Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2024-06-13 00:18:07.814452 daemon-err , cfgd[1122]:  [ system ntp authentication-key 1 encrypted-key ]
2024-06-13 00:18:07.814569 daemon-err , cfgd[1122]:  \"U2FsdGVkX18asIaAO+emBMHFhe/lNUit0QAWPJL/S3s=\" strong-password: score is too weak
2024-06-13 00:18:07.814681 daemon-err , cfgd[1122]:  Commit validation failed
2024-06-13 00:18:07.817521 daemon-err , cfgd[1122]:  [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18asIaAO+emBMHFhe/lNUit0QAWPJL/S3s=\" strong-password: score is too weak#012Commit validation failed#012
2024-06-13 00:18:08.544893 daemon-err , cfgd[1122]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18asIaAO+emBAVwReVyf7skqjDKiwV4/Kg=] finished with status 1
2024-06-13 00:18:08.545003 daemon-err , cfgd[1122]:  [ system ntp authentication-key 1 encrypted-key ]
2024-06-13 00:18:08.545076 daemon-err , cfgd[1122]:  \"U2FsdGVkX18asIaAO+emBAVwReVyf7skqjDKiwV4/Kg=\" strong-password: score is too weak
2024-06-13 00:18:08.545139 daemon-err , cfgd[1122]:  Commit validation failed
2024-06-13 00:18:08.548359 daemon-err , cfgd[1122]:  [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18asIaAO+emBAVwReVyf7skqjDKiwV4/Kg=\" strong-password: score is too weak#012Commit validation failed#012
2024-06-13 00:18:09.310679 daemon-err , cfgd[1122]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18asIaAO+emBCQg4Hnn1TGuJuSnpw4VhdA=] finished with status 1
2024-06-13 00:18:09.310780 daemon-err , cfgd[1122]:  [ system ntp authentication-key 1 encrypted-key ]
2024-06-13 00:18:09.310850 daemon-err , cfgd[1122]:  \"U2FsdGVkX18asIaAO+emBCQg4Hnn1TGuJuSnpw4VhdA=\" strong-password: score is too weak
2024-06-13 00:18:09.310928 daemon-err , cfgd[1122]:  Commit validation failed
2024-06-13 00:18:09.312418 daemon-err , cfgd[1122]:  [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18asIaAO+emBCQg4Hnn1TGuJuSnpw4VhdA=\" strong-password: score is too weak#012Commit validation failed#012
2024-06-13 00:18:19.149321 daemon-err , ntpd[20664]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-06-13 00:18:19.149372 daemon-err , ntpd[20664]:  AUTH: authreadkeys: added 1 keys
2024-06-13 00:18:29.502147 daemon-err , ntpd[20889]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-06-13 00:18:29.502200 daemon-err , ntpd[20889]:  AUTH: authreadkeys: added 1 keys
2024-06-13 00:18:39.199583 daemon-err , cfgd[1122]:  [17211]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-06-13 00:18:39.747847 daemon-err , cfgd[1122]:  [17211]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-06-13 00:18:41.212962 daemon-err , ntpd[21148]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-06-13 00:18:41.212999 daemon-err , ntpd[21148]:  AUTH: authreadkeys: added 1 keys
2024-06-13 00:18:41.813066 daemon-err , ntpd[21174]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-06-13 00:18:41.813113 daemon-err , ntpd[21174]:  AUTH: authreadkeys: added 1 keys
2024-06-13 00:18:42.540693 daemon-err , ntpd[21200]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-06-13 00:18:42.540732 daemon-err , ntpd[21200]:  AUTH: authreadkeys: added 1 keys
2024-06-13 00:18:53.433732 daemon-err , cfgd[1122]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18lJWcQYNpbAEv0puxIzONccqSwWrc5cEc=] finished with status 1
2024-06-13 00:18:53.433955 daemon-err , cfgd[1122]:  [ system ntp authentication-key 1 encrypted-key ]
2024-06-13 00:18:53.434076 daemon-err , cfgd[1122]:  \"U2FsdGVkX18lJWcQYNpbAEv0puxIzONccqSwWrc5cEc=\" strong-password: score is too weak
2024-06-13 00:18:53.434199 daemon-err , cfgd[1122]:  Commit validation failed
2024-06-13 00:18:53.437328 daemon-err , cfgd[1122]:  [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18lJWcQYNpbAEv0puxIzONccqSwWrc5cEc=\" strong-password: score is too weak#012Commit validation failed#012
2024-06-13 00:18:54.018462 daemon-err , cfgd[1122]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19Dwi334BjmN1c7qHosyiwmeZ5boq8rxXc=] finished with status 1
2024-06-13 00:18:54.018680 daemon-err , cfgd[1122]:  [ system ntp authentication-key 1 encrypted-key ]
2024-06-13 00:18:54.018791 daemon-err , cfgd[1122]:  \"U2FsdGVkX19Dwi334BjmN1c7qHosyiwmeZ5boq8rxXc=\" strong-password: score is too weak
2024-06-13 00:18:54.018898 daemon-err , cfgd[1122]:  Commit validation failed
2024-06-13 00:18:54.022768 daemon-err , cfgd[1122]:  [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX19Dwi334BjmN1c7qHosyiwmeZ5boq8rxXc=\" strong-password: score is too weak#012Commit validation failed#012
