Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2024-06-13 00:18:07.814452 daemon-err , cfgd[1122]: [ system ntp authentication-key 1 encrypted-key ] 2024-06-13 00:18:07.814569 daemon-err , cfgd[1122]: \"U2FsdGVkX18asIaAO+emBMHFhe/lNUit0QAWPJL/S3s=\" strong-password: score is too weak 2024-06-13 00:18:07.814681 daemon-err , cfgd[1122]: Commit validation failed 2024-06-13 00:18:07.817521 daemon-err , cfgd[1122]: [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18asIaAO+emBMHFhe/lNUit0QAWPJL/S3s=\" strong-password: score is too weak#012Commit validation failed#012 2024-06-13 00:18:08.544893 daemon-err , cfgd[1122]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18asIaAO+emBAVwReVyf7skqjDKiwV4/Kg=] finished with status 1 2024-06-13 00:18:08.545003 daemon-err , cfgd[1122]: [ system ntp authentication-key 1 encrypted-key ] 2024-06-13 00:18:08.545076 daemon-err , cfgd[1122]: \"U2FsdGVkX18asIaAO+emBAVwReVyf7skqjDKiwV4/Kg=\" strong-password: score is too weak 2024-06-13 00:18:08.545139 daemon-err , cfgd[1122]: Commit validation failed 2024-06-13 00:18:08.548359 daemon-err , cfgd[1122]: [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18asIaAO+emBAVwReVyf7skqjDKiwV4/Kg=\" strong-password: score is too weak#012Commit validation failed#012 2024-06-13 00:18:09.310679 daemon-err , cfgd[1122]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18asIaAO+emBCQg4Hnn1TGuJuSnpw4VhdA=] finished with status 1 2024-06-13 00:18:09.310780 daemon-err , cfgd[1122]: [ system ntp authentication-key 1 encrypted-key ] 2024-06-13 00:18:09.310850 daemon-err , cfgd[1122]: \"U2FsdGVkX18asIaAO+emBCQg4Hnn1TGuJuSnpw4VhdA=\" strong-password: score is too weak 2024-06-13 00:18:09.310928 daemon-err , cfgd[1122]: Commit validation failed 2024-06-13 00:18:09.312418 daemon-err , cfgd[1122]: [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18asIaAO+emBCQg4Hnn1TGuJuSnpw4VhdA=\" strong-password: score is too weak#012Commit validation failed#012 2024-06-13 00:18:19.149321 daemon-err , ntpd[20664]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-06-13 00:18:19.149372 daemon-err , ntpd[20664]: AUTH: authreadkeys: added 1 keys 2024-06-13 00:18:29.502147 daemon-err , ntpd[20889]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-06-13 00:18:29.502200 daemon-err , ntpd[20889]: AUTH: authreadkeys: added 1 keys 2024-06-13 00:18:39.199583 daemon-err , cfgd[1122]: [17211]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-06-13 00:18:39.747847 daemon-err , cfgd[1122]: [17211]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-06-13 00:18:41.212962 daemon-err , ntpd[21148]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-06-13 00:18:41.212999 daemon-err , ntpd[21148]: AUTH: authreadkeys: added 1 keys 2024-06-13 00:18:41.813066 daemon-err , ntpd[21174]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-06-13 00:18:41.813113 daemon-err , ntpd[21174]: AUTH: authreadkeys: added 1 keys 2024-06-13 00:18:42.540693 daemon-err , ntpd[21200]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-06-13 00:18:42.540732 daemon-err , ntpd[21200]: AUTH: authreadkeys: added 1 keys 2024-06-13 00:18:53.433732 daemon-err , cfgd[1122]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18lJWcQYNpbAEv0puxIzONccqSwWrc5cEc=] finished with status 1 2024-06-13 00:18:53.433955 daemon-err , cfgd[1122]: [ system ntp authentication-key 1 encrypted-key ] 2024-06-13 00:18:53.434076 daemon-err , cfgd[1122]: \"U2FsdGVkX18lJWcQYNpbAEv0puxIzONccqSwWrc5cEc=\" strong-password: score is too weak 2024-06-13 00:18:53.434199 daemon-err , cfgd[1122]: Commit validation failed 2024-06-13 00:18:53.437328 daemon-err , cfgd[1122]: [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18lJWcQYNpbAEv0puxIzONccqSwWrc5cEc=\" strong-password: score is too weak#012Commit validation failed#012 2024-06-13 00:18:54.018462 daemon-err , cfgd[1122]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19Dwi334BjmN1c7qHosyiwmeZ5boq8rxXc=] finished with status 1 2024-06-13 00:18:54.018680 daemon-err , cfgd[1122]: [ system ntp authentication-key 1 encrypted-key ] 2024-06-13 00:18:54.018791 daemon-err , cfgd[1122]: \"U2FsdGVkX19Dwi334BjmN1c7qHosyiwmeZ5boq8rxXc=\" strong-password: score is too weak 2024-06-13 00:18:54.018898 daemon-err , cfgd[1122]: Commit validation failed 2024-06-13 00:18:54.022768 daemon-err , cfgd[1122]: [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX19Dwi334BjmN1c7qHosyiwmeZ5boq8rxXc=\" strong-password: score is too weak#012Commit validation failed#012 2024-06-13 00:18:54.759470 daemon-err , ntpd[21553]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-06-13 00:18:54.759535 daemon-err , ntpd[21553]: AUTH: authreadkeys: added 1 keys 2024-06-13 00:19:03.576370 daemon-err , cfgd[1122]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18j46hMW9ulFCt4u4JzVaFwJkPX8skNB3I=] finished with status 2 2024-06-13 00:19:03.576519 daemon-err , cfgd[1122]: [ system ntp authentication-key 1 encrypted-key ] 2024-06-13 00:19:03.576590 daemon-err , cfgd[1122]: \"U2FsdGVkX18j46hMW9ulFCt4u4JzVaFwJkPX8skNB3I=\" strong-password: not long enough 2024-06-13 00:19:03.576653 daemon-err , cfgd[1122]: Commit validation failed 2024-06-13 00:19:03.579330 daemon-err , cfgd[1122]: [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18j46hMW9ulFCt4u4JzVaFwJkPX8skNB3I=\" strong-password: not long enough#012Commit validation failed#012 2024-06-13 00:19:04.667297 daemon-err , ntpd[21774]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-06-13 00:19:04.667348 daemon-err , ntpd[21774]: AUTH: authreadkeys: added 1 keys 2024-06-13 00:19:12.410270 daemon-err , cfgd[1122]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+rir7QYjM7x2wbDUqHH6uAI/kH/JP3On4=] finished with status 3 2024-06-13 00:19:12.410459 daemon-err , cfgd[1122]: [ system ntp authentication-key 1 encrypted-key ] 2024-06-13 00:19:12.410553 daemon-err , cfgd[1122]: \"U2FsdGVkX1+rir7QYjM7x2wbDUqHH6uAI/kH/JP3On4=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-06-13 00:19:12.410639 daemon-err , cfgd[1122]: Commit validation failed 2024-06-13 00:19:12.413975 daemon-err , cfgd[1122]: [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX1+rir7QYjM7x2wbDUqHH6uAI/kH/JP3On4=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-06-13 00:19:13.227189 daemon-err , cfgd[1122]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/7nJkbD+OZYO4TE6vF6yBdrLQRgVPoTv8=] finished with status 3 2024-06-13 00:19:13.227291 daemon-err , cfgd[1122]: [ system ntp authentication-key 1 encrypted-key ] 2024-06-13 00:19:13.227345 daemon-err , cfgd[1122]: \"U2FsdGVkX1/7nJkbD+OZYO4TE6vF6yBdrLQRgVPoTv8=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-06-13 00:19:13.228121 daemon-err , cfgd[1122]: Commit validation failed 2024-06-13 00:19:13.231315 daemon-err , cfgd[1122]: [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX1/7nJkbD+OZYO4TE6vF6yBdrLQRgVPoTv8=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-06-13 00:19:13.913654 daemon-err , cfgd[1122]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18U6KRW5xNPmSiHXiko+A+WXkXz3b9aKGY=] finished with status 3 2024-06-13 00:19:13.913748 daemon-err , cfgd[1122]: [ system ntp authentication-key 1 encrypted-key ] 2024-06-13 00:19:13.913809 daemon-err , cfgd[1122]: \"U2FsdGVkX18U6KRW5xNPmSiHXiko+A+WXkXz3b9aKGY=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-06-13 00:19:13.913877 daemon-err , cfgd[1122]: Commit validation failed 2024-06-13 00:19:13.916441 daemon-err , cfgd[1122]: [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18U6KRW5xNPmSiHXiko+A+WXkXz3b9aKGY=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-06-13 00:19:14.698253 daemon-err , cfgd[1122]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18X3iaQ3B1mRh1dQ5Uieau4t5TmtCJulsE=] finished with status 3 2024-06-13 00:19:14.698340 daemon-err , cfgd[1122]: [ system ntp authentication-key 1 encrypted-key ] 2024-06-13 00:19:14.698394 daemon-err , cfgd[1122]: \"U2FsdGVkX18X3iaQ3B1mRh1dQ5Uieau4t5TmtCJulsE=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-06-13 00:19:14.698444 daemon-err , cfgd[1122]: Commit validation failed 2024-06-13 00:19:14.701351 daemon-err , cfgd[1122]: [17211]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18X3iaQ3B1mRh1dQ5Uieau4t5TmtCJulsE=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-06-13 00:19:15.494344 daemon-err , ntpd[22019]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-06-13 00:19:15.494381 daemon-err , ntpd[22019]: AUTH: authreadkeys: added 1 keys 2024-06-13 00:19:16.035654 daemon-err , cfgd[1122]: [17211]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-06-13 00:19:16.529296 daemon-err , cfgd[1122]: [17211]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-06-13 00:19:17.073619 daemon-err , cfgd[1122]: [17211]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-06-13 00:19:17.755090 daemon-err , cfgd[1122]: [17211]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-06-13 00:19:49.273409 daemon-err , zebra[1075]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (100) vrf 0 2024-06-13 00:20:01.192527 daemon-err , zebra[1075]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0 2024-06-13 00:21:42.790563 daemon-err , nhrpd[23955]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-06-13 00:22:22.951112 daemon-err , nhrpd[24543]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-06-13 00:23:06.133675 daemon-err , nhrpd[25155]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-06-13 00:23:06.434202 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 339 2024-06-13 00:23:06.434304 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 339 2024-06-13 00:23:06.434373 daemon-err , nhrpd[25155]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 339 2024-06-13 00:23:06.434433 daemon-err , nhrpd[25155]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 339 2024-06-13 00:23:46.115995 daemon-err , nhrpd[25838]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-06-13 00:23:46.413362 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 