Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2024-05-22 10:15:15.981956 daemon-err , modulelauncher[23221]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2024-05-22 10:15:16.652212 authpriv-err , sshd[23283]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-05-22 10:15:16.652283 authpriv-err , sshd[23283]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2024-05-22 10:15:17.048382 authpriv-err , login[23325]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-05-22 10:15:17.048476 authpriv-err , login[23325]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2024-05-22 10:15:18.892703 daemon-err , modulelauncher[23385]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2024-05-22 10:15:18.892773 daemon-err , modulelauncher[23385]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2024-05-22 10:15:18.898270 daemon-err , modulelauncher[23385]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2024-05-22 10:15:18.898337 daemon-err , modulelauncher[23385]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2024-05-22 10:15:18.904303 daemon-err , modulelauncher[23385]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2024-05-22 10:15:18.904377 daemon-err , modulelauncher[23385]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2024-05-22 10:15:18.910442 daemon-err , modulelauncher[23385]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2024-05-22 10:15:18.910525 daemon-err , modulelauncher[23385]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2024-05-22 10:15:19.518198 authpriv-err , sshd[23419]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-05-22 10:15:19.518297 authpriv-err , sshd[23419]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2024-05-22 10:15:29.879523 authpriv-err , login[23428]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-05-22 10:15:29.879629 authpriv-err , login[23428]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2024-05-22 10:15:36.986618 daemon-err , staticd[1083]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 488
2024-05-22 10:15:36.986690 daemon-err , staticd[1083]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 488
2024-05-22 10:15:51.435808 daemon-err , modulelauncher[24191]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2024-05-22 10:15:51.436028 daemon-err , modulelauncher[24191]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2024-05-22 10:15:51.441521 daemon-err , modulelauncher[24191]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2024-05-22 10:15:51.441688 daemon-err , modulelauncher[24191]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2024-05-22 10:15:59.980414 daemon-err , modulelauncher[24552]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2024-05-22 10:15:59.980469 daemon-err , modulelauncher[24552]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2024-05-22 10:15:59.984730 daemon-err , modulelauncher[24552]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2024-05-22 10:15:59.984779 daemon-err , modulelauncher[24552]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2024-05-22 10:16:01.451158 daemon-err , modulelauncher[24699]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2024-05-22 10:16:01.451214 daemon-err , modulelauncher[24699]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2024-05-22 10:16:01.456285 daemon-err , modulelauncher[24699]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2024-05-22 10:16:01.456340 daemon-err , modulelauncher[24699]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2024-05-22 10:16:41.566917 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2024-05-22 10:16:43.597941 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2024-05-22 10:16:55.514559 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2024-05-22 10:16:56.323758 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2024-05-22 10:17:06.374862 daemon-err , modulelauncher[27126]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0
2024-05-22 10:17:06.374918 daemon-err , modulelauncher[27126]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9
2024-05-22 10:17:06.378319 daemon-err , modulelauncher[27126]:  osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5
2024-05-22 10:17:06.378371 daemon-err , modulelauncher[27126]:  Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9
2024-05-22 10:17:06.382485 daemon-err , modulelauncher[27126]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15
2024-05-22 10:17:06.382528 daemon-err , modulelauncher[27126]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9
2024-05-22 10:17:07.144917 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2024-05-22 10:17:07.777960 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2024-05-22 10:17:54.669632 daemon-err , cfgd[1125]:  External python command [op.pki scep info CSR] finished with status 1
2024-05-22 10:18:14.777603 daemon-err , cfgd[1125]:  External python command [op.pki scep info CSR] finished with status 1
2024-05-22 10:18:19.460122 user-err , scep_controller:  Failed to get CA certificate for CSR 'CSR'
2024-05-22 10:18:54.146745 daemon-err , ntpd[28730]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:18:54.146801 daemon-err , ntpd[28730]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:18:54.603341 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19x1Gj2WLx7c6Y2p3fMR2tSuChEGUketCk=] finished with status 1
