Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2024-10-10 08:29:41.423840 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF in VRF 156
2024-10-10 08:29:58.157240 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 160
2024-10-10 08:29:58.157320 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 160
2024-10-10 08:29:58.241024 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF in VRF 161
2024-10-10 08:29:58.241110 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF in VRF 161
2024-10-10 08:30:17.591047 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 167
2024-10-10 08:30:17.591151 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 167
2024-10-10 08:30:17.690600 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF3 in VRF 169
2024-10-10 08:30:17.690671 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF3 in VRF 169
2024-10-10 08:30:17.774660 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 166
2024-10-10 08:30:17.774747 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 166
2024-10-10 08:30:17.858636 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF4 in VRF 168
2024-10-10 08:30:17.858703 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF4 in VRF 168
2024-10-10 08:31:50.519757 daemon-err , ovpn-ovpn1[10388]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:32:05.011205 daemon-err , ovpn-ovpn1[10739]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:32:18.326926 daemon-err , ovpn-ovpn1[11096]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:32:32.348456 daemon-err , ovpn-ovpn1[11447]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:32:45.957223 daemon-err , ovpn-ovpn1[11798]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:32:59.248136 daemon-err , ovpn-ovpn1[12150]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:33:14.256410 daemon-err , ovpn-ovpn1[12509]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:33:28.565968 daemon-err , ovpn-ovpn1[12861]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:33:42.797716 daemon-err , ovpn-ovpn1[13213]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:33:55.710468 daemon-err , ovpn-ovpn1[13530]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:34:08.260188 daemon-err , ovpn-ovpn1[13822]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:34:20.743370 daemon-err , ovpn-ovpn1[14120]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:34:33.821080 daemon-err , ovpn-ovpn1[14415]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:34:40.250275 daemon-err , ovpn-ovpn1[14708]:  TCP: connect to [AF_INET]192.168.100.2:1194 failed: Connection refused
2024-10-10 08:34:52.270105 daemon-err , ovpn-ovpn1[14708]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:35:08.493055 daemon-err , ovpn-ovpn1[15066]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:35:08.767372 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 187
2024-10-10 08:35:08.767437 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 187
2024-10-10 08:35:22.927838 daemon-err , ovpn-ovpn1[15446]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:35:23.075127 daemon-err , ovpn-ovpn2[15471]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:35:37.179698 daemon-err , ovpn-ovpn1[15804]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:35:50.881903 daemon-err , ovpn-ovpn1[16110]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:36:02.170520 daemon-err , ovpn-ovpn1[16416]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:36:15.941314 daemon-err , ovpn-ovpn1[16725]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:36:28.828907 daemon-err , ovpn-ovpn1[17032]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:36:42.111362 daemon-err , ovpn-ovpn1[17345]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:36:56.138300 daemon-err , ovpn-ovpn1[17658]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:37:09.227774 daemon-err , ovpn-ovpn1[17969]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:37:22.627216 daemon-err , ovpn-ovpn1[18286]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:37:26.874661 daemon-err , cfgd[1328]:  Commit validation failed
2024-10-10 08:37:26.877516 daemon-err , cfgd[1328]:  [9484]Command output:#012[ interfaces openvpn ovpn1 mode p2p ]#012local-endpoint and remote-endpoint must be configured in p2p mode#012#012Commit validation failed#012
2024-10-10 08:37:27.832511 daemon-err , cfgd[1328]:  Commit validation failed
2024-10-10 08:37:27.835595 daemon-err , cfgd[1328]:  [9484]Command output:#012[ interfaces openvpn ovpn1 mode p2p ]#012local-endpoint must be an IPv4 address in p2p mode#012#012Commit validation failed#012
2024-10-10 08:37:28.882562 daemon-err , cfgd[1328]:  External python command [cfg.vpn.openvpn has_single_child interfaces openvpn ovpn1 peer] finished with status 1
2024-10-10 08:37:28.882631 daemon-err , cfgd[1328]:  Commit validation failed
