Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2024-05-22 10:15:15.981956 daemon-err , modulelauncher[23221]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-05-22 10:15:16.652212 authpriv-err , sshd[23283]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-05-22 10:15:16.652283 authpriv-err , sshd[23283]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-05-22 10:15:17.048382 authpriv-err , login[23325]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-05-22 10:15:17.048476 authpriv-err , login[23325]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-05-22 10:15:18.892703 daemon-err , modulelauncher[23385]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-05-22 10:15:18.892773 daemon-err , modulelauncher[23385]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-05-22 10:15:18.898270 daemon-err , modulelauncher[23385]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-05-22 10:15:18.898337 daemon-err , modulelauncher[23385]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-05-22 10:15:18.904303 daemon-err , modulelauncher[23385]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-05-22 10:15:18.904377 daemon-err , modulelauncher[23385]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-05-22 10:15:18.910442 daemon-err , modulelauncher[23385]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-05-22 10:15:18.910525 daemon-err , modulelauncher[23385]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-05-22 10:15:19.518198 authpriv-err , sshd[23419]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-05-22 10:15:19.518297 authpriv-err , sshd[23419]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-05-22 10:15:29.879523 authpriv-err , login[23428]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-05-22 10:15:29.879629 authpriv-err , login[23428]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-05-22 10:15:36.986618 daemon-err , staticd[1083]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 488 2024-05-22 10:15:36.986690 daemon-err , staticd[1083]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 488 2024-05-22 10:15:51.435808 daemon-err , modulelauncher[24191]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-05-22 10:15:51.436028 daemon-err , modulelauncher[24191]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-05-22 10:15:51.441521 daemon-err , modulelauncher[24191]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-05-22 10:15:51.441688 daemon-err , modulelauncher[24191]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-05-22 10:15:59.980414 daemon-err , modulelauncher[24552]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-05-22 10:15:59.980469 daemon-err , modulelauncher[24552]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-05-22 10:15:59.984730 daemon-err , modulelauncher[24552]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-05-22 10:15:59.984779 daemon-err , modulelauncher[24552]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-05-22 10:16:01.451158 daemon-err , modulelauncher[24699]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-05-22 10:16:01.451214 daemon-err , modulelauncher[24699]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-05-22 10:16:01.456285 daemon-err , modulelauncher[24699]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-05-22 10:16:01.456340 daemon-err , modulelauncher[24699]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-05-22 10:16:41.566917 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2024-05-22 10:16:43.597941 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2024-05-22 10:16:55.514559 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2024-05-22 10:16:56.323758 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2024-05-22 10:17:06.374862 daemon-err , modulelauncher[27126]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0 2024-05-22 10:17:06.374918 daemon-err , modulelauncher[27126]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2024-05-22 10:17:06.378319 daemon-err , modulelauncher[27126]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2024-05-22 10:17:06.378371 daemon-err , modulelauncher[27126]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2024-05-22 10:17:06.382485 daemon-err , modulelauncher[27126]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2024-05-22 10:17:06.382528 daemon-err , modulelauncher[27126]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2024-05-22 10:17:07.144917 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2024-05-22 10:17:07.777960 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2024-05-22 10:17:54.669632 daemon-err , cfgd[1125]: External python command [op.pki scep info CSR] finished with status 1 2024-05-22 10:18:14.777603 daemon-err , cfgd[1125]: External python command [op.pki scep info CSR] finished with status 1 2024-05-22 10:18:19.460122 user-err , scep_controller: Failed to get CA certificate for CSR 'CSR' 2024-05-22 10:18:54.146745 daemon-err , ntpd[28730]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:18:54.146801 daemon-err , ntpd[28730]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:18:54.603341 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19x1Gj2WLx7c6Y2p3fMR2tSuChEGUketCk=] finished with status 1 2024-05-22 10:18:54.603524 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:18:54.603606 daemon-err , cfgd[1125]: \"U2FsdGVkX19x1Gj2WLx7c6Y2p3fMR2tSuChEGUketCk=\" strong-password: score is too weak 2024-05-22 10:18:54.603685 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:18:54.606816 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX19x1Gj2WLx7c6Y2p3fMR2tSuChEGUketCk=\" strong-password: score is too weak#012Commit validation failed#012 2024-05-22 10:19:02.143216 daemon-err , ntpd[28936]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:02.143251 daemon-err , ntpd[28936]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:02.725180 daemon-err , ntpd[28962]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:02.725214 daemon-err , ntpd[28962]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:03.318706 daemon-err , ntpd[28988]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:03.318766 daemon-err , ntpd[28988]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:03.924593 daemon-err , ntpd[29014]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:03.924629 daemon-err , ntpd[29014]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:04.563590 daemon-err , ntpd[29040]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:04.563624 daemon-err , ntpd[29040]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:05.137244 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=] finished with status 1 2024-05-22 10:19:05.137351 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:19:05.137405 daemon-err , cfgd[1125]: \"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak 2024-05-22 10:19:05.137456 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:19:05.140204 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak#012Commit validation failed#012 2024-05-22 10:19:05.806188 daemon-err , ntpd[29085]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:05.806223 daemon-err , ntpd[29085]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:06.413175 daemon-err , ntpd[29111]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:06.413209 daemon-err , ntpd[29111]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:07.015787 daemon-err , ntpd[29137]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:07.015845 daemon-err , ntpd[29137]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:07.614334 daemon-err , ntpd[29163]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:07.614385 daemon-err , ntpd[29163]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:08.200439 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=] finished with status 1 2024-05-22 10:19:08.200521 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:19:08.200561 daemon-err , cfgd[1125]: \"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak 2024-05-22 10:19:08.200598 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:19:08.202735 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak#012Commit validation failed#012 2024-05-22 10:19:08.778693 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=] finished with status 1 2024-05-22 10:19:08.778788 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:19:08.778836 daemon-err , cfgd[1125]: \"U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=\" strong-password: score is too weak 2024-05-22 10:19:08.778883 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:19:08.781611 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=\" strong-password: score is too weak#012Commit validation failed#012 2024-05-22 10:19:09.432019 daemon-err , ntpd[29223]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:09.432054 daemon-err , ntpd[29223]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:10.023240 daemon-err , ntpd[29250]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:10.023276 daemon-err , ntpd[29250]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:10.648901 daemon-err , ntpd[29276]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:10.648955 daemon-err , ntpd[29276]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:11.231268 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=] finished with status 1 2024-05-22 10:19:11.231366 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:19:11.231419 daemon-err , cfgd[1125]: \"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak 2024-05-22 10:19:11.231471 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:19:11.234446 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak#012Commit validation failed#012 2024-05-22 10:19:11.793079 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=] finished with status 1 2024-05-22 10:19:11.793262 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:19:11.793370 daemon-err , cfgd[1125]: \"U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=\" strong-password: score is too weak 2024-05-22 10:19:11.793468 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:19:11.796199 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=\" strong-password: score is too weak#012Commit validation failed#012 2024-05-22 10:19:12.398647 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/JutLg2oPaIFE8G+zgZbPhs=] finished with status 1 2024-05-22 10:19:12.398783 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:19:12.398843 daemon-err , cfgd[1125]: \"U2FsdGVkX18C50MG1uJq/JutLg2oPaIFE8G+zgZbPhs=\" strong-password: score is too weak 2024-05-22 10:19:12.398910 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:19:12.401504 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/JutLg2oPaIFE8G+zgZbPhs=\" strong-password: score is too weak#012Commit validation failed#012 2024-05-22 10:19:13.061846 daemon-err , ntpd[29351]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:13.061905 daemon-err , ntpd[29351]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:13.723680 daemon-err , ntpd[29377]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:13.723739 daemon-err , ntpd[29377]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:14.351701 