2024-05-22 10:18:54.603524 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:18:54.603606 daemon-err , cfgd[1125]:  \"U2FsdGVkX19x1Gj2WLx7c6Y2p3fMR2tSuChEGUketCk=\" strong-password: score is too weak
2024-05-22 10:18:54.603685 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:18:54.606816 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX19x1Gj2WLx7c6Y2p3fMR2tSuChEGUketCk=\" strong-password: score is too weak#012Commit validation failed#012
2024-05-22 10:19:02.143216 daemon-err , ntpd[28936]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:02.143251 daemon-err , ntpd[28936]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:02.725180 daemon-err , ntpd[28962]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:02.725214 daemon-err , ntpd[28962]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:03.318706 daemon-err , ntpd[28988]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:03.318766 daemon-err , ntpd[28988]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:03.924593 daemon-err , ntpd[29014]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:03.924629 daemon-err , ntpd[29014]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:04.563590 daemon-err , ntpd[29040]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:04.563624 daemon-err , ntpd[29040]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:05.137244 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=] finished with status 1
2024-05-22 10:19:05.137351 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:19:05.137405 daemon-err , cfgd[1125]:  \"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak
2024-05-22 10:19:05.137456 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:19:05.140204 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak#012Commit validation failed#012
2024-05-22 10:19:05.806188 daemon-err , ntpd[29085]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:05.806223 daemon-err , ntpd[29085]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:06.413175 daemon-err , ntpd[29111]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:06.413209 daemon-err , ntpd[29111]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:07.015787 daemon-err , ntpd[29137]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:07.015845 daemon-err , ntpd[29137]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:07.614334 daemon-err , ntpd[29163]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:07.614385 daemon-err , ntpd[29163]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:08.200439 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=] finished with status 1
2024-05-22 10:19:08.200521 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:19:08.200561 daemon-err , cfgd[1125]:  \"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak
2024-05-22 10:19:08.200598 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:19:08.202735 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak#012Commit validation failed#012
2024-05-22 10:19:08.778693 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=] finished with status 1
2024-05-22 10:19:08.778788 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:19:08.778836 daemon-err , cfgd[1125]:  \"U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=\" strong-password: score is too weak
2024-05-22 10:19:08.778883 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:19:08.781611 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=\" strong-password: score is too weak#012Commit validation failed#012
2024-05-22 10:19:09.432019 daemon-err , ntpd[29223]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:09.432054 daemon-err , ntpd[29223]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:10.023240 daemon-err , ntpd[29250]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:10.023276 daemon-err , ntpd[29250]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:10.648901 daemon-err , ntpd[29276]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:10.648955 daemon-err , ntpd[29276]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:11.231268 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=] finished with status 1
2024-05-22 10:19:11.231366 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:19:11.231419 daemon-err , cfgd[1125]:  \"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak
2024-05-22 10:19:11.231471 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:19:11.234446 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak#012Commit validation failed#012
2024-05-22 10:19:11.793079 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=] finished with status 1
2024-05-22 10:19:11.793262 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:19:11.793370 daemon-err , cfgd[1125]:  \"U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=\" strong-password: score is too weak
2024-05-22 10:19:11.793468 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:19:11.796199 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=\" strong-password: score is too weak#012Commit validation failed#012
2024-05-22 10:19:12.398647 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/JutLg2oPaIFE8G+zgZbPhs=] finished with status 1
2024-05-22 10:19:12.398783 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:19:12.398843 daemon-err , cfgd[1125]:  \"U2FsdGVkX18C50MG1uJq/JutLg2oPaIFE8G+zgZbPhs=\" strong-password: score is too weak