2024-10-10 08:37:28.885494 daemon-err , cfgd[1328]:  [9484]Command output:#012[ interfaces openvpn ovpn1 mode p2p ]#012Only one peer allowed in p2p mode#012#012Commit validation failed#012
2024-10-10 08:37:29.963839 daemon-err , cfgd[1328]:  External python command [cfg.vpn.openvpn check_keepalive 10 1] finished with status 1
2024-10-10 08:37:29.963903 daemon-err , cfgd[1328]:  Commit validation failed
2024-10-10 08:37:29.965926 daemon-err , cfgd[1328]:  [9484]Command output:#012[ vpn openvpn tunnel-profile TNL keepalive timeout 1 ]#012timeout must be at least twice the value of interval#012#012Commit validation failed#012
2024-10-10 08:37:30.961630 daemon-err , cfgd[1328]:  Commit validation failed
2024-10-10 08:37:30.964324 daemon-err , cfgd[1328]:  [9484]Command output:#012[ interfaces openvpn ovpn1 mode p2p encryption-profile ENC ]#012Data channel encryption requires a static key in p2p mode#012#012Commit validation failed#012
2024-10-10 08:37:32.357080 daemon-err , cfgd[1328]:  External python command [cfg.vpn.openvpn has_single_child vpn openvpn encryption-profile ENC cipher] finished with status 1
2024-10-10 08:37:32.357162 daemon-err , cfgd[1328]:  Commit validation failed
2024-10-10 08:37:32.359915 daemon-err , cfgd[1328]:  [9484]Command output:#012[ vpn openvpn encryption-profile ENC cipher 2 algorithm none ]#012none is incompatible with other ciphers#012#012Commit validation failed#012
2024-10-10 08:37:33.624829 daemon-err , cfgd[1328]:  External python command [cfg.vpn.openvpn validate_p2p_ciphers ENC] finished with status 1
2024-10-10 08:37:33.624938 daemon-err , cfgd[1328]:  Commit validation failed
2024-10-10 08:37:33.627861 daemon-err , cfgd[1328]:  [9484]Command output:#012[ interfaces openvpn ovpn1 mode p2p encryption-profile ENC ]#012Cipher AES-256-OFB not available in p2p mode#012Commit validation failed#012
2024-10-10 08:37:35.179317 daemon-err , cfgd[1328]:  External python command [op.openvpn show_clients ovpn1] finished with status 1
2024-10-10 08:37:38.453706 daemon-err , ovpn-ovpn1[18748]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:37:52.383358 daemon-err , ovpn-ovpn1[19060]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:38:02.254915 daemon-err , ovpn-ovpn1[19407]:  192.168.100.2:1194 TLS Auth Error: Auth Username/Password verification failed for peer
2024-10-10 08:38:08.733432 daemon-err , ovpn-ovpn1[19407]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:38:51.053950 daemon-err , ovpn-ovpn1[19759]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:39:06.662202 daemon-err , ovpn-ovpn1[20145]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:39:15.815374 daemon-err , ovpn-ovpn1[20540]:  192.168.100.2:1194 TLS Auth Error: Auth Username/Password verification failed for peer
2024-10-10 08:39:20.895900 daemon-err , ovpn-ovpn1[20540]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:39:34.735934 daemon-err , ovpn-ovpn1[20930]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:39:43.129922 daemon-err , ovpn-ovpn1[21320]:  192.168.100.2:1194 TLS Auth Error: Auth Username/Password verification failed for peer
2024-10-10 08:39:49.277974 daemon-err , ovpn-ovpn1[21320]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:40:03.253022 daemon-err , ovpn-ovpn1[21659]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:40:16.453009 daemon-err , ovpn-ovpn1[21985]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:40:29.093910 daemon-err , ovpn-ovpn1[22296]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:40:43.030493 daemon-err , ovpn-ovpn1[22608]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:40:56.684805 daemon-err , ovpn-ovpn1[22919]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:41:10.255706 daemon-err , ovpn-ovpn1[23243]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:41:24.578867 daemon-err , ovpn-ovpn1[23566]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:41:38.909128 daemon-err , ovpn-ovpn1[23894]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:41:52.495927 daemon-err , ovpn-ovpn1[24211]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:42:02.655085 daemon-err , ovpn-ovpn1[24533]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:42:13.109632 daemon-err , ovpn-ovpn1[24630]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:42:19.681492 daemon-err , ovpn-ovpn1[24935]:  Client/192.168.100.2:1194 MULTI: client has been rejected due to 'disable' directive
2024-10-10 08:42:26.666242 daemon-err , ovpn-ovpn1[24935]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:42:41.302561 daemon-err , ovpn-ovpn1[25253]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:42:56.184756 daemon-err , ovpn-ovpn1[25577]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:43:07.933657 daemon-err , ovpn-ovpn1[25970]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:43:22.798245 daemon-err , ovpn-ovpn2[25942]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:43:38.722797 daemon-err , ovpn-ovpn1[26557]:  event_wait : Interrupted system call (code=4)