2024-06-13 00:18:54.759470 daemon-err , ntpd[21553]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-06-13 00:18:54.759535 daemon-err , ntpd[21553]:  AUTH: authreadkeys: added 1 keys
2024-06-13 00:19:03.576370 daemon-err , cfgd[1122]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18j46hMW9ulFCt4u4JzVaFwJkPX8skNB3I=] finished with status 2
2024-06-13 00:19:03.576519 daemon-err , cfgd[1122]:  [ system ntp authentication-key 1 encrypted-key ]
2024-06-13 00:19:03.576590 daemon-err , cfgd[1122]:  \"U2FsdGVkX18j46hMW9ulFCt4u4JzVaFwJkPX8skNB3I=\" strong-password: not long enough
2024-06-13 00:19:03.576653 daemon-err , cfgd[1122]:  Commit validation failed
2024-06-13 00:19:03.579330 daemon-err , cfgd[1122]:  [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18j46hMW9ulFCt4u4JzVaFwJkPX8skNB3I=\" strong-password: not long enough#012Commit validation failed#012
2024-06-13 00:19:04.667297 daemon-err , ntpd[21774]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-06-13 00:19:04.667348 daemon-err , ntpd[21774]:  AUTH: authreadkeys: added 1 keys
2024-06-13 00:19:12.410270 daemon-err , cfgd[1122]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+rir7QYjM7x2wbDUqHH6uAI/kH/JP3On4=] finished with status 3
2024-06-13 00:19:12.410459 daemon-err , cfgd[1122]:  [ system ntp authentication-key 1 encrypted-key ]
2024-06-13 00:19:12.410553 daemon-err , cfgd[1122]:  \"U2FsdGVkX1+rir7QYjM7x2wbDUqHH6uAI/kH/JP3On4=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2024-06-13 00:19:12.410639 daemon-err , cfgd[1122]:  Commit validation failed
2024-06-13 00:19:12.413975 daemon-err , cfgd[1122]:  [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX1+rir7QYjM7x2wbDUqHH6uAI/kH/JP3On4=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012
2024-06-13 00:19:13.227189 daemon-err , cfgd[1122]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/7nJkbD+OZYO4TE6vF6yBdrLQRgVPoTv8=] finished with status 3
2024-06-13 00:19:13.227291 daemon-err , cfgd[1122]:  [ system ntp authentication-key 1 encrypted-key ]
2024-06-13 00:19:13.227345 daemon-err , cfgd[1122]:  \"U2FsdGVkX1/7nJkbD+OZYO4TE6vF6yBdrLQRgVPoTv8=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2024-06-13 00:19:13.228121 daemon-err , cfgd[1122]:  Commit validation failed
2024-06-13 00:19:13.231315 daemon-err , cfgd[1122]:  [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX1/7nJkbD+OZYO4TE6vF6yBdrLQRgVPoTv8=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012
2024-06-13 00:19:13.913654 daemon-err , cfgd[1122]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18U6KRW5xNPmSiHXiko+A+WXkXz3b9aKGY=] finished with status 3
2024-06-13 00:19:13.913748 daemon-err , cfgd[1122]:  [ system ntp authentication-key 1 encrypted-key ]
2024-06-13 00:19:13.913809 daemon-err , cfgd[1122]:  \"U2FsdGVkX18U6KRW5xNPmSiHXiko+A+WXkXz3b9aKGY=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2024-06-13 00:19:13.913877 daemon-err , cfgd[1122]:  Commit validation failed
2024-06-13 00:19:13.916441 daemon-err , cfgd[1122]:  [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18U6KRW5xNPmSiHXiko+A+WXkXz3b9aKGY=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012
2024-06-13 00:19:14.698253 daemon-err , cfgd[1122]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18X3iaQ3B1mRh1dQ5Uieau4t5TmtCJulsE=] finished with status 3
2024-06-13 00:19:14.698340 daemon-err , cfgd[1122]:  [ system ntp authentication-key 1 encrypted-key ]
2024-06-13 00:19:14.698394 daemon-err , cfgd[1122]:  \"U2FsdGVkX18X3iaQ3B1mRh1dQ5Uieau4t5TmtCJulsE=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2024-06-13 00:19:14.698444 daemon-err , cfgd[1122]:  Commit validation failed
2024-06-13 00:19:14.701351 daemon-err , cfgd[1122]:  [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18X3iaQ3B1mRh1dQ5Uieau4t5TmtCJulsE=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012
2024-06-13 00:19:15.494344 daemon-err , ntpd[22019]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-06-13 00:19:15.494381 daemon-err , ntpd[22019]:  AUTH: authreadkeys: added 1 keys
2024-06-13 00:19:16.035654 daemon-err , cfgd[1122]:  [17211]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-06-13 00:19:16.529296 daemon-err , cfgd[1122]:  [17211]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-06-13 00:19:17.073619 daemon-err , cfgd[1122]:  [17211]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-06-13 00:19:17.755090 daemon-err , cfgd[1122]:  [17211]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-06-13 00:19:49.273409 daemon-err , zebra[1075]:  [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (100) vrf 0