341 2024-06-13 00:23:46.413438 daemon-err , nhrpd[25838]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 341 2024-06-13 00:23:46.413479 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 341 2024-06-13 00:23:46.413516 daemon-err , nhrpd[25838]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 341 2024-06-13 00:24:26.811038 daemon-err , nhrpd[26498]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-06-13 00:24:27.170164 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 343 2024-06-13 00:24:27.170263 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 343 2024-06-13 00:24:27.170318 daemon-err , nhrpd[26498]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 343 2024-06-13 00:24:27.170372 daemon-err , nhrpd[26498]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 343 2024-06-13 00:24:27.241875 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 344 2024-06-13 00:24:27.241970 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 344 2024-06-13 00:24:27.242024 daemon-err , nhrpd[26498]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 344 2024-06-13 00:24:27.242076 daemon-err , nhrpd[26498]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 344 2024-06-13 00:25:04.409432 daemon-err , nhrpd[27231]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-06-13 00:25:04.703410 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 346 2024-06-13 00:25:04.703494 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 346 2024-06-13 00:25:04.703554 daemon-err , nhrpd[27231]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 346 2024-06-13 00:25:04.703614 daemon-err , nhrpd[27231]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 346 2024-06-13 00:25:04.791286 daemon-err , nhrpd[27231]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 347 2024-06-13 00:25:04.791357 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 347 2024-06-13 00:25:04.791395 daemon-err , nhrpd[27231]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 347 2024-06-13 00:25:04.791430 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 347 2024-06-13 00:25:48.057507 daemon-err , nhrpd[27988]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-06-13 00:25:48.479566 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 350 2024-06-13 00:25:48.479669 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 350 2024-06-13 00:25:48.479731 daemon-err , nhrpd[27988]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 350 2024-06-13 00:25:48.479784 daemon-err , nhrpd[27988]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 350 2024-06-13 00:25:48.555201 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 351 2024-06-13 00:25:48.555296 daemon-err , nhrpd[27988]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 351 2024-06-13 00:25:48.555356 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 351 2024-06-13 00:25:48.555409 daemon-err , nhrpd[27988]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 351 2024-06-13 00:25:48.639196 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 349 2024-06-13 00:25:48.639299 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 349 2024-06-13 00:25:48.639372 daemon-err , nhrpd[27988]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 349 2024-06-13 00:25:48.639429 daemon-err , nhrpd[27988]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 349 2024-06-13 00:26:32.270739 daemon-err , nhrpd[28819]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-06-13 00:26:32.767467 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 354 2024-06-13 00:26:32.767557 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 354 2024-06-13 00:26:32.767624 daemon-err , nhrpd[28819]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 354 2024-06-13 00:26:32.767670 daemon-err , nhrpd[28819]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 354 2024-06-13 00:26:32.846949 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 355 2024-06-13 00:26:32.847037 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 355 2024-06-13 00:26:32.847299 daemon-err , nhrpd[28819]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 355 2024-06-13 00:26:32.847366 daemon-err , nhrpd[28819]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 355 2024-06-13 00:26:32.939287 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 353 2024-06-13 00:26:32.939381 daemon-err , nhrpd[28819]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 353 2024-06-13 00:26:32.939437 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 353 2024-06-13 00:26:32.939495 daemon-err , nhrpd[28819]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 353 2024-06-13 00:27:11.908304 daemon-err , nhrpd[29618]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-06-13 00:27:12.458919 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 358 2024-06-13 00:27:12.459007 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 358 2024-06-13 00:27:12.459533 daemon-err , nhrpd[29618]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 