2024-10-10 08:43:44.073541 daemon-err , cfgd[1328]:  Commit validation failed
2024-10-10 08:43:44.076934 daemon-err , cfgd[1328]:  [9484]Command output:#012[ interfaces openvpn ovpn1 mode server ]#012local-endpoint must be configured in server mode#012#012Commit validation failed#012
2024-10-10 08:43:45.422921 daemon-err , cfgd[1328]:  Commit validation failed
2024-10-10 08:43:45.425392 daemon-err , cfgd[1328]:  [9484]Command output:#012[ interfaces openvpn ovpn1 mode server ]#012local-endpoint must be an IPv4 subnet in server mode#012#012Commit validation failed#012
2024-10-10 08:43:46.573295 daemon-err , cfgd[1328]:  [9484]Command output:#012Subnet prefix length must be between 16 and 29#012Value validation failed#012
2024-10-10 08:43:47.818793 daemon-err , cfgd[1328]:  [9484]Command output:#012Subnet prefix length must be between 16 and 29#012Value validation failed#012
2024-10-10 08:43:49.145086 daemon-err , cfgd[1328]:  Commit validation failed
2024-10-10 08:43:49.147504 daemon-err , cfgd[1328]:  [9484]Command output:#012[ interfaces openvpn ovpn1 mode server ]#012tcp-client protocol not available in server mode#012#012Commit validation failed#012
2024-10-10 08:43:50.678227 daemon-err , cfgd[1328]:  Commit validation failed
2024-10-10 08:43:50.681541 daemon-err , cfgd[1328]:  [9484]Command output:#012[ interfaces openvpn ovpn1 mode server ]#012Peer parameters not available in server mode#012#012Commit validation failed#012
2024-10-10 08:43:52.191228 daemon-err , cfgd[1328]:  Commit validation failed
2024-10-10 08:43:52.193429 daemon-err , cfgd[1328]:  [9484]Command output:#012[ vpn openvpn tls-profile TLS auth ]#012crypt and auth are mutually exclusive#012#012Commit validation failed#012
2024-10-10 08:47:00.152750 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF SEG in VRF 231
2024-10-10 08:47:00.152848 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF SEG in VRF 231
2024-10-10 08:47:00.244771 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 230
2024-10-10 08:47:00.244845 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 230
2024-10-10 08:47:00.332767 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF AP in VRF 229
2024-10-10 08:47:00.332835 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF AP in VRF 229
2024-10-10 08:48:13.535558 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 237
2024-10-10 08:48:13.535646 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 237
2024-10-10 08:48:13.620736 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL1 in VRF 236
2024-10-10 08:48:13.620822 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL1 in VRF 236
2024-10-10 08:48:34.605050 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL2 in VRF 240
2024-10-10 08:48:34.605140 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL2 in VRF 240
2024-10-10 08:48:34.686661 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL1 in VRF 239
2024-10-10 08:48:34.686771 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL1 in VRF 239
2024-10-10 08:48:34.773964 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 241
2024-10-10 08:48:34.774047 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 241
2024-10-10 08:49:55.466368 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 248
2024-10-10 08:49:55.466453 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 248
2024-10-10 08:49:55.550252 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 249
2024-10-10 08:49:55.550338 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 249
2024-10-10 08:51:05.022812 daemon-err , nhrpd[3334]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-10-10 08:51:05.105901 daemon-err , nhrpd[3334]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-10-10 08:51:05.538937 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 255
2024-10-10 08:51:05.539207 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 255
2024-10-10 08:51:05.539712 daemon-err , nhrpd[3334]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 255
2024-10-10 08:51:05.539751 daemon-err , nhrpd[3334]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 255
2024-10-10 08:51:05.611664 daemon-err , nhrpd[3334]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 256
2024-10-10 08:51:05.611707 daemon-err , nhrpd[3334]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 256
2024-10-10 08:51:05.611790 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 256
2024-10-10 08:51:05.611835 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 256
2024-10-10 08:51:36.480199 daemon-err , nhrpd[4137]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-10-10 08:51:36.590955 daemon-err , nhrpd[4137]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-10-10 08:51:37.074869 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 261