2024-06-13 00:20:01.192527 daemon-err , zebra[1075]:  [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0
2024-06-13 00:21:42.790563 daemon-err , nhrpd[23955]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-06-13 00:22:22.951112 daemon-err , nhrpd[24543]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-06-13 00:23:06.133675 daemon-err , nhrpd[25155]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-06-13 00:23:06.434202 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 339
2024-06-13 00:23:06.434304 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 339
2024-06-13 00:23:06.434373 daemon-err , nhrpd[25155]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 339
2024-06-13 00:23:06.434433 daemon-err , nhrpd[25155]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 339
2024-06-13 00:23:46.115995 daemon-err , nhrpd[25838]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-06-13 00:23:46.413362 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 341
2024-06-13 00:23:46.413438 daemon-err , nhrpd[25838]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 341
2024-06-13 00:23:46.413479 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 341
2024-06-13 00:23:46.413516 daemon-err , nhrpd[25838]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 341
2024-06-13 00:24:26.811038 daemon-err , nhrpd[26498]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-06-13 00:24:27.170164 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 343
2024-06-13 00:24:27.170263 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 343
2024-06-13 00:24:27.170318 daemon-err , nhrpd[26498]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 343
2024-06-13 00:24:27.170372 daemon-err , nhrpd[26498]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 343
2024-06-13 00:24:27.241875 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 344
2024-06-13 00:24:27.241970 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 344
2024-06-13 00:24:27.242024 daemon-err , nhrpd[26498]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 344
2024-06-13 00:24:27.242076 daemon-err , nhrpd[26498]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 344
2024-06-13 00:25:04.409432 daemon-err , nhrpd[27231]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-06-13 00:25:04.703410 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 346
2024-06-13 00:25:04.703494 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 346
2024-06-13 00:25:04.703554 daemon-err , nhrpd[27231]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 346
2024-06-13 00:25:04.703614 daemon-err , nhrpd[27231]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 346
2024-06-13 00:25:04.791286 daemon-err , nhrpd[27231]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 347
2024-06-13 00:25:04.791357 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 347
2024-06-13 00:25:04.791395 daemon-err , nhrpd[27231]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 347
2024-06-13 00:25:04.791430 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 347
2024-06-13 00:25:48.057507 daemon-err , nhrpd[27988]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-06-13 00:25:48.479566 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 350
2024-06-13 00:25:48.479669 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 350
2024-06-13 00:25:48.479731 daemon-err , nhrpd[27988]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 350
2024-06-13 00:25:48.479784 daemon-err , nhrpd[27988]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 350
2024-06-13 00:25:48.555201 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 351
2024-06-13 00:25:48.555296 daemon-err , nhrpd[27988]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 351
2024-06-13 00:25:48.555356 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 351
2024-06-13 00:25:48.555409 daemon-err , nhrpd[27988]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 351
2024-06-13 00:25:48.639196 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 349
2024-06-13 00:25:48.639299 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 349
2024-06-13 00:25:48.639372 daemon-err , nhrpd[27988]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 349
2024-06-13 00:25:48.639429 daemon-err , nhrpd[27988]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 349
2024-06-13 00:26:32.270739 daemon-err , nhrpd[28819]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-06-13 00:26:32.767467 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 354
2024-06-13 00:26:32.767557 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 354