358 2024-06-13 00:27:12.459598 daemon-err , nhrpd[29618]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 358 2024-06-13 00:27:12.561190 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 359 2024-06-13 00:27:12.561541 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 359 2024-06-13 00:27:12.563110 daemon-err , nhrpd[29618]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 359 2024-06-13 00:27:12.563173 daemon-err , nhrpd[29618]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 359 2024-06-13 00:27:12.633705 daemon-err , nhrpd[29618]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 357 2024-06-13 00:27:12.633861 daemon-err , nhrpd[29618]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 357 2024-06-13 00:27:12.634401 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 357 2024-06-13 00:27:12.634464 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 357 2024-06-13 00:28:10.179281 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 361 2024-06-13 00:28:10.179377 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 361 2024-06-13 00:28:40.713562 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 362 2024-06-13 00:28:40.713672 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 362 2024-06-13 00:29:09.262456 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 363 2024-06-13 00:29:09.262547 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 363 2024-06-13 00:29:38.818376 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 365 2024-06-13 00:29:38.818462 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 365 2024-06-13 00:29:38.890212 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 364 2024-06-13 00:29:38.890308 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 364 2024-06-13 00:30:08.231723 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 367 2024-06-13 00:30:08.231791 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 367 2024-06-13 00:30:08.311526 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 366 2024-06-13 00:30:08.311623 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 366 2024-06-13 00:32:01.184571 daemon-err , zebra[1075]: [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down 2024-06-13 00:32:01.184655 daemon-err , zebra[1075]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=9330, pid=4257190499 2024-06-13 00:32:01.184824 daemon-err , zebra[1075]: [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (4055[if 373]) into the kernel 2024-06-13 00:32:01.316876 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 372 2024-06-13 00:32:01.316968 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 372 2024-06-13 00:32:29.468988 daemon-err , zebra[1075]: [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down 2024-06-13 00:32:29.469055 daemon-err , zebra[1075]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=9388, pid=4257190499 2024-06-13 00:32:29.469094 daemon-err , zebra[1075]: [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (4081[if 376]) into the kernel 2024-06-13 00:32:29.584687 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 375 2024-06-13 00:32:29.584775 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 375 2024-06-13 00:32:59.999013 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 378 2024-06-13 00:32:59.999233 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 378 2024-06-13 00:33:00.074838 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 379 2024-06-13 00:33:00.074959 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 379 2024-06-13 00:33:31.799905 daemon-err , zebra[1075]: [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down 2024-06-13 00:33:31.799980 daemon-err , zebra[1075]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=9538, pid=4257190499 2024-06-13 00:33:31.800146 daemon-err , zebra[1075]: [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (4128[if 383]) into the kernel 2024-06-13 00:33:31.965700 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 381 2024-06-13 00:33:31.965783 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 381 2024-06-13 00:33:32.045374 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 382 2024-06-13 00:33:32.045470 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 382 2024-06-13 00:34:57.224412 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 390 2024-06-13 00:34:57.224483 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 390 2024-06-13 00:34:57.304209 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 389 2024-06-13 00:34:57.304313 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 389 2024-06-13 00:35:17.762711 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 393 2024-06-13 00:35:17.762809 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 393 2024-06-13 00:35:17.846574 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 392 2024-06-13 00:35:17.846665 daemon-err , staticd[1080]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 392 2024-06-13 00:37:36.543259 daemon-err , cfgd[1122]: External python command [op.pki scep info CSR] finished with status 1 2024-06-13 00:37:56.671667 daemon-err , cfgd[1122]: External python command [op.pki scep info CSR] finished with status 1 2024-06-13 00:38:00.857915 user-err , scep_controller: Failed to get CA certificate for CSR 'CSR' 2024-06-13 00:38:45.447653 daemon-info , systemd[1]: Stopping System Logging Service... 