2024-10-10 08:51:37.074960 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 261
2024-10-10 08:51:37.075708 daemon-err , nhrpd[4137]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 261
2024-10-10 08:51:37.075762 daemon-err , nhrpd[4137]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 261
2024-10-10 08:51:37.138949 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 262
2024-10-10 08:51:37.139168 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 262
2024-10-10 08:51:37.139808 daemon-err , nhrpd[4137]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 262
2024-10-10 08:51:37.139860 daemon-err , nhrpd[4137]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 262
2024-10-10 08:52:11.096136 daemon-err , nhrpd[4986]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-10-10 08:52:11.174744 daemon-err , nhrpd[4986]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-10-10 08:52:11.426818 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 268
2024-10-10 08:52:11.427050 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 268
2024-10-10 08:52:11.427616 daemon-err , nhrpd[4986]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 268
2024-10-10 08:52:11.427689 daemon-err , nhrpd[4986]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 268
2024-10-10 08:52:11.498519 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 267
2024-10-10 08:52:11.498974 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 267
2024-10-10 08:52:11.499284 daemon-err , nhrpd[4986]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 267
2024-10-10 08:52:11.499323 daemon-err , nhrpd[4986]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 267
2024-10-10 08:52:39.825085 daemon-err , nhrpd[5794]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-10-10 08:52:39.895104 daemon-err , nhrpd[5794]:  [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found
2024-10-10 08:52:40.140173 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 272
2024-10-10 08:52:40.140242 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 272
2024-10-10 08:52:40.140859 daemon-err , nhrpd[5794]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 272
2024-10-10 08:52:40.140896 daemon-err , nhrpd[5794]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 272
2024-10-10 08:52:40.228114 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 271
2024-10-10 08:52:40.228209 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 271
2024-10-10 08:52:40.228914 daemon-err , nhrpd[5794]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 271
2024-10-10 08:52:40.228966 daemon-err , nhrpd[5794]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 271
2024-10-10 08:55:25.123243 authpriv-err , login[10665]:  pam_tally2(login:auth): pam_get_uid; no such user
2024-10-10 08:55:28.472305 authpriv-err , login[10665]:  pam_tally2(login:auth): pam_get_uid; no such user
2024-10-10 08:55:32.358024 authpriv-err , login[10740]:  pam_tally2(login:auth): pam_get_uid; no such user
2024-10-10 08:55:35.638090 authpriv-err , login[10740]:  pam_tally2(login:auth): pam_get_uid; no such user
2024-10-10 08:55:38.074068 authpriv-err , login[10740]:  pam_tally2(login:auth): pam_get_uid; no such user
2024-10-10 08:55:41.076602 authpriv-err , login[10740]:  pam_mail(login:session): user unknown
2024-10-10 08:58:07.598832 authpriv-err , login[12011]:  pam_mail(login:session): pam_putenv: delete non-existent entry; MAIL
2024-10-10 09:01:11.229981 user-err , OSDxCLI:  #033[31m#012Session idle timeout reached. Closing session#033[0m
2024-10-10 09:01:36.064244 user-err , OSDxCLI:  #033[31m#012Session idle timeout reached. Closing session#033[0m
2024-10-10 09:01:59.718535 user-err , OSDxCLI:  #033[31m#012Session idle timeout reached. Closing session#033[0m
2024-10-10 09:03:21.236174 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 279
2024-10-10 09:03:21.236264 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 279
2024-10-10 09:03:52.098629 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 280
2024-10-10 09:03:52.098718 daemon-err , staticd[1286]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 280
2024-10-10 09:04:36.635068 daemon-err , cfgd[1328]:  External python command [cfg.auto_scripts process ADVISOR1 SCRIPT_1 true] finished with status 1
2024-10-10 09:05:24.011150 user-err , ERROR:  `system script SCRIPT_1` validation error
2024-10-10 09:05:24.011227 user-err , ERROR:  "Configuration path: [potato] is not valid"
2024-10-10 09:05:24.011445 daemon-err , cfgd[1328]:  [15783]Command output:#012Value validation failed#012
2024-10-10 09:05:24.401410 user-err , ERROR:  `system script SCRIPT_1` validation error
2024-10-10 09:05:24.401619 user-err , ERROR:  system potato: Invalid operational command.