2024-06-13 00:26:32.767624 daemon-err , nhrpd[28819]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 354
2024-06-13 00:26:32.767670 daemon-err , nhrpd[28819]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 354
2024-06-13 00:26:32.846949 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 355
2024-06-13 00:26:32.847037 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 355
2024-06-13 00:26:32.847299 daemon-err , nhrpd[28819]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 355
2024-06-13 00:26:32.847366 daemon-err , nhrpd[28819]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 355
2024-06-13 00:26:32.939287 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 353
2024-06-13 00:26:32.939381 daemon-err , nhrpd[28819]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 353
2024-06-13 00:26:32.939437 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 353
2024-06-13 00:26:32.939495 daemon-err , nhrpd[28819]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 353
2024-06-13 00:27:11.908304 daemon-err , nhrpd[29618]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-06-13 00:27:12.458919 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 358
2024-06-13 00:27:12.459007 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 358
2024-06-13 00:27:12.459533 daemon-err , nhrpd[29618]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 358
2024-06-13 00:27:12.459598 daemon-err , nhrpd[29618]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 358
2024-06-13 00:27:12.561190 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 359
2024-06-13 00:27:12.561541 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 359
2024-06-13 00:27:12.563110 daemon-err , nhrpd[29618]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 359
2024-06-13 00:27:12.563173 daemon-err , nhrpd[29618]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 359
2024-06-13 00:27:12.633705 daemon-err , nhrpd[29618]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 357
2024-06-13 00:27:12.633861 daemon-err , nhrpd[29618]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 357
2024-06-13 00:27:12.634401 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 357
2024-06-13 00:27:12.634464 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 357
2024-06-13 00:28:10.179281 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 361
2024-06-13 00:28:10.179377 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 361
2024-06-13 00:28:40.713562 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 362
2024-06-13 00:28:40.713672 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 362
2024-06-13 00:29:09.262456 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 363
2024-06-13 00:29:09.262547 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 363
2024-06-13 00:29:38.818376 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 365
2024-06-13 00:29:38.818462 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 365
2024-06-13 00:29:38.890212 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 364
2024-06-13 00:29:38.890308 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 364
2024-06-13 00:30:08.231723 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 367
2024-06-13 00:30:08.231791 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 367
2024-06-13 00:30:08.311526 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 366
2024-06-13 00:30:08.311623 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 366
2024-06-13 00:32:01.184571 daemon-err , zebra[1075]:  [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down
2024-06-13 00:32:01.184655 daemon-err , zebra[1075]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=9330, pid=4257190499
2024-06-13 00:32:01.184824 daemon-err , zebra[1075]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (4055[if 373]) into the kernel
2024-06-13 00:32:01.316876 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 372
2024-06-13 00:32:01.316968 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 372
2024-06-13 00:32:29.468988 daemon-err , zebra[1075]:  [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down
2024-06-13 00:32:29.469055 daemon-err , zebra[1075]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=9388, pid=4257190499
2024-06-13 00:32:29.469094 daemon-err , zebra[1075]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (4081[if 376]) into the kernel
2024-06-13 00:32:29.584687 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 375
2024-06-13 00:32:29.584775 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 375