2024-05-22 10:19:12.398910 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:19:12.401504 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/JutLg2oPaIFE8G+zgZbPhs=\" strong-password: score is too weak#012Commit validation failed#012
2024-05-22 10:19:13.061846 daemon-err , ntpd[29351]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:13.061905 daemon-err , ntpd[29351]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:13.723680 daemon-err , ntpd[29377]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:13.723739 daemon-err , ntpd[29377]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:14.351701 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=] finished with status 1
2024-05-22 10:19:14.351780 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:19:14.351823 daemon-err , cfgd[1125]:  \"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak
2024-05-22 10:19:14.351861 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:19:14.354004 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak#012Commit validation failed#012
2024-05-22 10:19:15.102789 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=] finished with status 1
2024-05-22 10:19:15.102872 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:19:15.102911 daemon-err , cfgd[1125]:  \"U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=\" strong-password: score is too weak
2024-05-22 10:19:15.102948 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:19:15.105927 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=\" strong-password: score is too weak#012Commit validation failed#012
2024-05-22 10:19:15.695777 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/JutLg2oPaIFE8G+zgZbPhs=] finished with status 1
2024-05-22 10:19:15.695886 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:19:15.695957 daemon-err , cfgd[1125]:  \"U2FsdGVkX18C50MG1uJq/JutLg2oPaIFE8G+zgZbPhs=\" strong-password: score is too weak
2024-05-22 10:19:15.696029 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:19:15.698554 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/JutLg2oPaIFE8G+zgZbPhs=\" strong-password: score is too weak#012Commit validation failed#012
2024-05-22 10:19:16.286264 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/PVYzocjgBglmtu9j0ryU/8=] finished with status 1
2024-05-22 10:19:16.286346 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:19:16.286386 daemon-err , cfgd[1125]:  \"U2FsdGVkX18C50MG1uJq/PVYzocjgBglmtu9j0ryU/8=\" strong-password: score is too weak
2024-05-22 10:19:16.286422 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:19:16.289163 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/PVYzocjgBglmtu9j0ryU/8=\" strong-password: score is too weak#012Commit validation failed#012
2024-05-22 10:19:24.414546 daemon-err , ntpd[29641]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:24.414595 daemon-err , ntpd[29641]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:32.862076 daemon-err , ntpd[29867]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:32.862119 daemon-err , ntpd[29867]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:40.600219 daemon-err , cfgd[1125]:  [27280]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-05-22 10:19:41.067288 daemon-err , cfgd[1125]:  [27280]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-05-22 10:19:42.288569 daemon-err , ntpd[30126]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:42.288624 daemon-err , ntpd[30126]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:42.891616 daemon-err , ntpd[30152]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:42.891649 daemon-err , ntpd[30152]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:43.476594 daemon-err , ntpd[30179]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:43.476632 daemon-err , ntpd[30179]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:19:52.382757 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+fd1WwYCq8Gaxd/T2fyAsGQTUtCZkfCYw=] finished with status 1
2024-05-22 10:19:52.382821 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:19:52.382864 daemon-err , cfgd[1125]:  \"U2FsdGVkX1+fd1WwYCq8Gaxd/T2fyAsGQTUtCZkfCYw=\" strong-password: score is too weak
2024-05-22 10:19:52.382900 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:19:52.384921 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX1+fd1WwYCq8Gaxd/T2fyAsGQTUtCZkfCYw=\" strong-password: score is too weak#012Commit validation failed#012
2024-05-22 10:19:52.966140 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19HYOLxcpvA/ZFAW9cfBAoZSuNN5T2Cf7A=] finished with status 1
2024-05-22 10:19:52.966357 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:19:52.966461 daemon-err , cfgd[1125]:  \"U2FsdGVkX19HYOLxcpvA/ZFAW9cfBAoZSuNN5T2Cf7A=\" strong-password: score is too weak
2024-05-22 10:19:52.966566 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:19:52.969293 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX19HYOLxcpvA/ZFAW9cfBAoZSuNN5T2Cf7A=\" strong-password: score is too weak#012Commit validation failed#012
2024-05-22 10:19:53.563046 daemon-err , ntpd[30532]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:19:53.563108 daemon-err , ntpd[30532]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:20:01.255646 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+GfB/D2aei/oj/CvUL21aqgG5FcnisWHE=] finished with status 2