2024-10-10 09:05:24.402170 daemon-err , cfgd[1328]:  [15783]Command output:#012Value validation failed#012
2024-10-10 09:05:32.863634 daemon-err , cfgd[1328]:  [ service dhcp-server ]
2024-10-10 09:05:32.863727 daemon-err , cfgd[1328]:  \"shared-network\" configuration is required
2024-10-10 09:05:32.863807 daemon-err , cfgd[1328]:  Commit validation failed
2024-10-10 09:05:32.866536 daemon-err , cfgd[1328]:  [21489]Command output:#012[ service dhcp-server ]#012\"shared-network\" configuration is required#012Commit validation failed#012
2024-10-10 09:05:32.872790 daemon-err , cfgd[1328]:  External python command [cfg.auto_scripts execute_script SCRIPT_1] finished with status 1
2024-10-10 09:05:46.086978 daemon-info , systemd[1]:  Stopping System Logging Service...
2024-10-10 09:05:46.088106 syslog-info , rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="6258" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-10-10 09:05:46.088732 daemon-info , systemd[1]:  rsyslog.service: Succeeded.
2024-10-10 09:05:46.089020 daemon-info , systemd[1]:  Stopped System Logging Service.
2024-10-10 09:05:46.090470 daemon-info , systemd[1]:  Starting System Logging Service...
2024-10-10 09:05:46.094130 syslog-info , rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-10-10 09:05:46.094344 daemon-notice , cfgd[1328]:  [15783]Completed change to active configuration
2024-10-10 09:05:46.094416 daemon-info , systemd[1]:  Started System Logging Service.
2024-10-10 09:05:46.094470 syslog-info , rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="21911" x-info="https://www.rsyslog.com"] start
2024-10-10 09:05:46.097866 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2024-10-10 09:05:46.136133 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2024-10-10 09:05:46.286584 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog file systemd_msg
set system syslog file systemd_msg level info
set system syslog file systemd_msg app systemd

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output contains the following tokens:

systemd[1]:  Started "DHCP Server Service instance main".
Show output
2024-10-10 09:05:54.459832 daemon-info , systemd[1]:  Stopping System Logging Service...
2024-10-10 09:05:54.460851 daemon-info , systemd[1]:  rsyslog.service: Succeeded.
2024-10-10 09:05:54.461237 daemon-info , systemd[1]:  Stopped System Logging Service.
2024-10-10 09:05:54.462945 daemon-info , systemd[1]:  Starting System Logging Service...
2024-10-10 09:05:54.465485 daemon-info , systemd[1]:  Started System Logging Service.
2024-10-10 09:05:55.202622 daemon-info , systemd[1]:  Started "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog file systemd_msg
set system syslog file systemd_msg level info
set system syslog file systemd_msg app systemd
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output contains the following tokens:

Started "DHCP Server Service instance main".
Show output
2024-10-10 09:06:03.522208 daemon-info , systemd[1]:  Stopping System Logging Service...