2024-06-13 00:32:59.999013 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 378
2024-06-13 00:32:59.999233 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 378
2024-06-13 00:33:00.074838 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 379
2024-06-13 00:33:00.074959 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 379
2024-06-13 00:33:31.799905 daemon-err , zebra[1075]:  [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down
2024-06-13 00:33:31.799980 daemon-err , zebra[1075]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=9538, pid=4257190499
2024-06-13 00:33:31.800146 daemon-err , zebra[1075]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (4128[if 383]) into the kernel
2024-06-13 00:33:31.965700 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 381
2024-06-13 00:33:31.965783 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 381
2024-06-13 00:33:32.045374 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 382
2024-06-13 00:33:32.045470 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 382
2024-06-13 00:34:57.224412 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 390
2024-06-13 00:34:57.224483 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 390
2024-06-13 00:34:57.304209 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 389
2024-06-13 00:34:57.304313 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 389
2024-06-13 00:35:17.762711 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 393
2024-06-13 00:35:17.762809 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 393
2024-06-13 00:35:17.846574 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 392
2024-06-13 00:35:17.846665 daemon-err , staticd[1080]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 392
2024-06-13 00:37:36.543259 daemon-err , cfgd[1122]:  External python command [op.pki scep info CSR] finished with status 1
2024-06-13 00:37:56.671667 daemon-err , cfgd[1122]:  External python command [op.pki scep info CSR] finished with status 1
2024-06-13 00:38:00.857915 user-err , scep_controller:  Failed to get CA certificate for CSR 'CSR'
2024-06-13 00:38:45.447653 daemon-info , systemd[1]:  Stopping System Logging Service...
2024-06-13 00:38:45.447928 syslog-info , rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="2328" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-06-13 00:38:45.448725 daemon-info , systemd[1]:  rsyslog.service: Succeeded.
2024-06-13 00:38:45.449051 daemon-info , systemd[1]:  Stopped System Logging Service.
2024-06-13 00:38:45.450339 daemon-info , systemd[1]:  Starting System Logging Service...
2024-06-13 00:38:45.454094 syslog-info , rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-06-13 00:38:45.454164 syslog-info , rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="9271" x-info="https://www.rsyslog.com"] start
2024-06-13 00:38:45.454255 daemon-info , systemd[1]:  Started System Logging Service.
2024-06-13 00:38:45.456844 daemon-notice , cfgd[1122]:  [17211]Completed change to active configuration
2024-06-13 00:38:45.459943 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2024-06-13 00:38:45.510192 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2024-06-13 00:38:45.718892 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog file systemd_msg
set system syslog file systemd_msg level info
set system syslog file systemd_msg app systemd

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output contains the following tokens:

systemd[1]:  Started "DHCP Server Service instance main".
Show output
2024-06-13 00:38:55.728607 daemon-info , systemd[1]:  Stopping System Logging Service...
2024-06-13 00:38:55.729713 daemon-info , systemd[1]:  rsyslog.service: Succeeded.
2024-06-13 00:38:55.730002 daemon-info , systemd[1]:  Stopped System Logging Service.
2024-06-13 00:38:55.731332 daemon-info , systemd[1]:  Starting System Logging Service...
2024-06-13 00:38:55.735517 daemon-info , systemd[1]:  Started System Logging Service.
2024-06-13 00:38:56.613772 daemon-info , systemd[1]:  Started "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog file systemd_msg
set system syslog file systemd_msg level info
set system syslog file systemd_msg app systemd
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output contains the following tokens:

Started "DHCP Server Service instance main".
Show output
2024-06-13 00:39:04.906975 daemon-info , systemd[1]:  Stopping System Logging Service...
2024-06-13 00:39:04.908690 daemon-info , systemd[1]:  rsyslog.service: Succeeded.
2024-06-13 00:39:04.909083 daemon-info , systemd[1]:  Stopped System Logging Service.