2024-05-22 10:20:01.255852 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:20:01.255957 daemon-err , cfgd[1125]:  \"U2FsdGVkX1+GfB/D2aei/oj/CvUL21aqgG5FcnisWHE=\" strong-password: not long enough
2024-05-22 10:20:01.256062 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:20:01.259092 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX1+GfB/D2aei/oj/CvUL21aqgG5FcnisWHE=\" strong-password: not long enough#012Commit validation failed#012
2024-05-22 10:20:02.061996 daemon-err , ntpd[30753]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:20:02.062031 daemon-err , ntpd[30753]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:20:09.339310 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19xuk5L82i3z11GK8JKI3znyREepJD1H68=] finished with status 3
2024-05-22 10:20:09.339463 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:20:09.339533 daemon-err , cfgd[1125]:  \"U2FsdGVkX19xuk5L82i3z11GK8JKI3znyREepJD1H68=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2024-05-22 10:20:09.339596 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:20:09.341968 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX19xuk5L82i3z11GK8JKI3znyREepJD1H68=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012
2024-05-22 10:20:09.923990 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19WEkn6W3YHz7wh5sCcFwM4t9pO4I6x5Yo=] finished with status 3
2024-05-22 10:20:09.924224 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:20:09.924348 daemon-err , cfgd[1125]:  \"U2FsdGVkX19WEkn6W3YHz7wh5sCcFwM4t9pO4I6x5Yo=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2024-05-22 10:20:09.924456 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:20:09.927756 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX19WEkn6W3YHz7wh5sCcFwM4t9pO4I6x5Yo=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012
2024-05-22 10:20:10.486676 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX199nnEI179eOJYAkU7erCz7GtNyrGTlPJg=] finished with status 3
2024-05-22 10:20:10.486899 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:20:10.487009 daemon-err , cfgd[1125]:  \"U2FsdGVkX199nnEI179eOJYAkU7erCz7GtNyrGTlPJg=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2024-05-22 10:20:10.487135 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:20:10.490022 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX199nnEI179eOJYAkU7erCz7GtNyrGTlPJg=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012
2024-05-22 10:20:11.053225 daemon-err , cfgd[1125]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/xqpSfJBFRlujdfqNrrbZPKh8gO9BQD/g=] finished with status 3
2024-05-22 10:20:11.053456 daemon-err , cfgd[1125]:  [ system ntp authentication-key 1 encrypted-key ]
2024-05-22 10:20:11.053569 daemon-err , cfgd[1125]:  \"U2FsdGVkX1/xqpSfJBFRlujdfqNrrbZPKh8gO9BQD/g=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2024-05-22 10:20:11.053692 daemon-err , cfgd[1125]:  Commit validation failed
2024-05-22 10:20:11.056740 daemon-err , cfgd[1125]:  [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX1/xqpSfJBFRlujdfqNrrbZPKh8gO9BQD/g=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012
2024-05-22 10:20:11.707654 daemon-err , ntpd[30998]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-05-22 10:20:11.707713 daemon-err , ntpd[30998]:  AUTH: authreadkeys: added 1 keys
2024-05-22 10:20:12.176084 daemon-err , cfgd[1125]:  [27280]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-05-22 10:20:12.660359 daemon-err , cfgd[1125]:  [27280]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-05-22 10:20:13.106872 daemon-err , cfgd[1125]:  [27280]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-05-22 10:20:13.574326 daemon-err , cfgd[1125]:  [27280]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-05-22 10:20:26.027184 daemon-info , systemd[1]:  Stopping System Logging Service...
2024-05-22 10:20:26.027372 syslog-info , rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="21032" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-05-22 10:20:26.028477 daemon-info , systemd[1]:  rsyslog.service: Succeeded.
2024-05-22 10:20:26.028548 daemon-info , systemd[1]:  Stopped System Logging Service.
2024-05-22 10:20:26.029976 daemon-info , systemd[1]:  Starting System Logging Service...
2024-05-22 10:20:26.033953 syslog-info , rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-05-22 10:20:26.034032 daemon-info , systemd[1]:  Started System Logging Service.
2024-05-22 10:20:26.034519 syslog-info , rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="31480" x-info="https://www.rsyslog.com"] start
2024-05-22 10:20:26.035535 daemon-notice , cfgd[1125]:  [27280]Completed change to active configuration
2024-05-22 10:20:26.038238 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2024-05-22 10:20:26.085501 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2024-05-22 10:20:26.233471 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog file systemd_msg
set system syslog file systemd_msg level info
set system syslog file systemd_msg app systemd

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output contains the following tokens:

systemd[1]:  Started "DHCP Server Service instance main".
Show output
2024-05-22 10:20:34.520918 daemon-info , systemd[1]:  Stopping System Logging Service...