2024-10-10 09:06:03.523310 daemon-info , systemd[1]:  rsyslog.service: Succeeded.
2024-10-10 09:06:03.523704 daemon-info , systemd[1]:  Stopped System Logging Service.
2024-10-10 09:06:03.525206 daemon-info , systemd[1]:  Starting System Logging Service...
2024-10-10 09:06:03.528628 daemon-info , systemd[1]:  Started System Logging Service.
2024-10-10 09:06:04.195747 daemon-info , systemd[1]:  Started "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set interfaces ethernet eth0 address 10.215.168.64/24

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.211 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.211/0.211/0.211/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server {log_file} file and read the {log_msg} log message:

Show output
2024-10-10T09:06:13.315509+00:00 10.215.168.64  2024-10-10T09:06:12.572326+00:00 daemon-info osdx systemd[1]:  Stopping System Logging Service...
2024-10-10T09:06:13.315509+00:00 10.215.168.64  2024-10-10T09:06:12.572561+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="22619" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-10-10T09:06:13.315509+00:00 10.215.168.64  2024-10-10T09:06:12.573281+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Succeeded.
2024-10-10T09:06:13.315509+00:00 10.215.168.64  2024-10-10T09:06:12.573692+00:00 daemon-info osdx systemd[1]:  Stopped System Logging Service.
2024-10-10T09:06:13.315509+00:00 10.215.168.64  2024-10-10T09:06:12.576059+00:00 daemon-info osdx systemd[1]:  Starting System Logging Service...
2024-10-10T09:06:13.315509+00:00 10.215.168.64  2024-10-10T09:06:12.578473+00:00 daemon-info osdx systemd[1]:  Started System Logging Service.
2024-10-10T09:06:13.315509+00:00 10.215.168.64  2024-10-10T09:06:12.579290+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-10-10T09:06:13.315644+00:00 10.215.168.64  2024-10-10T09:06:12.579484+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="22743" x-info="https://www.rsyslog.com"] start
2024-10-10T09:06:13.316895+00:00 10.215.168.64  2024-10-10T09:06:12.580793+00:00 daemon-notice osdx cfgd[1328]:  [15783]Completed change to active configuration
2024-10-10T09:06:13.320874+00:00 10.215.168.64  2024-10-10T09:06:12.584415+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-10-10T09:06:13.347719+00:00 10.215.168.64  2024-10-10T09:06:12.611576+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-10-10T09:06:13.536571+00:00 10.215.168.64  2024-10-10T09:06:12.800419+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-10-10T09:06:13.625330+00:00 10.215.168.64  2024-10-10T09:06:12.889128+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system syslog host 10.215.168.1 local-vrf VRF0
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than VRF0.
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.301 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.301/0.301/0.301/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server {log_file} file and read the {log_msg} log message:

Show output
2024-10-10T09:06:14.120009+00:00 10.215.168.64  2024-10-10T09:06:13.383761+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-10-10T09:06:14.149129+00:00 10.215.168.64  2024-10-10T09:06:13.412865+00:00 daemon-warning osdx zebra[1281]:  [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]):
2024-10-10T09:06:14.417794+00:00 10.215.168.64  2024-10-10T09:06:13.681599+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-10-10T09:06:14.429182+00:00 10.215.168.64  2024-10-10T09:06:13.692945+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-10-10T09:06:15.817453+00:00 10.215.168.64  2024-10-10T09:06:15.081270+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-10-10T09:06:15.990261+00:00 10.215.168.64  2024-10-10T09:06:15.254008+00:00 daemon-warning osdx zebra[1281]:  [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]):
2024-10-10T09:06:16.404437+00:00 10.215.168.64  2024-10-10T09:06:15.668189+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-10-10T09:06:16.523756+00:00 10.215.168.64  2024-10-10T09:06:15.787534+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-10-10T09:06:16.645815+00:00 10.215.168.64  2024-10-10T09:06:15.909579+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-10-10T09:06:21.720980+00:00 10.215.168.64  2024-10-10T09:06:20.966968+00:00 daemon-info osdx systemd[1]:  Stopping System Logging Service...