2024-06-13 00:39:04.914319 daemon-info , systemd[1]:  Starting System Logging Service...
2024-06-13 00:39:04.914676 daemon-info , systemd[1]:  Started System Logging Service.
2024-06-13 00:39:05.874999 daemon-info , systemd[1]:  Started "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set interfaces ethernet eth0 address 10.215.168.64/24

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.180 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.180/0.180/0.180/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server {log_file} file and read the {log_msg} log message:

Show output
2024-06-13T00:39:16.039233+00:00 10.215.168.64  2024-06-13T00:39:15.767969+00:00 daemon-info osdx systemd[1]:  Stopping System Logging Service...
2024-06-13T00:39:16.039633+00:00 10.215.168.64  2024-06-13T00:39:15.768199+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="9979" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-06-13T00:39:16.039633+00:00 10.215.168.64  2024-06-13T00:39:15.768788+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Succeeded.
2024-06-13T00:39:16.039644+00:00 10.215.168.64  2024-06-13T00:39:15.769180+00:00 daemon-info osdx systemd[1]:  Stopped System Logging Service.
2024-06-13T00:39:16.039652+00:00 10.215.168.64  2024-06-13T00:39:15.771499+00:00 daemon-info osdx systemd[1]:  Starting System Logging Service...
2024-06-13T00:39:16.039660+00:00 10.215.168.64  2024-06-13T00:39:15.774125+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-06-13T00:39:16.039673+00:00 10.215.168.64  2024-06-13T00:39:15.774230+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10103" x-info="https://www.rsyslog.com"] start
2024-06-13T00:39:16.039681+00:00 10.215.168.64  2024-06-13T00:39:15.774317+00:00 daemon-info osdx systemd[1]:  Started System Logging Service.
2024-06-13T00:39:16.040825+00:00 10.215.168.64  2024-06-13T00:39:15.775905+00:00 daemon-notice osdx cfgd[1122]:  [17211]Completed change to active configuration
2024-06-13T00:39:16.044174+00:00 10.215.168.64  2024-06-13T00:39:15.779014+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-06-13T00:39:16.096398+00:00 10.215.168.64  2024-06-13T00:39:15.831395+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-06-13T00:39:16.302970+00:00 10.215.168.64  2024-06-13T00:39:16.037817+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-06-13T00:39:16.420810+00:00 10.215.168.64  2024-06-13T00:39:16.155640+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system syslog host 10.215.168.1 local-vrf VRF0
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than VRF0.
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.180 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.180/0.180/0.180/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server {log_file} file and read the {log_msg} log message:

Show output
2024-06-13T00:39:16.936403+00:00 10.215.168.64  2024-06-13T00:39:16.671148+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-06-13T00:39:17.219128+00:00 10.215.168.64  2024-06-13T00:39:16.953927+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-06-13T00:39:17.232696+00:00 10.215.168.64  2024-06-13T00:39:16.967477+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-06-13T00:39:18.603953+00:00 10.215.168.64  2024-06-13T00:39:18.338700+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-06-13T00:39:18.759358+00:00 10.215.168.64  2024-06-13T00:39:18.494138+00:00 daemon-warning osdx zebra[1075]:  [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]):
2024-06-13T00:39:19.208259+00:00 10.215.168.64  2024-06-13T00:39:18.943006+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-06-13T00:39:19.323995+00:00 10.215.168.64  2024-06-13T00:39:19.058677+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-06-13T00:39:19.443521+00:00 10.215.168.64  2024-06-13T00:39:19.178152+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-06-13T00:39:19.554139+00:00 10.215.168.64  2024-06-13T00:39:19.288882+00:00 daemon-warning osdx zebra[1075]:  [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]):
2024-06-13T00:39:24.524655+00:00 10.215.168.64  2024-06-13T00:39:23.985035+00:00 daemon-info osdx systemd[1]:  Stopping System Logging Service...
2024-06-13T00:39:24.524655+00:00 10.215.168.64  2024-06-13T00:39:23.985227+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10225" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-06-13T00:39:24.524655+00:00 10.215.168.64  2024-06-13T00:39:23.986006+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Succeeded.