2024-05-22 10:20:34.522745 daemon-info , systemd[1]:  rsyslog.service: Succeeded.
2024-05-22 10:20:34.523141 daemon-info , systemd[1]:  Stopped System Logging Service.
2024-05-22 10:20:34.524681 daemon-info , systemd[1]:  Starting System Logging Service...
2024-05-22 10:20:34.527094 daemon-info , systemd[1]:  Started System Logging Service.
2024-05-22 10:20:35.238561 daemon-info , systemd[1]:  Started "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog file systemd_msg
set system syslog file systemd_msg level info
set system syslog file systemd_msg app systemd
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output contains the following tokens:

Started "DHCP Server Service instance main".
Show output
2024-05-22 10:20:43.753092 daemon-info , systemd[1]:  Stopping System Logging Service...
2024-05-22 10:20:43.754219 daemon-info , systemd[1]:  rsyslog.service: Succeeded.
2024-05-22 10:20:43.754630 daemon-info , systemd[1]:  Stopped System Logging Service.
2024-05-22 10:20:43.756178 daemon-info , systemd[1]:  Starting System Logging Service...
2024-05-22 10:20:43.758825 daemon-info , systemd[1]:  Started System Logging Service.
2024-05-22 10:20:44.475209 daemon-info , systemd[1]:  Started "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set interfaces ethernet eth0 address 10.215.168.64/24

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.223 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.223/0.223/0.223/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server {log_file} file and read the {log_msg} log message:

Show output
2024-05-22T10:20:53.548421+00:00 10.215.168.64  2024-05-22T10:20:52.625203+00:00 daemon-info osdx systemd[1]:  Stopping System Logging Service...
2024-05-22T10:20:53.548421+00:00 10.215.168.64  2024-05-22T10:20:52.625450+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="32182" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-05-22T10:20:53.548421+00:00 10.215.168.64  2024-05-22T10:20:52.626093+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Succeeded.
2024-05-22T10:20:53.548421+00:00 10.215.168.64  2024-05-22T10:20:52.626418+00:00 daemon-info osdx systemd[1]:  Stopped System Logging Service.
2024-05-22T10:20:53.548421+00:00 10.215.168.64  2024-05-22T10:20:52.627707+00:00 daemon-info osdx systemd[1]:  Starting System Logging Service...
2024-05-22T10:20:53.548421+00:00 10.215.168.64  2024-05-22T10:20:52.630107+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-05-22T10:20:53.548421+00:00 10.215.168.64  2024-05-22T10:20:52.630174+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="32307" x-info="https://www.rsyslog.com"] start
2024-05-22T10:20:53.548493+00:00 10.215.168.64  2024-05-22T10:20:52.630236+00:00 daemon-info osdx systemd[1]:  Started System Logging Service.
2024-05-22T10:20:53.549176+00:00 10.215.168.64  2024-05-22T10:20:52.631832+00:00 daemon-notice osdx cfgd[1125]:  [27280]Completed change to active configuration
2024-05-22T10:20:53.552206+00:00 10.215.168.64  2024-05-22T10:20:52.634668+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-05-22T10:20:53.592244+00:00 10.215.168.64  2024-05-22T10:20:52.674863+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-05-22T10:20:53.769003+00:00 10.215.168.64  2024-05-22T10:20:52.851596+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-05-22T10:20:53.858303+00:00 10.215.168.64  2024-05-22T10:20:52.940901+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system syslog host 10.215.168.1 local-vrf VRF0
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than VRF0.
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.198 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.198/0.198/0.198/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server {log_file} file and read the {log_msg} log message:

Show output
2024-05-22T10:20:54.327603+00:00 10.215.168.64  2024-05-22T10:20:53.410142+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-05-22T10:20:54.679369+00:00 10.215.168.64  2024-05-22T10:20:53.761923+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-05-22T10:20:54.691764+00:00 10.215.168.64  2024-05-22T10:20:53.774361+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-05-22T10:20:56.188337+00:00 10.215.168.64  2024-05-22T10:20:55.270956+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-05-22T10:20:56.908978+00:00 10.215.168.64  2024-05-22T10:20:55.991550+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-05-22T10:20:57.028701+00:00 10.215.168.64  2024-05-22T10:20:56.111287+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-05-22T10:20:57.164985+00:00 10.215.168.64  2024-05-22T10:20:56.247540+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-05-22T10:21:02.153232+00:00 10.215.168.64  2024-05-22T10:21:01.986751+00:00 daemon-info osdx systemd[1]:  Stopping System Logging Service...
