Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2024-10-10 08:29:41.423840 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF in VRF 156 2024-10-10 08:29:58.157240 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 160 2024-10-10 08:29:58.157320 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 160 2024-10-10 08:29:58.241024 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF in VRF 161 2024-10-10 08:29:58.241110 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF in VRF 161 2024-10-10 08:30:17.591047 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 167 2024-10-10 08:30:17.591151 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 167 2024-10-10 08:30:17.690600 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF3 in VRF 169 2024-10-10 08:30:17.690671 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF3 in VRF 169 2024-10-10 08:30:17.774660 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 166 2024-10-10 08:30:17.774747 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 166 2024-10-10 08:30:17.858636 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF4 in VRF 168 2024-10-10 08:30:17.858703 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF4 in VRF 168 2024-10-10 08:31:50.519757 daemon-err , ovpn-ovpn1[10388]: event_wait : Interrupted system call (code=4) 2024-10-10 08:32:05.011205 daemon-err , ovpn-ovpn1[10739]: event_wait : Interrupted system call (code=4) 2024-10-10 08:32:18.326926 daemon-err , ovpn-ovpn1[11096]: event_wait : Interrupted system call (code=4) 2024-10-10 08:32:32.348456 daemon-err , ovpn-ovpn1[11447]: event_wait : Interrupted system call (code=4) 2024-10-10 08:32:45.957223 daemon-err , ovpn-ovpn1[11798]: event_wait : Interrupted system call (code=4) 2024-10-10 08:32:59.248136 daemon-err , ovpn-ovpn1[12150]: event_wait : Interrupted system call (code=4) 2024-10-10 08:33:14.256410 daemon-err , ovpn-ovpn1[12509]: event_wait : Interrupted system call (code=4) 2024-10-10 08:33:28.565968 daemon-err , ovpn-ovpn1[12861]: event_wait : Interrupted system call (code=4) 2024-10-10 08:33:42.797716 daemon-err , ovpn-ovpn1[13213]: event_wait : Interrupted system call (code=4) 2024-10-10 08:33:55.710468 daemon-err , ovpn-ovpn1[13530]: event_wait : Interrupted system call (code=4) 2024-10-10 08:34:08.260188 daemon-err , ovpn-ovpn1[13822]: event_wait : Interrupted system call (code=4) 2024-10-10 08:34:20.743370 daemon-err , ovpn-ovpn1[14120]: event_wait : Interrupted system call (code=4) 2024-10-10 08:34:33.821080 daemon-err , ovpn-ovpn1[14415]: event_wait : Interrupted system call (code=4) 2024-10-10 08:34:40.250275 daemon-err , ovpn-ovpn1[14708]: TCP: connect to [AF_INET]192.168.100.2:1194 failed: Connection refused 2024-10-10 08:34:52.270105 daemon-err , ovpn-ovpn1[14708]: event_wait : Interrupted system call (code=4) 2024-10-10 08:35:08.493055 daemon-err , ovpn-ovpn1[15066]: event_wait : Interrupted system call (code=4) 2024-10-10 08:35:08.767372 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 187 2024-10-10 08:35:08.767437 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 187 2024-10-10 08:35:22.927838 daemon-err , ovpn-ovpn1[15446]: event_wait : Interrupted system call (code=4) 2024-10-10 08:35:23.075127 daemon-err , ovpn-ovpn2[15471]: event_wait : Interrupted system call (code=4) 2024-10-10 08:35:37.179698 daemon-err , ovpn-ovpn1[15804]: event_wait : Interrupted system call (code=4) 2024-10-10 08:35:50.881903 daemon-err , ovpn-ovpn1[16110]: event_wait : Interrupted system call (code=4) 2024-10-10 08:36:02.170520 daemon-err , ovpn-ovpn1[16416]: event_wait : Interrupted system call (code=4) 2024-10-10 08:36:15.941314 daemon-err , ovpn-ovpn1[16725]: event_wait : Interrupted system call (code=4) 2024-10-10 08:36:28.828907 daemon-err , ovpn-ovpn1[17032]: event_wait : Interrupted