2024-06-13 00:38:45.447928 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="2328" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-06-13 00:38:45.448725 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-06-13 00:38:45.449051 daemon-info , systemd[1]: Stopped System Logging Service. 2024-06-13 00:38:45.450339 daemon-info , systemd[1]: Starting System Logging Service... 2024-06-13 00:38:45.454094 syslog-info , rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-06-13 00:38:45.454164 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="9271" x-info="https://www.rsyslog.com"] start 2024-06-13 00:38:45.454255 daemon-info , systemd[1]: Started System Logging Service. 2024-06-13 00:38:45.456844 daemon-notice , cfgd[1122]: [17211]Completed change to active configuration 2024-06-13 00:38:45.459943 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2024-06-13 00:38:45.510192 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2024-06-13 00:38:45.718892 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog file systemd_msg set system syslog file systemd_msg level info set system syslog file systemd_msg app systemd
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output contains the following tokens:
systemd[1]: Started "DHCP Server Service instance main".Show output
2024-06-13 00:38:55.728607 daemon-info , systemd[1]: Stopping System Logging Service... 2024-06-13 00:38:55.729713 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-06-13 00:38:55.730002 daemon-info , systemd[1]: Stopped System Logging Service. 2024-06-13 00:38:55.731332 daemon-info , systemd[1]: Starting System Logging Service... 2024-06-13 00:38:55.735517 daemon-info , systemd[1]: Started System Logging Service. 2024-06-13 00:38:56.613772 daemon-info , systemd[1]: Started "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog file systemd_msg set system syslog file systemd_msg level info set system syslog file systemd_msg app systemd set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output contains the following tokens:
Started "DHCP Server Service instance main".Show output
2024-06-13 00:39:04.906975 daemon-info , systemd[1]: Stopping System Logging Service... 2024-06-13 00:39:04.908690 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-06-13 00:39:04.909083 daemon-info , systemd[1]: Stopped System Logging Service. 2024-06-13 00:39:04.914319 daemon-info , systemd[1]: Starting System Logging Service... 2024-06-13 00:39:04.914676 daemon-info , systemd[1]: Started System Logging Service. 2024-06-13 00:39:05.874999 daemon-info , systemd[1]: Started "DHCP Server Service instance main".
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set interfaces ethernet eth0 address 10.215.168.64/24
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.180 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.180/0.180/0.180/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-06-13T00:39:16.039233+00:00 10.215.168.64 2024-06-13T00:39:15.767969+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-06-13T00:39:16.039633+00:00 10.215.168.64 2024-06-13T00:39:15.768199+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="9979" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-06-13T00:39:16.039633+00:00 10.215.168.64 2024-06-13T00:39:15.768788+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-06-13T00:39:16.039644+00:00 10.215.168.64 2024-06-13T00:39:15.769180+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-06-13T00:39:16.039652+00:00 10.215.168.64 2024-06-13T00:39:15.771499+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-06-13T00:39:16.039660+00:00 10.215.168.64 2024-06-13T00:39:15.774125+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-06-13T00:39:16.039673+00:00 10.215.168.64 2024-06-13T00:39:15.774230+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10103" x-info="https://www.rsyslog.com"] start 2024-06-13T00:39:16.039681+00:00 10.215.168.64 2024-06-13T00:39:15.774317+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-06-13T00:39:16.040825+00:00 10.215.168.64 2024-06-13T00:39:15.775905+00:00 daemon-notice osdx cfgd[1122]: [17211]Completed change to active configuration 2024-06-13T00:39:16.044174+00:00 10.215.168.64 2024-06-13T00:39:15.779014+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-06-13T00:39:16.096398+00:00 10.215.168.64 2024-06-13T00:39:15.831395+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-06-13T00:39:16.302970+00:00 10.215.168.64 2024-06-13T00:39:16.037817+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-06-13T00:39:16.420810+00:00 10.215.168.64 