2024-05-22T10:21:02.153288+00:00 10.215.168.64  2024-05-22T10:21:01.987187+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="32428" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-05-22T10:21:02.153372+00:00 10.215.168.64  2024-05-22T10:21:01.987976+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Succeeded.
2024-05-22T10:21:02.153434+00:00 10.215.168.64  2024-05-22T10:21:01.988358+00:00 daemon-info osdx systemd[1]:  Stopped System Logging Service.
2024-05-22T10:21:02.153434+00:00 10.215.168.64  2024-05-22T10:21:01.989866+00:00 daemon-info osdx systemd[1]:  Starting System Logging Service...
2024-05-22T10:21:02.153434+00:00 10.215.168.64  2024-05-22T10:21:01.993521+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-05-22T10:21:02.153434+00:00 10.215.168.64  2024-05-22T10:21:01.993603+00:00 daemon-info osdx systemd[1]:  Started System Logging Service.
2024-05-22T10:21:02.153434+00:00 10.215.168.64  2024-05-22T10:21:01.993685+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="32585" x-info="https://www.rsyslog.com"] start
2024-05-22T10:21:02.155371+00:00 10.215.168.64  2024-05-22T10:21:01.996248+00:00 daemon-notice osdx cfgd[1125]:  [27280]Completed change to active configuration
2024-05-22T10:21:02.159421+00:00 10.215.168.64  2024-05-22T10:21:02.000147+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-05-22T10:21:02.204855+00:00 10.215.168.64  2024-05-22T10:21:02.045732+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-05-22T10:21:02.682344+00:00 10.215.168.64  2024-05-22T10:21:02.523200+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1  vrf VRF0    count 1 size 56 timeout 1'.
2024-05-22T10:21:02.779926+00:00 10.215.168.64  2024-05-22T10:21:02.620736+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set interfaces ethernet eth0 address 10.215.168.64/24
set system syslog host 10.215.168.1 local-interface eth0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.332 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.332/0.332/0.332/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server {log_file} file and read the {log_msg} log message:

Show output
2024-05-22T10:21:03.278729+00:00 10.215.168.64  2024-05-22T10:21:03.119555+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-05-22T10:21:03.664634+00:00 10.215.168.64  2024-05-22T10:21:03.505409+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-05-22T10:21:03.676776+00:00 10.215.168.64  2024-05-22T10:21:03.517609+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-05-22T10:21:04.975634+00:00 10.215.168.64  2024-05-22T10:21:04.816416+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-05-22T10:21:05.545020+00:00 10.215.168.64  2024-05-22T10:21:05.385843+00:00 daemon-warning osdx zebra[1078]:  [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]):
2024-05-22T10:21:05.575328+00:00 10.215.168.64  2024-05-22T10:21:05.416099+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-05-22T10:21:05.712528+00:00 10.215.168.64  2024-05-22T10:21:05.553126+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-05-22T10:21:05.842348+00:00 10.215.168.64  2024-05-22T10:21:05.682954+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-05-22T10:21:10.650921+00:00 10.215.168.64  2024-05-22T10:21:09.643645+00:00 daemon-info osdx systemd[1]:  Stopping System Logging Service...
2024-05-22T10:21:10.650921+00:00 10.215.168.64  2024-05-22T10:21:09.643943+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="32706" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-05-22T10:21:10.650921+00:00 10.215.168.64  2024-05-22T10:21:09.644139+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Succeeded.
2024-05-22T10:21:10.650921+00:00 10.215.168.64  2024-05-22T10:21:09.644668+00:00 daemon-info osdx systemd[1]:  Stopped System Logging Service.
2024-05-22T10:21:10.650921+00:00 10.215.168.64  2024-05-22T10:21:09.647636+00:00 daemon-info osdx systemd[1]:  Starting System Logging Service...