system call (code=4) 2024-10-10 08:36:42.111362 daemon-err , ovpn-ovpn1[17345]: event_wait : Interrupted system call (code=4) 2024-10-10 08:36:56.138300 daemon-err , ovpn-ovpn1[17658]: event_wait : Interrupted system call (code=4) 2024-10-10 08:37:09.227774 daemon-err , ovpn-ovpn1[17969]: event_wait : Interrupted system call (code=4) 2024-10-10 08:37:22.627216 daemon-err , ovpn-ovpn1[18286]: event_wait : Interrupted system call (code=4) 2024-10-10 08:37:26.874661 daemon-err , cfgd[1328]: Commit validation failed 2024-10-10 08:37:26.877516 daemon-err , cfgd[1328]: [9484]Command output:#012[ interfaces openvpn ovpn1 mode p2p ]#012local-endpoint and remote-endpoint must be configured in p2p mode#012#012Commit validation failed#012 2024-10-10 08:37:27.832511 daemon-err , cfgd[1328]: Commit validation failed 2024-10-10 08:37:27.835595 daemon-err , cfgd[1328]: [9484]Command output:#012[ interfaces openvpn ovpn1 mode p2p ]#012local-endpoint must be an IPv4 address in p2p mode#012#012Commit validation failed#012 2024-10-10 08:37:28.882562 daemon-err , cfgd[1328]: External python command [cfg.vpn.openvpn has_single_child interfaces openvpn ovpn1 peer] finished with status 1 2024-10-10 08:37:28.882631 daemon-err , cfgd[1328]: Commit validation failed 2024-10-10 08:37:28.885494 daemon-err , cfgd[1328]: [9484]Command output:#012[ interfaces openvpn ovpn1 mode p2p ]#012Only one peer allowed in p2p mode#012#012Commit validation failed#012 2024-10-10 08:37:29.963839 daemon-err , cfgd[1328]: External python command [cfg.vpn.openvpn check_keepalive 10 1] finished with status 1 2024-10-10 08:37:29.963903 daemon-err , cfgd[1328]: Commit validation failed 2024-10-10 08:37:29.965926 daemon-err , cfgd[1328]: [9484]Command output:#012[ vpn openvpn tunnel-profile TNL keepalive timeout 1 ]#012timeout must be at least twice the value of interval#012#012Commit validation failed#012 2024-10-10 08:37:30.961630 daemon-err , cfgd[1328]: Commit validation failed 2024-10-10 08:37:30.964324 daemon-err , cfgd[1328]: [9484]Command output:#012[ interfaces openvpn ovpn1 mode p2p encryption-profile ENC ]#012Data channel encryption requires a static key in p2p mode#012#012Commit validation failed#012 2024-10-10 08:37:32.357080 daemon-err , cfgd[1328]: External python command [cfg.vpn.openvpn has_single_child vpn openvpn encryption-profile ENC cipher] finished with status 1 2024-10-10 08:37:32.357162 daemon-err , cfgd[1328]: Commit validation failed 2024-10-10 08:37:32.359915 daemon-err , cfgd[1328]: [9484]Command output:#012[ vpn openvpn encryption-profile ENC cipher 2 algorithm none ]#012none is incompatible with other ciphers#012#012Commit validation failed#012 2024-10-10 08:37:33.624829 daemon-err , cfgd[1328]: External python command [cfg.vpn.openvpn validate_p2p_ciphers ENC] finished with status 1 2024-10-10 08:37:33.624938 daemon-err , cfgd[1328]: Commit validation failed 2024-10-10 08:37:33.627861 daemon-err , cfgd[1328]: [9484]Command output:#012[ interfaces openvpn ovpn1 mode p2p encryption-profile ENC ]#012Cipher AES-256-OFB not available in p2p mode#012Commit validation failed#012 2024-10-10 08:37:35.179317 daemon-err , cfgd[1328]: External python command [op.openvpn show_clients ovpn1] finished with status 1 2024-10-10 08:37:38.453706 daemon-err , ovpn-ovpn1[18748]: event_wait : Interrupted system call (code=4) 2024-10-10 08:37:52.383358 daemon-err , ovpn-ovpn1[19060]: event_wait : Interrupted system call (code=4) 2024-10-10 08:38:02.254915 daemon-err , ovpn-ovpn1[19407]: 192.168.100.2:1194 TLS Auth Error: Auth Username/Password verification failed for peer 2024-10-10 08:38:08.733432 daemon-err , ovpn-ovpn1[19407]: event_wait : Interrupted system call (code=4) 2024-10-10 08:38:51.053950 daemon-err , ovpn-ovpn1[19759]: event_wait : Interrupted system call (code=4) 2024-10-10 