2024-06-13T00:39:24.524655+00:00 10.215.168.64  2024-06-13T00:39:23.986066+00:00 daemon-info osdx systemd[1]:  Stopped System Logging Service.
2024-06-13T00:39:24.524655+00:00 10.215.168.64  2024-06-13T00:39:23.987190+00:00 daemon-info osdx systemd[1]:  Starting System Logging Service...
2024-06-13T00:39:24.524655+00:00 10.215.168.64  2024-06-13T00:39:23.989897+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-06-13T00:39:24.524655+00:00 10.215.168.64  2024-06-13T00:39:23.989967+00:00 daemon-info osdx systemd[1]:  Started System Logging Service.
2024-06-13T00:39:24.524655+00:00 10.215.168.64  2024-06-13T00:39:23.990027+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10378" x-info="https://www.rsyslog.com"] start
2024-06-13T00:39:24.524674+00:00 10.215.168.64  2024-06-13T00:39:23.991277+00:00 daemon-notice osdx cfgd[1122]:  [17211]Completed change to active configuration
2024-06-13T00:39:24.527862+00:00 10.215.168.64  2024-06-13T00:39:23.994497+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-06-13T00:39:24.570339+00:00 10.215.168.64  2024-06-13T00:39:24.037013+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-06-13T00:39:24.976654+00:00 10.215.168.64  2024-06-13T00:39:24.443274+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1  vrf VRF0    count 1 size 56 timeout 1'.
2024-06-13T00:39:25.060461+00:00 10.215.168.64  2024-06-13T00:39:24.527057+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set interfaces ethernet eth0 address 10.215.168.64/24
set system syslog host 10.215.168.1 local-interface eth0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.173 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.173/0.173/0.173/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server {log_file} file and read the {log_msg} log message:

Show output
2024-06-13T00:39:25.543038+00:00 10.215.168.64  2024-06-13T00:39:25.009624+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-06-13T00:39:25.846435+00:00 10.215.168.64  2024-06-13T00:39:25.312989+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-06-13T00:39:25.858472+00:00 10.215.168.64  2024-06-13T00:39:25.325075+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-06-13T00:39:27.194906+00:00 10.215.168.64  2024-06-13T00:39:26.661409+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-06-13T00:39:27.824959+00:00 10.215.168.64  2024-06-13T00:39:27.291397+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-06-13T00:39:27.941288+00:00 10.215.168.64  2024-06-13T00:39:27.407732+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-06-13T00:39:28.056807+00:00 10.215.168.64  2024-06-13T00:39:27.523240+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-06-13T00:39:32.960717+00:00 10.215.168.64  2024-06-13T00:39:32.802780+00:00 daemon-info osdx systemd[1]:  Stopping System Logging Service...
2024-06-13T00:39:32.960717+00:00 10.215.168.64  2024-06-13T00:39:32.803057+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10499" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-06-13T00:39:32.960717+00:00 10.215.168.64  2024-06-13T00:39:32.804382+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Succeeded.
2024-06-13T00:39:32.960727+00:00 10.215.168.64  2024-06-13T00:39:32.804443+00:00 daemon-info osdx systemd[1]:  Stopped System Logging Service.
2024-06-13T00:39:32.960746+00:00 10.215.168.64  2024-06-13T00:39:32.805531+00:00 daemon-info osdx systemd[1]:  Starting System Logging Service...
2024-06-13T00:39:32.960755+00:00 10.215.168.64  2024-06-13T00:39:32.808689+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-06-13T00:39:32.960755+00:00 10.215.168.64  2024-06-13T00:39:32.808788+00:00 daemon-info osdx systemd[1]:  Started System Logging Service.