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=] finished with status 1 2024-05-22 10:19:14.351780 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:19:14.351823 daemon-err , cfgd[1125]: \"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak 2024-05-22 10:19:14.351861 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:19:14.354004 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/KGU9mv7HDKLoDbq/Xvl9YA=\" strong-password: score is too weak#012Commit validation failed#012 2024-05-22 10:19:15.102789 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=] finished with status 1 2024-05-22 10:19:15.102872 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:19:15.102911 daemon-err , cfgd[1125]: \"U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=\" strong-password: score is too weak 2024-05-22 10:19:15.102948 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:19:15.105927 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/Ho0QuVVwGyoJgAU34ccCzw=\" strong-password: score is too weak#012Commit validation failed#012 2024-05-22 10:19:15.695777 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/JutLg2oPaIFE8G+zgZbPhs=] finished with status 1 2024-05-22 10:19:15.695886 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:19:15.695957 daemon-err , cfgd[1125]: \"U2FsdGVkX18C50MG1uJq/JutLg2oPaIFE8G+zgZbPhs=\" strong-password: score is too weak 2024-05-22 10:19:15.696029 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:19:15.698554 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/JutLg2oPaIFE8G+zgZbPhs=\" strong-password: score is too weak#012Commit validation failed#012 2024-05-22 10:19:16.286264 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18C50MG1uJq/PVYzocjgBglmtu9j0ryU/8=] finished with status 1 2024-05-22 10:19:16.286346 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:19:16.286386 daemon-err , cfgd[1125]: \"U2FsdGVkX18C50MG1uJq/PVYzocjgBglmtu9j0ryU/8=\" strong-password: score is too weak 2024-05-22 10:19:16.286422 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:19:16.289163 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18C50MG1uJq/PVYzocjgBglmtu9j0ryU/8=\" strong-password: score is too weak#012Commit validation failed#012 2024-05-22 10:19:24.414546 daemon-err , ntpd[29641]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:24.414595 daemon-err , ntpd[29641]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:32.862076 daemon-err , ntpd[29867]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:32.862119 daemon-err , ntpd[29867]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:40.600219 daemon-err , cfgd[1125]: [27280]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-05-22 10:19:41.067288 daemon-err , cfgd[1125]: [27280]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-05-22 10:19:42.288569 daemon-err , ntpd[30126]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:42.288624 daemon-err , ntpd[30126]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:42.891616 daemon-err , ntpd[30152]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:42.891649 daemon-err , ntpd[30152]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:43.476594 daemon-err , ntpd[30179]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:43.476632 daemon-err , ntpd[30179]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:19:52.382757 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+fd1WwYCq8Gaxd/T2fyAsGQTUtCZkfCYw=] finished with status 1 2024-05-22 10:19:52.382821 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:19:52.382864 daemon-err , cfgd[1125]: \"U2FsdGVkX1+fd1WwYCq8Gaxd/T2fyAsGQTUtCZkfCYw=\" strong-password: score is too weak 2024-05-22 10:19:52.382900 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:19:52.384921 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX1+fd1WwYCq8Gaxd/T2fyAsGQTUtCZkfCYw=\" strong-password: score is too weak#012Commit validation failed#012 2024-05-22 10:19:52.966140 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19HYOLxcpvA/ZFAW9cfBAoZSuNN5T2Cf7A=] finished with status 1 2024-05-22 10:19:52.966357 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:19:52.966461 daemon-err , cfgd[1125]: \"U2FsdGVkX19HYOLxcpvA/ZFAW9cfBAoZSuNN5T2Cf7A=\" strong-password: score is too weak 2024-05-22 10:19:52.966566 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:19:52.969293 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX19HYOLxcpvA/ZFAW9cfBAoZSuNN5T2Cf7A=\" strong-password: score is too weak#012Commit validation failed#012 2024-05-22 10:19:53.563046 daemon-err , ntpd[30532]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:19:53.563108 daemon-err , ntpd[30532]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:20:01.255646 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+GfB/D2aei/oj/CvUL21aqgG5FcnisWHE=] finished with status 2 2024-05-22 10:20:01.255852 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:20:01.255957 daemon-err , cfgd[1125]: \"U2FsdGVkX1+GfB/D2aei/oj/CvUL21aqgG5FcnisWHE=\" strong-password: not long enough 2024-05-22 10:20:01.256062 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:20:01.259092 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX1+GfB/D2aei/oj/CvUL21aqgG5FcnisWHE=\" strong-password: not long enough#012Commit validation failed#012 2024-05-22 10:20:02.061996 daemon-err , ntpd[30753]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:20:02.062031 daemon-err , ntpd[30753]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:20:09.339310 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19xuk5L82i3z11GK8JKI3znyREepJD1H68=] finished with status 3 2024-05-22 