08:39:06.662202 daemon-err , ovpn-ovpn1[20145]: event_wait : Interrupted system call (code=4) 2024-10-10 08:39:15.815374 daemon-err , ovpn-ovpn1[20540]: 192.168.100.2:1194 TLS Auth Error: Auth Username/Password verification failed for peer 2024-10-10 08:39:20.895900 daemon-err , ovpn-ovpn1[20540]: event_wait : Interrupted system call (code=4) 2024-10-10 08:39:34.735934 daemon-err , ovpn-ovpn1[20930]: event_wait : Interrupted system call (code=4) 2024-10-10 08:39:43.129922 daemon-err , ovpn-ovpn1[21320]: 192.168.100.2:1194 TLS Auth Error: Auth Username/Password verification failed for peer 2024-10-10 08:39:49.277974 daemon-err , ovpn-ovpn1[21320]: event_wait : Interrupted system call (code=4) 2024-10-10 08:40:03.253022 daemon-err , ovpn-ovpn1[21659]: event_wait : Interrupted system call (code=4) 2024-10-10 08:40:16.453009 daemon-err , ovpn-ovpn1[21985]: event_wait : Interrupted system call (code=4) 2024-10-10 08:40:29.093910 daemon-err , ovpn-ovpn1[22296]: event_wait : Interrupted system call (code=4) 2024-10-10 08:40:43.030493 daemon-err , ovpn-ovpn1[22608]: event_wait : Interrupted system call (code=4) 2024-10-10 08:40:56.684805 daemon-err , ovpn-ovpn1[22919]: event_wait : Interrupted system call (code=4) 2024-10-10 08:41:10.255706 daemon-err , ovpn-ovpn1[23243]: event_wait : Interrupted system call (code=4) 2024-10-10 08:41:24.578867 daemon-err , ovpn-ovpn1[23566]: event_wait : Interrupted system call (code=4) 2024-10-10 08:41:38.909128 daemon-err , ovpn-ovpn1[23894]: event_wait : Interrupted system call (code=4) 2024-10-10 08:41:52.495927 daemon-err , ovpn-ovpn1[24211]: event_wait : Interrupted system call (code=4) 2024-10-10 08:42:02.655085 daemon-err , ovpn-ovpn1[24533]: event_wait : Interrupted system call (code=4) 2024-10-10 08:42:13.109632 daemon-err , ovpn-ovpn1[24630]: event_wait : Interrupted system call (code=4) 2024-10-10 08:42:19.681492 daemon-err , ovpn-ovpn1[24935]: Client/192.168.100.2:1194 MULTI: client has been rejected due to 'disable' directive 2024-10-10 08:42:26.666242 daemon-err , ovpn-ovpn1[24935]: event_wait : Interrupted system call (code=4) 2024-10-10 08:42:41.302561 daemon-err , ovpn-ovpn1[25253]: event_wait : Interrupted system call (code=4) 2024-10-10 08:42:56.184756 daemon-err , ovpn-ovpn1[25577]: event_wait : Interrupted system call (code=4) 2024-10-10 08:43:07.933657 daemon-err , ovpn-ovpn1[25970]: event_wait : Interrupted system call (code=4) 2024-10-10 08:43:22.798245 daemon-err , ovpn-ovpn2[25942]: event_wait : Interrupted system call (code=4) 2024-10-10 08:43:38.722797 daemon-err , ovpn-ovpn1[26557]: event_wait : Interrupted system call (code=4) 2024-10-10 08:43:44.073541 daemon-err , cfgd[1328]: Commit validation failed 2024-10-10 08:43:44.076934 daemon-err , cfgd[1328]: [9484]Command output:#012[ interfaces openvpn ovpn1 mode server ]#012local-endpoint must be configured in server mode#012#012Commit validation failed#012 2024-10-10 08:43:45.422921 daemon-err , cfgd[1328]: Commit validation failed 2024-10-10 08:43:45.425392 daemon-err , cfgd[1328]: [9484]Command output:#012[ interfaces openvpn ovpn1 mode server ]#012local-endpoint must be an IPv4 subnet in server mode#012#012Commit validation failed#012 2024-10-10 08:43:46.573295 daemon-err , cfgd[1328]: [9484]Command output:#012Subnet prefix length must be between 16 and 29#012Value validation failed#012 2024-10-10 08:43:47.818793 daemon-err , cfgd[1328]: [9484]Command output:#012Subnet prefix length must be between 16 and 29#012Value validation failed#012 2024-10-10 08:43:49.145086 daemon-err , cfgd[1328]: Commit validation failed 2024-10-10 08:43:49.147504 daemon-err , cfgd[1328]: [9484]Command output:#012[ interfaces openvpn ovpn1 mode server ]#012tcp-client protocol not available in server mode#012#012Commit validation failed#012 2024-10-10 