2024-06-13T00:39:32.961841+00:00 10.215.168.64  2024-06-13T00:39:32.809257+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10651" x-info="https://www.rsyslog.com"] start
2024-06-13T00:39:32.962292+00:00 10.215.168.64  2024-06-13T00:39:32.810305+00:00 daemon-notice osdx cfgd[1122]:  [17211]Completed change to active configuration
2024-06-13T00:39:32.966276+00:00 10.215.168.64  2024-06-13T00:39:32.814010+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-06-13T00:39:33.007047+00:00 10.215.168.64  2024-06-13T00:39:32.855009+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-06-13T00:39:33.196059+00:00 10.215.168.64  2024-06-13T00:39:33.043906+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-06-13T00:39:33.295657+00:00 10.215.168.64  2024-06-13T00:39:33.143518+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca running://ca.crt
set system syslog host 10.215.168.1 tls permittedPeer "Rsyslog-server"
set interfaces ethernet eth0 address 10.215.168.64/24

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.211 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.211/0.211/0.211/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server {log_file} file and read the {log_msg} log message:

Show output
2024-06-13T00:39:33.760582+00:00 10.215.168.64  2024-06-13T00:39:33.608456+00:00 daemon-warning osdx zebra[1075]:  [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]):
2024-06-13T00:39:33.883461+00:00 10.215.168.64  2024-06-13T00:39:33.731357+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-06-13T00:39:34.225623+00:00 10.215.168.64  2024-06-13T00:39:34.073485+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-06-13T00:39:34.241030+00:00 10.215.168.64  2024-06-13T00:39:34.088898+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-06-13T00:39:34.555196+00:00 10.215.168.64  2024-06-13T00:39:34.403095+00:00 daemon-warning osdx zebra[1075]:  [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]):
2024-06-13T00:39:34.941516+00:00 10.215.168.64  2024-06-13T00:39:34.789270+00:00 daemon-warning osdx zebra[1075]:  [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]):
2024-06-13T00:39:34.941516+00:00 10.215.168.64  2024-06-13T00:39:34.789337+00:00 daemon-warning osdx zebra[1075]:  [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]):
2024-06-13T00:39:34.941516+00:00 10.215.168.64  2024-06-13T00:39:34.789375+00:00 daemon-warning osdx zebra[1075]:  [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]):
2024-06-13T00:39:35.739168+00:00 10.215.168.64  2024-06-13T00:39:35.586938+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-06-13T00:39:36.366825+00:00 10.215.168.64  2024-06-13T00:39:36.214556+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-06-13T00:39:36.490921+00:00 10.215.168.64  2024-06-13T00:39:36.338584+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-06-13T00:39:36.602382+00:00 10.215.168.64  2024-06-13T00:39:36.450054+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-06-13T00:39:42.275343+00:00 10.215.168.64  2024-06-13T00:39:41.205915+00:00 daemon-info osdx systemd[1]:  Stopping System Logging Service...
2024-06-13T00:39:42.315972+00:00 10.215.168.64  2024-06-13T00:39:41.206392+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10772" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-06-13T00:39:42.315972+00:00 10.215.168.64  2024-06-13T00:39:41.206997+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Succeeded.
2024-06-13T00:39:42.315972+00:00 10.215.168.64  2024-06-13T00:39:41.207278+00:00 daemon-info osdx systemd[1]:  Stopped System Logging Service.
2024-06-13T00:39:42.315972+00:00 10.215.168.64  2024-06-13T00:39:41.208558+00:00 daemon-info osdx systemd[1]:  Starting System Logging Service...
2024-06-13T00:39:42.315972+00:00 10.215.168.64  2024-06-13T00:39:41.218499+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-06-13T00:39:42.315972+00:00 10.215.168.64  2024-06-13T00:39:41.218581+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10900" x-info="https://www.rsyslog.com"] start
2024-06-13T00:39:42.315972+00:00 10.215.168.64  2024-06-13T00:39:41.218651+00:00 daemon-info osdx systemd[1]:  Started System Logging Service.
2024-06-13T00:39:42.315972+00:00 10.215.168.64  2024-06-13T00:39:41.220370+00:00 daemon-notice osdx cfgd[1122]:  [17211]Completed change to active configuration
2024-06-13T00:39:42.315972+00:00 10.215.168.64  2024-06-13T00:39:41.223152+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-06-13T00:39:42.315972+00:00 10.215.168.64  2024-06-13T00:39:41.259930+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-06-13T00:39:42.315972+00:00 10.215.168.64  2024-06-13T00:39:41.447474+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-06-13T00:39:42.491734+00:00 10.215.168.64  2024-06-13T00:39:41.703367+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.