04-09T07:52:19.447811+00:00 10.215.168.64 2024-04-09T07:52:19.133867+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-04-09T07:52:19.489367+00:00 10.215.168.64 2024-04-09T07:52:19.175463+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-04-09T07:52:19.717696+00:00 10.215.168.64 2024-04-09T07:52:19.403772+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2024-04-09T07:52:19.807662+00:00 10.215.168.64 2024-04-09T07:52:19.493707+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set interfaces ethernet eth0 address 10.215.168.64/24 set system syslog host 10.215.168.1 local-interface eth0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.161 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.161/0.161/0.161/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-04-09T07:52:20.314036+00:00 10.215.168.64 2024-04-09T07:52:20.000079+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-04-09T07:52:20.695671+00:00 10.215.168.64 2024-04-09T07:52:20.381723+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-04-09T07:52:20.713395+00:00 10.215.168.64 2024-04-09T07:52:20.398353+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-04-09T07:52:22.218744+00:00 10.215.168.64 2024-04-09T07:52:21.904784+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-04-09T07:52:22.869723+00:00 10.215.168.64 2024-04-09T07:52:22.555746+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-04-09T07:52:22.963520+00:00 10.215.168.64 2024-04-09T07:52:22.649574+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-04-09T07:52:23.102146+00:00 10.215.168.64 2024-04-09T07:52:22.788180+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-04-09T07:52:28.113846+00:00 10.215.168.64 2024-04-09T07:52:27.835007+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-04-09T07:52:28.113846+00:00 10.215.168.64 2024-04-09T07:52:27.835323+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="7550" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-04-09T07:52:28.113846+00:00 10.215.168.64 2024-04-09T07:52:27.835893+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-04-09T07:52:28.113846+00:00 10.215.168.64 2024-04-09T07:52:27.836228+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-04-09T07:52:28.113846+00:00 10.215.168.64 2024-04-09T07:52:27.837447+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-04-09T07:52:28.113846+00:00 10.215.168.64 2024-04-09T07:52:27.839951+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-04-09T07:52:28.114311+00:00 10.215.168.64 2024-04-09T07:52:27.840885+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-04-09T07:52:28.114378+00:00 10.215.168.64 2024-04-09T07:52:27.840961+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="7702" x-info="https://www.rsyslog.com"] start 2024-04-09T07:52:28.115119+00:00 10.215.168.64 2024-04-09T07:52:27.841779+00:00 daemon-notice osdx cfgd[1120]: [12142]Completed change to active configuration 2024-04-09T07:52:28.118181+00:00 10.215.168.64 2024-04-09T07:52:27.844493+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-04-09T07:52:28.151106+00:00 10.215.168.64 2024-04-09T07:52:27.877701+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-04-09T07:52:28.366512+00:00 10.215.168.64 2024-04-09T07:52:28.092918+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-04-09T07:52:28.469719+00:00 10.215.168.64 2024-04-09T07:52:28.196188+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca running://ca.crt set interfaces ethernet eth0 address 10.215.168.64/24
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=2.42 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 2.418/2.418/2.418/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-04-09T07:52:28.999520+00:00 10.215.168.64 2024-04-09T07:52:28.725909+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-04-09T07:52:29.339390+00:00 10.215.168.64 2024-04-09T07:52:29.065896+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-04-09T07:52:29.351451+00:00 10.215.168.64 2024-04-09T07:52:29.077849+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-04-09T07:52:30.757226+00:00 10.215.168.64 2024-04-09T07:52:30.483758+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-04-09T07:52:31.360241+00:00 10.215.168.64 2024-04-09T07:52:31.086768+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-04-09T07:52:31.495307+00:00 10.215.168.64 2024-04-09T07:52:31.221797+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-04-09T07:52:31.643887+00:00 10.215.168.64 2024-04-09T07:52:31.370335+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-04-09T07:52:37.022304+00:00 10.215.168.64 2024-04-09T07:52:36.068481+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-04-09T07:52:37.067675+00:00 10.215.168.64 2024-04-09T07:52:36.068733+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="7823" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-04-09T07:52:37.067675+00:00 10.215.168.64 2024-04-09T07:52:36.069483+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-04-09T07:52:37.067675+00:00 10.215.168.64 2024-04-09T07:52:36.069851+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-04-09T07:52:37.067675+00:00 10.215.168.64 2024-04-09T07:52:36.071217+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-04-09T07:52:37.067675+00:00 10.215.168.64 2024-04-09T07:52:36.081036+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-04-09T07:52:37.067675+00:00 10.215.168.64 2024-04-09T07:52:36.081127+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-04-09T07:52:37.067675+00:00 10.215.168.64 2024-04-09T07:52:36.081209+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="7948" x-info="https://www.rsyslog.com"] start 2024-04-09T07:52:37.067675+00:00 10.215.168.64 2024-04-09T07:52:36.082359+00:00 daemon-notice osdx cfgd[1120]: [12142]Completed change to active configuration 2024-04-09T07:52:37.067675+00:00 10.215.168.64 2024-04-09T07:52:36.086775+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-04-09T07:52:37.067712+00:00 10.215.168.64 2024-04-09T07:52:36.118929+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-04-09T07:52:37.277862+00:00 10.215.168.64 2024-04-09T07:52:36.370443+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-04-09T07:52:37.581592+00:00 10.215.168.64 2024-04-09T07:52:36.674240+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.