2024-06-13T00:39:16.155640+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system syslog host 10.215.168.1 local-vrf VRF0 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than VRF0. PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.180 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.180/0.180/0.180/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-06-13T00:39:16.936403+00:00 10.215.168.64 2024-06-13T00:39:16.671148+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-06-13T00:39:17.219128+00:00 10.215.168.64 2024-06-13T00:39:16.953927+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-06-13T00:39:17.232696+00:00 10.215.168.64 2024-06-13T00:39:16.967477+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-06-13T00:39:18.603953+00:00 10.215.168.64 2024-06-13T00:39:18.338700+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-06-13T00:39:18.759358+00:00 10.215.168.64 2024-06-13T00:39:18.494138+00:00 daemon-warning osdx zebra[1075]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): 2024-06-13T00:39:19.208259+00:00 10.215.168.64 2024-06-13T00:39:18.943006+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-06-13T00:39:19.323995+00:00 10.215.168.64 2024-06-13T00:39:19.058677+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-06-13T00:39:19.443521+00:00 10.215.168.64 2024-06-13T00:39:19.178152+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-06-13T00:39:19.554139+00:00 10.215.168.64 2024-06-13T00:39:19.288882+00:00 daemon-warning osdx zebra[1075]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): 2024-06-13T00:39:24.524655+00:00 10.215.168.64 2024-06-13T00:39:23.985035+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-06-13T00:39:24.524655+00:00 10.215.168.64 2024-06-13T00:39:23.985227+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10225" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-06-13T00:39:24.524655+00:00 10.215.168.64 2024-06-13T00:39:23.986006+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-06-13T00:39:24.524655+00:00 10.215.168.64 2024-06-13T00:39:23.986066+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-06-13T00:39:24.524655+00:00 10.215.168.64 2024-06-13T00:39:23.987190+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-06-13T00:39:24.524655+00:00 10.215.168.64 2024-06-13T00:39:23.989897+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-06-13T00:39:24.524655+00:00 10.215.168.64 2024-06-13T00:39:23.989967+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-06-13T00:39:24.524655+00:00 10.215.168.64 2024-06-13T00:39:23.990027+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10378" x-info="https://www.rsyslog.com"] start 2024-06-13T00:39:24.524674+00:00 10.215.168.64 2024-06-13T00:39:23.991277+00:00 daemon-notice osdx cfgd[1122]: [17211]Completed change to active configuration 2024-06-13T00:39:24.527862+00:00 10.215.168.64 2024-06-13T00:39:23.994497+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-06-13T00:39:24.570339+00:00 10.215.168.64 2024-06-13T00:39:24.037013+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-06-13T00:39:24.976654+00:00 10.215.168.64 2024-06-13T00:39:24.443274+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2024-06-13T00:39:25.060461+00:00 10.215.168.64 2024-06-13T00:39:24.527057+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set interfaces ethernet eth0 address 10.215.168.64/24 set system syslog host 10.215.168.1 local-interface eth0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.173 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.173/0.173/0.173/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-06-13T00:39:25.543038+00:00 10.215.168.64 2024-06-13T00:39:25.009624+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-06-13T00:39:25.846435+00:00 10.215.168.64 2024-06-13T00:39:25.312989+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-06-13T00:39:25.858472+00:00 10.215.168.64 2024-06-13T00:39:25.325075+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-06-13T00:39:27.194906+00:00 10.215.168.64 2024-06-13T00:39:26.661409+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-06-13T00:39:27.824959+00:00 10.215.168.64 2024-06-13T00:39:27.291397+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-06-13T00:39:27.941288+00:00 10.215.168.64 2024-06-13T00:39:27.407732+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-06-13T00:39:28.056807+00:00 10.215.168.64 2024-06-13T00:39:27.523240+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-06-13T00:39:32.960717+00:00 10.215.168.64 2024-06-13T00:39:32.802780+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-06-13T00:39:32.960717+00:00 10.215.168.64 2024-06-13T00:39:32.803057+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10499" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-06-13T00:39:32.960717+00:00 10.215.168.64 2024-06-13T00:39:32.804382+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-06-13T00:39:32.960727+00:00 10.215.168.64 2024-06-13T00:39:32.804443+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-06-13T00:39:32.960746+00:00 