10:20:09.339463 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:20:09.339533 daemon-err , cfgd[1125]: \"U2FsdGVkX19xuk5L82i3z11GK8JKI3znyREepJD1H68=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-05-22 10:20:09.339596 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:20:09.341968 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX19xuk5L82i3z11GK8JKI3znyREepJD1H68=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-05-22 10:20:09.923990 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19WEkn6W3YHz7wh5sCcFwM4t9pO4I6x5Yo=] finished with status 3 2024-05-22 10:20:09.924224 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:20:09.924348 daemon-err , cfgd[1125]: \"U2FsdGVkX19WEkn6W3YHz7wh5sCcFwM4t9pO4I6x5Yo=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-05-22 10:20:09.924456 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:20:09.927756 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX19WEkn6W3YHz7wh5sCcFwM4t9pO4I6x5Yo=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-05-22 10:20:10.486676 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX199nnEI179eOJYAkU7erCz7GtNyrGTlPJg=] finished with status 3 2024-05-22 10:20:10.486899 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:20:10.487009 daemon-err , cfgd[1125]: \"U2FsdGVkX199nnEI179eOJYAkU7erCz7GtNyrGTlPJg=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-05-22 10:20:10.487135 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:20:10.490022 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX199nnEI179eOJYAkU7erCz7GtNyrGTlPJg=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-05-22 10:20:11.053225 daemon-err , cfgd[1125]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/xqpSfJBFRlujdfqNrrbZPKh8gO9BQD/g=] finished with status 3 2024-05-22 10:20:11.053456 daemon-err , cfgd[1125]: [ system ntp authentication-key 1 encrypted-key ] 2024-05-22 10:20:11.053569 daemon-err , cfgd[1125]: \"U2FsdGVkX1/xqpSfJBFRlujdfqNrrbZPKh8gO9BQD/g=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-05-22 10:20:11.053692 daemon-err , cfgd[1125]: Commit validation failed 2024-05-22 10:20:11.056740 daemon-err , cfgd[1125]: [27280]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX1/xqpSfJBFRlujdfqNrrbZPKh8gO9BQD/g=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-05-22 10:20:11.707654 daemon-err , ntpd[30998]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-05-22 10:20:11.707713 daemon-err , ntpd[30998]: AUTH: authreadkeys: added 1 keys 2024-05-22 10:20:12.176084 daemon-err , cfgd[1125]: [27280]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-05-22 10:20:12.660359 daemon-err , cfgd[1125]: [27280]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-05-22 10:20:13.106872 daemon-err , cfgd[1125]: [27280]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-05-22 10:20:13.574326 daemon-err , cfgd[1125]: [27280]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-05-22 10:20:26.027184 daemon-info , systemd[1]: Stopping System Logging Service... 2024-05-22 10:20:26.027372 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="21032" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-05-22 10:20:26.028477 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-05-22 10:20:26.028548 daemon-info , systemd[1]: Stopped System Logging Service. 2024-05-22 10:20:26.029976 daemon-info , systemd[1]: Starting System Logging Service... 2024-05-22 10:20:26.033953 syslog-info , rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-05-22 10:20:26.034032 daemon-info , systemd[1]: Started System Logging Service. 2024-05-22 10:20:26.034519 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="31480" x-info="https://www.rsyslog.com"] start 2024-05-22 10:20:26.035535 daemon-notice , cfgd[1125]: [27280]Completed change to active configuration 2024-05-22 10:20:26.038238 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2024-05-22 10:20:26.085501 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2024-05-22 10:20:26.233471 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog file systemd_msg set system syslog file systemd_msg level info set system syslog file systemd_msg app systemd
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output contains the following tokens:
systemd[1]: Started "DHCP Server Service instance main".Show output
2024-05-22 10:20:34.520918 daemon-info , systemd[1]: Stopping System Logging Service... 2024-05-22 10:20:34.522745 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-05-22 10:20:34.523141 daemon-info , systemd[1]: Stopped System Logging Service. 2024-05-22 10:20:34.524681 daemon-info , systemd[1]: Starting System Logging Service... 2024-05-22 10:20:34.527094 daemon-info , systemd[1]: Started System Logging Service. 2024-05-22 10:20:35.238561 daemon-info , systemd[1]: Started "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog file systemd_msg set system syslog file systemd_msg level info set system syslog file systemd_msg app systemd set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output contains the following tokens:
Started "DHCP Server Service instance main".Show output
2024-05-22 10:20:43.753092 daemon-info , systemd[1]: Stopping System Logging Service... 2024-05-22 10:20:43.754219 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-05-22 10:20:43.754630 daemon-info , systemd[1]: Stopped System Logging Service. 2024-05-22 10:20:43.756178 daemon-info , systemd[1]: Starting System Logging Service... 2024-05-22 10:20:43.758825 daemon-info , systemd[1]: Started System Logging Service. 2024-05-22 10:20:44.475209 daemon-info , systemd[1]: Started "DHCP Server Service instance main".