08:43:50.678227 daemon-err , cfgd[1328]: Commit validation failed 2024-10-10 08:43:50.681541 daemon-err , cfgd[1328]: [9484]Command output:#012[ interfaces openvpn ovpn1 mode server ]#012Peer parameters not available in server mode#012#012Commit validation failed#012 2024-10-10 08:43:52.191228 daemon-err , cfgd[1328]: Commit validation failed 2024-10-10 08:43:52.193429 daemon-err , cfgd[1328]: [9484]Command output:#012[ vpn openvpn tls-profile TLS auth ]#012crypt and auth are mutually exclusive#012#012Commit validation failed#012 2024-10-10 08:47:00.152750 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF SEG in VRF 231 2024-10-10 08:47:00.152848 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF SEG in VRF 231 2024-10-10 08:47:00.244771 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 230 2024-10-10 08:47:00.244845 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 230 2024-10-10 08:47:00.332767 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF AP in VRF 229 2024-10-10 08:47:00.332835 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF AP in VRF 229 2024-10-10 08:48:13.535558 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 237 2024-10-10 08:48:13.535646 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 237 2024-10-10 08:48:13.620736 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL1 in VRF 236 2024-10-10 08:48:13.620822 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL1 in VRF 236 2024-10-10 08:48:34.605050 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL2 in VRF 240 2024-10-10 08:48:34.605140 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL2 in VRF 240 2024-10-10 08:48:34.686661 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL1 in VRF 239 2024-10-10 08:48:34.686771 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL1 in VRF 239 2024-10-10 08:48:34.773964 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 241 2024-10-10 08:48:34.774047 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 241 2024-10-10 08:49:55.466368 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 248 2024-10-10 08:49:55.466453 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 248 2024-10-10 08:49:55.550252 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 249 2024-10-10 08:49:55.550338 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 249 2024-10-10 08:51:05.022812 daemon-err , nhrpd[3334]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-10-10 08:51:05.105901 daemon-err , nhrpd[3334]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-10-10 08:51:05.538937 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 255 2024-10-10 08:51:05.539207 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 255 2024-10-10 08:51:05.539712 daemon-err , nhrpd[3334]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 255 2024-10-10 08:51:05.539751 daemon-err , nhrpd[3334]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 255 2024-10-10 08:51:05.611664 daemon-err , nhrpd[3334]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 256 2024-10-10 08:51:05.611707 daemon-err , nhrpd[3334]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 256 2024-10-10 08:51:05.611790 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 256 2024-10-10 08:51:05.611835 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 256 2024-10-10 08:51:36.480199 daemon-err , nhrpd[4137]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-10-10 08:51:36.590955 daemon-err , nhrpd[4137]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-10-10 08:51:37.074869 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 261 2024-10-10 08:51:37.074960 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 261 2024-10-10 08:51:37.075708 daemon-err , nhrpd[4137]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 261 2024-10-10 