2024-10-10T09:06:21.720980+00:00 10.215.168.64  2024-10-10T09:06:20.967172+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="22864" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-10-10T09:06:21.720980+00:00 10.215.168.64  2024-10-10T09:06:20.968026+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Succeeded.
2024-10-10T09:06:21.720980+00:00 10.215.168.64  2024-10-10T09:06:20.968086+00:00 daemon-info osdx systemd[1]:  Stopped System Logging Service.
2024-10-10T09:06:21.721000+00:00 10.215.168.64  2024-10-10T09:06:20.969249+00:00 daemon-info osdx systemd[1]:  Starting System Logging Service...
2024-10-10T09:06:21.721000+00:00 10.215.168.64  2024-10-10T09:06:20.972822+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-10-10T09:06:21.721000+00:00 10.215.168.64  2024-10-10T09:06:20.972905+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="23016" x-info="https://www.rsyslog.com"] start
2024-10-10T09:06:21.721028+00:00 10.215.168.64  2024-10-10T09:06:20.972963+00:00 daemon-info osdx systemd[1]:  Started System Logging Service.
2024-10-10T09:06:21.721037+00:00 10.215.168.64  2024-10-10T09:06:20.974106+00:00 daemon-notice osdx cfgd[1328]:  [15783]Completed change to active configuration
2024-10-10T09:06:21.724112+00:00 10.215.168.64  2024-10-10T09:06:20.977406+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-10-10T09:06:21.751090+00:00 10.215.168.64  2024-10-10T09:06:21.004401+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-10-10T09:06:22.047517+00:00 10.215.168.64  2024-10-10T09:06:21.300730+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1  vrf VRF0    count 1 size 56 timeout 1'.
2024-10-10T09:06:22.128192+00:00 10.215.168.64  2024-10-10T09:06:21.381457+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set interfaces ethernet eth0 address 10.215.168.64/24
set system syslog host 10.215.168.1 local-interface eth0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.173 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.173/0.173/0.173/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server {log_file} file and read the {log_msg} log message:

Show output
2024-10-10T09:06:22.651656+00:00 10.215.168.64  2024-10-10T09:06:21.904806+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-10-10T09:06:22.964286+00:00 10.215.168.64  2024-10-10T09:06:22.217576+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-10-10T09:06:22.976893+00:00 10.215.168.64  2024-10-10T09:06:22.230196+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-10-10T09:06:24.491712+00:00 10.215.168.64  2024-10-10T09:06:23.744968+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-10-10T09:06:24.868639+00:00 10.215.168.64  2024-10-10T09:06:24.121872+00:00 daemon-warning osdx zebra[1281]:  [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]):
2024-10-10T09:06:25.137594+00:00 10.215.168.64  2024-10-10T09:06:24.390841+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-10-10T09:06:25.267250+00:00 10.215.168.64  2024-10-10T09:06:24.520455+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-10-10T09:06:25.383945+00:00 10.215.168.64  2024-10-10T09:06:24.637158+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-10-10T09:06:30.093711+00:00 10.215.168.64  2024-10-10T09:06:29.533147+00:00 daemon-info osdx systemd[1]:  Stopping System Logging Service...
2024-10-10T09:06:30.093711+00:00 10.215.168.64  2024-10-10T09:06:29.533471+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="23137" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-10-10T09:06:30.093711+00:00 10.215.168.64  2024-10-10T09:06:29.534525+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Succeeded.
2024-10-10T09:06:30.093730+00:00 10.215.168.64  2024-10-10T09:06:29.534940+00:00 daemon-info osdx systemd[1]:  Stopped System Logging Service.
2024-10-10T09:06:30.093742+00:00 10.215.168.64  2024-10-10T09:06:29.536796+00:00 daemon-info osdx systemd[1]:  Starting System Logging Service...
2024-10-10T09:06:30.093920+00:00 10.215.168.64  2024-10-10T09:06:29.539390+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-10-10T09:06:30.093930+00:00 10.215.168.64  2024-10-10T09:06:29.539479+00:00 daemon-info osdx systemd[1]:  Started System Logging Service.