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set interfaces ethernet eth0 address 10.215.168.64/24
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.223 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.223/0.223/0.223/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-05-22T10:20:53.548421+00:00 10.215.168.64 2024-05-22T10:20:52.625203+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-05-22T10:20:53.548421+00:00 10.215.168.64 2024-05-22T10:20:52.625450+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="32182" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-05-22T10:20:53.548421+00:00 10.215.168.64 2024-05-22T10:20:52.626093+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-05-22T10:20:53.548421+00:00 10.215.168.64 2024-05-22T10:20:52.626418+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-05-22T10:20:53.548421+00:00 10.215.168.64 2024-05-22T10:20:52.627707+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-05-22T10:20:53.548421+00:00 10.215.168.64 2024-05-22T10:20:52.630107+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-05-22T10:20:53.548421+00:00 10.215.168.64 2024-05-22T10:20:52.630174+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="32307" x-info="https://www.rsyslog.com"] start 2024-05-22T10:20:53.548493+00:00 10.215.168.64 2024-05-22T10:20:52.630236+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-05-22T10:20:53.549176+00:00 10.215.168.64 2024-05-22T10:20:52.631832+00:00 daemon-notice osdx cfgd[1125]: [27280]Completed change to active configuration 2024-05-22T10:20:53.552206+00:00 10.215.168.64 2024-05-22T10:20:52.634668+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-05-22T10:20:53.592244+00:00 10.215.168.64 2024-05-22T10:20:52.674863+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-05-22T10:20:53.769003+00:00 10.215.168.64 2024-05-22T10:20:52.851596+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-05-22T10:20:53.858303+00:00 10.215.168.64 2024-05-22T10:20:52.940901+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system syslog host 10.215.168.1 local-vrf VRF0 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than VRF0. PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.198 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.198/0.198/0.198/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-05-22T10:20:54.327603+00:00 10.215.168.64 2024-05-22T10:20:53.410142+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-05-22T10:20:54.679369+00:00 10.215.168.64 2024-05-22T10:20:53.761923+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-05-22T10:20:54.691764+00:00 10.215.168.64 2024-05-22T10:20:53.774361+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-05-22T10:20:56.188337+00:00 10.215.168.64 2024-05-22T10:20:55.270956+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-05-22T10:20:56.908978+00:00 10.215.168.64 2024-05-22T10:20:55.991550+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-05-22T10:20:57.028701+00:00 10.215.168.64 2024-05-22T10:20:56.111287+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-05-22T10:20:57.164985+00:00 10.215.168.64 2024-05-22T10:20:56.247540+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-05-22T10:21:02.153232+00:00 10.215.168.64 2024-05-22T10:21:01.986751+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-05-22T10:21:02.153288+00:00 10.215.168.64 2024-05-22T10:21:01.987187+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="32428" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-05-22T10:21:02.153372+00:00 10.215.168.64 2024-05-22T10:21:01.987976+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-05-22T10:21:02.153434+00:00 10.215.168.64 2024-05-22T10:21:01.988358+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-05-22T10:21:02.153434+00:00 10.215.168.64 2024-05-22T10:21:01.989866+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-05-22T10:21:02.153434+00:00 10.215.168.64 2024-05-22T10:21:01.993521+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-05-22T10:21:02.153434+00:00 10.215.168.64 2024-05-22T10:21:01.993603+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-05-22T10:21:02.153434+00:00 10.215.168.64 2024-05-22T10:21:01.993685+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="32585" x-info="https://www.rsyslog.com"] start 2024-05-22T10:21:02.155371+00:00 10.215.168.64 2024-05-22T10:21:01.996248+00:00 daemon-notice osdx cfgd[1125]: [27280]Completed change to active configuration 2024-05-22T10:21:02.159421+00:00 10.215.168.64 2024-05-22T10:21:02.000147+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-05-22T10:21:02.204855+00:00 10.215.168.64 2024-05-22T10:21:02.045732+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-05-22T10:21:02.682344+00:00 10.215.168.64 2024-05-22T10:21:02.523200+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2024-05-22T10:21:02.779926+00:00 10.215.168.64 2024-05-22T10:21:02.620736+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set interfaces ethernet eth0 address 10.215.168.64/24 set system syslog host 10.215.168.1 local-interface eth0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.332 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.332/0.332/0.332/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-05-22T10:21:03.278729+00:00 10.215.168.64 2024-05-22T10:21:03.119555+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-05-22T10:21:03.664634+00:00 10.215.168.64 2024-05-22T10:21:03.505409+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-05-22T10:21:03.676776+00:00 