2024-05-22T10:21:10.651091+00:00 10.215.168.64  2024-05-22T10:21:09.651443+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-05-22T10:21:10.651139+00:00 10.215.168.64  2024-05-22T10:21:09.651532+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="392" x-info="https://www.rsyslog.com"] start
2024-05-22T10:21:10.651249+00:00 10.215.168.64  2024-05-22T10:21:09.651697+00:00 daemon-info osdx systemd[1]:  Started System Logging Service.
2024-05-22T10:21:10.653517+00:00 10.215.168.64  2024-05-22T10:21:09.653889+00:00 daemon-notice osdx cfgd[1125]:  [27280]Completed change to active configuration
2024-05-22T10:21:10.657253+00:00 10.215.168.64  2024-05-22T10:21:09.657737+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-05-22T10:21:10.698238+00:00 10.215.168.64  2024-05-22T10:21:09.698734+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-05-22T10:21:10.918227+00:00 10.215.168.64  2024-05-22T10:21:09.918716+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-05-22T10:21:11.064301+00:00 10.215.168.64  2024-05-22T10:21:10.064720+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca running://ca.crt
set system syslog host 10.215.168.1 tls permittedPeer "Rsyslog-server"
set interfaces ethernet eth0 address 10.215.168.64/24

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.177 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.177/0.177/0.177/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server {log_file} file and read the {log_msg} log message:

Show output
2024-05-22T10:21:11.631475+00:00 10.215.168.64  2024-05-22T10:21:10.631885+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-05-22T10:21:11.919182+00:00 10.215.168.64  2024-05-22T10:21:10.919637+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-05-22T10:21:11.932190+00:00 10.215.168.64  2024-05-22T10:21:10.932652+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-05-22T10:21:13.109434+00:00 10.215.168.64  2024-05-22T10:21:12.109822+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-05-22T10:21:13.691058+00:00 10.215.168.64  2024-05-22T10:21:12.691490+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-05-22T10:21:13.866911+00:00 10.215.168.64  2024-05-22T10:21:12.867181+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-05-22T10:21:13.985742+00:00 10.215.168.64  2024-05-22T10:21:12.986109+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-05-22T10:21:18.823211+00:00 10.215.168.64  2024-05-22T10:21:17.720276+00:00 daemon-info osdx systemd[1]:  Stopping System Logging Service...
2024-05-22T10:21:18.823211+00:00 10.215.168.64  2024-05-22T10:21:17.720504+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="513" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-05-22T10:21:18.823211+00:00 10.215.168.64  2024-05-22T10:21:17.722086+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Succeeded.
2024-05-22T10:21:18.823211+00:00 10.215.168.64  2024-05-22T10:21:17.722157+00:00 daemon-info osdx systemd[1]:  Stopped System Logging Service.
2024-05-22T10:21:18.823211+00:00 10.215.168.64  2024-05-22T10:21:17.722953+00:00 daemon-info osdx systemd[1]:  Starting System Logging Service...
2024-05-22T10:21:18.823211+00:00 10.215.168.64  2024-05-22T10:21:17.730182+00:00 daemon-info osdx systemd[1]:  Started System Logging Service.
2024-05-22T10:21:18.823211+00:00 10.215.168.64  2024-05-22T10:21:17.731582+00:00 daemon-notice osdx cfgd[1125]:  [27280]Completed change to active configuration
2024-05-22T10:21:18.864038+00:00 10.215.168.64  2024-05-22T10:21:17.731840+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-05-22T10:21:18.864038+00:00 10.215.168.64  2024-05-22T10:21:17.731909+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="642" x-info="https://www.rsyslog.com"] start
2024-05-22T10:21:18.864038+00:00 10.215.168.64  2024-05-22T10:21:17.735464+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-05-22T10:21:18.864038+00:00 10.215.168.64  2024-05-22T10:21:17.776465+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-05-22T10:21:19.010812+00:00 10.215.168.64  2024-05-22T10:21:17.967764+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-05-22T10:21:19.233449+00:00 10.215.168.64  2024-05-22T10:21:18.190346+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.