2024-10-10T09:06:30.093944+00:00 10.215.168.64  2024-10-10T09:06:29.539586+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="23291" x-info="https://www.rsyslog.com"] start
2024-10-10T09:06:30.095272+00:00 10.215.168.64  2024-10-10T09:06:29.540944+00:00 daemon-notice osdx cfgd[1328]:  [15783]Completed change to active configuration
2024-10-10T09:06:30.098092+00:00 10.215.168.64  2024-10-10T09:06:29.543548+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-10-10T09:06:30.145389+00:00 10.215.168.64  2024-10-10T09:06:29.591086+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-10-10T09:06:30.345840+00:00 10.215.168.64  2024-10-10T09:06:29.791469+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-10-10T09:06:30.443888+00:00 10.215.168.64  2024-10-10T09:06:29.889418+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca running://ca.crt
set system syslog host 10.215.168.1 tls permittedPeer "rsyslog.server.com"
set interfaces ethernet eth0 address 10.215.168.64/24

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.201 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.201/0.201/0.201/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server {log_file} file and read the {log_msg} log message:

Show output
2024-10-10T09:06:30.904243+00:00 10.215.168.64  2024-10-10T09:06:30.343925+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-10-10T09:06:30.990302+00:00 10.215.168.64  2024-10-10T09:06:30.435943+00:00 daemon-warning osdx zebra[1281]:  [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]):
2024-10-10T09:06:31.225254+00:00 10.215.168.64  2024-10-10T09:06:30.670922+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-10-10T09:06:31.237729+00:00 10.215.168.64  2024-10-10T09:06:30.683268+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-10-10T09:06:32.561179+00:00 10.215.168.64  2024-10-10T09:06:32.006782+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-10-10T09:06:33.248895+00:00 10.215.168.64  2024-10-10T09:06:32.694478+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-10-10T09:06:33.370232+00:00 10.215.168.64  2024-10-10T09:06:32.815855+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-10-10T09:06:33.491983+00:00 10.215.168.64  2024-10-10T09:06:32.937575+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-10-10T09:06:38.678870+00:00 10.215.168.64  2024-10-10T09:06:37.872412+00:00 daemon-info osdx systemd[1]:  Stopping System Logging Service...
2024-10-10T09:06:38.678870+00:00 10.215.168.64  2024-10-10T09:06:37.872666+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="23412" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-10-10T09:06:38.678870+00:00 10.215.168.64  2024-10-10T09:06:37.872914+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Succeeded.
2024-10-10T09:06:38.678870+00:00 10.215.168.64  2024-10-10T09:06:37.873302+00:00 daemon-info osdx systemd[1]:  Stopped System Logging Service.
2024-10-10T09:06:38.678870+00:00 10.215.168.64  2024-10-10T09:06:37.875700+00:00 daemon-info osdx systemd[1]:  Starting System Logging Service...
2024-10-10T09:06:38.678870+00:00 10.215.168.64  2024-10-10T09:06:37.885155+00:00 daemon-info osdx systemd[1]:  Started System Logging Service.
2024-10-10T09:06:38.678899+00:00 10.215.168.64  2024-10-10T09:06:37.885904+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-10-10T09:06:38.678899+00:00 10.215.168.64  2024-10-10T09:06:37.885995+00:00 syslog-info osdx rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="23540" x-info="https://www.rsyslog.com"] start
2024-10-10T09:06:38.678899+00:00 10.215.168.64  2024-10-10T09:06:37.887468+00:00 daemon-notice osdx cfgd[1328]:  [15783]Completed change to active configuration
2024-10-10T09:06:38.678899+00:00 10.215.168.64  2024-10-10T09:06:37.890908+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-10-10T09:06:38.678899+00:00 10.215.168.64  2024-10-10T09:06:37.922116+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-10-10T09:06:38.724762+00:00 10.215.168.64  2024-10-10T09:06:38.102445+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-10-10T09:06:38.968907+00:00 10.215.168.64  2024-10-10T09:06:38.346587+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.