10.215.168.64 2024-05-22T10:21:03.517609+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-05-22T10:21:04.975634+00:00 10.215.168.64 2024-05-22T10:21:04.816416+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-05-22T10:21:05.545020+00:00 10.215.168.64 2024-05-22T10:21:05.385843+00:00 daemon-warning osdx zebra[1078]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): 2024-05-22T10:21:05.575328+00:00 10.215.168.64 2024-05-22T10:21:05.416099+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-05-22T10:21:05.712528+00:00 10.215.168.64 2024-05-22T10:21:05.553126+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-05-22T10:21:05.842348+00:00 10.215.168.64 2024-05-22T10:21:05.682954+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-05-22T10:21:10.650921+00:00 10.215.168.64 2024-05-22T10:21:09.643645+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-05-22T10:21:10.650921+00:00 10.215.168.64 2024-05-22T10:21:09.643943+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="32706" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-05-22T10:21:10.650921+00:00 10.215.168.64 2024-05-22T10:21:09.644139+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-05-22T10:21:10.650921+00:00 10.215.168.64 2024-05-22T10:21:09.644668+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-05-22T10:21:10.650921+00:00 10.215.168.64 2024-05-22T10:21:09.647636+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-05-22T10:21:10.651091+00:00 10.215.168.64 2024-05-22T10:21:09.651443+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-05-22T10:21:10.651139+00:00 10.215.168.64 2024-05-22T10:21:09.651532+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="392" x-info="https://www.rsyslog.com"] start 2024-05-22T10:21:10.651249+00:00 10.215.168.64 2024-05-22T10:21:09.651697+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-05-22T10:21:10.653517+00:00 10.215.168.64 2024-05-22T10:21:09.653889+00:00 daemon-notice osdx cfgd[1125]: [27280]Completed change to active configuration 2024-05-22T10:21:10.657253+00:00 10.215.168.64 2024-05-22T10:21:09.657737+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-05-22T10:21:10.698238+00:00 10.215.168.64 2024-05-22T10:21:09.698734+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-05-22T10:21:10.918227+00:00 10.215.168.64 2024-05-22T10:21:09.918716+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-05-22T10:21:11.064301+00:00 10.215.168.64 2024-05-22T10:21:10.064720+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca running://ca.crt set system syslog host 10.215.168.1 tls permittedPeer "Rsyslog-server" set interfaces ethernet eth0 address 10.215.168.64/24
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.177 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.177/0.177/0.177/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-05-22T10:21:11.631475+00:00 10.215.168.64 2024-05-22T10:21:10.631885+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-05-22T10:21:11.919182+00:00 10.215.168.64 2024-05-22T10:21:10.919637+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-05-22T10:21:11.932190+00:00 10.215.168.64 2024-05-22T10:21:10.932652+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-05-22T10:21:13.109434+00:00 10.215.168.64 2024-05-22T10:21:12.109822+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-05-22T10:21:13.691058+00:00 10.215.168.64 2024-05-22T10:21:12.691490+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-05-22T10:21:13.866911+00:00 10.215.168.64 2024-05-22T10:21:12.867181+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-05-22T10:21:13.985742+00:00 10.215.168.64 2024-05-22T10:21:12.986109+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-05-22T10:21:18.823211+00:00 10.215.168.64 2024-05-22T10:21:17.720276+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-05-22T10:21:18.823211+00:00 10.215.168.64 2024-05-22T10:21:17.720504+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="513" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-05-22T10:21:18.823211+00:00 10.215.168.64 2024-05-22T10:21:17.722086+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-05-22T10:21:18.823211+00:00 10.215.168.64 2024-05-22T10:21:17.722157+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-05-22T10:21:18.823211+00:00 10.215.168.64 2024-05-22T10:21:17.722953+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-05-22T10:21:18.823211+00:00 10.215.168.64 2024-05-22T10:21:17.730182+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-05-22T10:21:18.823211+00:00 10.215.168.64 2024-05-22T10:21:17.731582+00:00 daemon-notice osdx cfgd[1125]: [27280]Completed change to active configuration 2024-05-22T10:21:18.864038+00:00 10.215.168.64 2024-05-22T10:21:17.731840+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-05-22T10:21:18.864038+00:00 10.215.168.64 2024-05-22T10:21:17.731909+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="642" x-info="https://www.rsyslog.com"] start 2024-05-22T10:21:18.864038+00:00 10.215.168.64 2024-05-22T10:21:17.735464+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-05-22T10:21:18.864038+00:00 10.215.168.64 2024-05-22T10:21:17.776465+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-05-22T10:21:19.010812+00:00 10.215.168.64 2024-05-22T10:21:17.967764+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-05-22T10:21:19.233449+00:00 10.215.168.64 2024-05-22T10:21:18.190346+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.