10.215.168.64 2024-06-13T00:39:32.805531+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-06-13T00:39:32.960755+00:00 10.215.168.64 2024-06-13T00:39:32.808689+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-06-13T00:39:32.960755+00:00 10.215.168.64 2024-06-13T00:39:32.808788+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-06-13T00:39:32.961841+00:00 10.215.168.64 2024-06-13T00:39:32.809257+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10651" x-info="https://www.rsyslog.com"] start 2024-06-13T00:39:32.962292+00:00 10.215.168.64 2024-06-13T00:39:32.810305+00:00 daemon-notice osdx cfgd[1122]: [17211]Completed change to active configuration 2024-06-13T00:39:32.966276+00:00 10.215.168.64 2024-06-13T00:39:32.814010+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-06-13T00:39:33.007047+00:00 10.215.168.64 2024-06-13T00:39:32.855009+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-06-13T00:39:33.196059+00:00 10.215.168.64 2024-06-13T00:39:33.043906+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-06-13T00:39:33.295657+00:00 10.215.168.64 2024-06-13T00:39:33.143518+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca running://ca.crt set system syslog host 10.215.168.1 tls permittedPeer "Rsyslog-server" set interfaces ethernet eth0 address 10.215.168.64/24
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.211 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.211/0.211/0.211/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-06-13T00:39:33.760582+00:00 10.215.168.64 2024-06-13T00:39:33.608456+00:00 daemon-warning osdx zebra[1075]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): 2024-06-13T00:39:33.883461+00:00 10.215.168.64 2024-06-13T00:39:33.731357+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-06-13T00:39:34.225623+00:00 10.215.168.64 2024-06-13T00:39:34.073485+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-06-13T00:39:34.241030+00:00 10.215.168.64 2024-06-13T00:39:34.088898+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-06-13T00:39:34.555196+00:00 10.215.168.64 2024-06-13T00:39:34.403095+00:00 daemon-warning osdx zebra[1075]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): 2024-06-13T00:39:34.941516+00:00 10.215.168.64 2024-06-13T00:39:34.789270+00:00 daemon-warning osdx zebra[1075]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): 2024-06-13T00:39:34.941516+00:00 10.215.168.64 2024-06-13T00:39:34.789337+00:00 daemon-warning osdx zebra[1075]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): 2024-06-13T00:39:34.941516+00:00 10.215.168.64 2024-06-13T00:39:34.789375+00:00 daemon-warning osdx zebra[1075]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): 2024-06-13T00:39:35.739168+00:00 10.215.168.64 2024-06-13T00:39:35.586938+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-06-13T00:39:36.366825+00:00 10.215.168.64 2024-06-13T00:39:36.214556+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-06-13T00:39:36.490921+00:00 10.215.168.64 2024-06-13T00:39:36.338584+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-06-13T00:39:36.602382+00:00 10.215.168.64 2024-06-13T00:39:36.450054+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-06-13T00:39:42.275343+00:00 10.215.168.64 2024-06-13T00:39:41.205915+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-06-13T00:39:42.315972+00:00 10.215.168.64 2024-06-13T00:39:41.206392+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10772" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-06-13T00:39:42.315972+00:00 10.215.168.64 2024-06-13T00:39:41.206997+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-06-13T00:39:42.315972+00:00 10.215.168.64 2024-06-13T00:39:41.207278+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-06-13T00:39:42.315972+00:00 10.215.168.64 2024-06-13T00:39:41.208558+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-06-13T00:39:42.315972+00:00 10.215.168.64 2024-06-13T00:39:41.218499+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-06-13T00:39:42.315972+00:00 10.215.168.64 2024-06-13T00:39:41.218581+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10900" x-info="https://www.rsyslog.com"] start 2024-06-13T00:39:42.315972+00:00 10.215.168.64 2024-06-13T00:39:41.218651+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-06-13T00:39:42.315972+00:00 10.215.168.64 2024-06-13T00:39:41.220370+00:00 daemon-notice osdx cfgd[1122]: [17211]Completed change to active configuration 2024-06-13T00:39:42.315972+00:00 10.215.168.64 2024-06-13T00:39:41.223152+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-06-13T00:39:42.315972+00:00 10.215.168.64 2024-06-13T00:39:41.259930+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-06-13T00:39:42.315972+00:00 10.215.168.64 2024-06-13T00:39:41.447474+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-06-13T00:39:42.491734+00:00 10.215.168.64 2024-06-13T00:39:41.703367+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.