08:51:37.075762 daemon-err , nhrpd[4137]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 261 2024-10-10 08:51:37.138949 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 262 2024-10-10 08:51:37.139168 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 262 2024-10-10 08:51:37.139808 daemon-err , nhrpd[4137]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 262 2024-10-10 08:51:37.139860 daemon-err , nhrpd[4137]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 262 2024-10-10 08:52:11.096136 daemon-err , nhrpd[4986]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-10-10 08:52:11.174744 daemon-err , nhrpd[4986]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-10-10 08:52:11.426818 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 268 2024-10-10 08:52:11.427050 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 268 2024-10-10 08:52:11.427616 daemon-err , nhrpd[4986]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 268 2024-10-10 08:52:11.427689 daemon-err , nhrpd[4986]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 268 2024-10-10 08:52:11.498519 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 267 2024-10-10 08:52:11.498974 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 267 2024-10-10 08:52:11.499284 daemon-err , nhrpd[4986]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 267 2024-10-10 08:52:11.499323 daemon-err , nhrpd[4986]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 267 2024-10-10 08:52:39.825085 daemon-err , nhrpd[5794]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-10-10 08:52:39.895104 daemon-err , nhrpd[5794]: [YJY20-VM0HB][EC 117440513] VICI: strongSwan: no matching SAs to terminate found 2024-10-10 08:52:40.140173 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 272 2024-10-10 08:52:40.140242 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 272 2024-10-10 08:52:40.140859 daemon-err , nhrpd[5794]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 272 2024-10-10 08:52:40.140896 daemon-err , nhrpd[5794]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 272 2024-10-10 08:52:40.228114 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 271 2024-10-10 08:52:40.228209 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 271 2024-10-10 08:52:40.228914 daemon-err , nhrpd[5794]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 271 2024-10-10 08:52:40.228966 daemon-err , nhrpd[5794]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 271 2024-10-10 08:55:25.123243 authpriv-err , login[10665]: pam_tally2(login:auth): pam_get_uid; no such user 2024-10-10 08:55:28.472305 authpriv-err , login[10665]: pam_tally2(login:auth): pam_get_uid; no such user 2024-10-10 08:55:32.358024 authpriv-err , login[10740]: pam_tally2(login:auth): pam_get_uid; no such user 2024-10-10 08:55:35.638090 authpriv-err , login[10740]: pam_tally2(login:auth): pam_get_uid; no such user 2024-10-10 08:55:38.074068 authpriv-err , login[10740]: pam_tally2(login:auth): pam_get_uid; no such user 2024-10-10 08:55:41.076602 authpriv-err , login[10740]: pam_mail(login:session): user unknown 2024-10-10 08:58:07.598832 authpriv-err , login[12011]: pam_mail(login:session): pam_putenv: delete non-existent entry; MAIL 2024-10-10 09:01:11.229981 user-err , OSDxCLI: #033[31m#012Session idle timeout reached. Closing session#033[0m 2024-10-10 09:01:36.064244 user-err , OSDxCLI: #033[31m#012Session idle timeout reached. Closing session#033[0m 2024-10-10 09:01:59.718535 user-err , OSDxCLI: #033[31m#012Session idle timeout reached. Closing session#033[0m 2024-10-10 09:03:21.236174 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 279 2024-10-10 09:03:21.236264 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 279 2024-10-10 09:03:52.098629 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 280 2024-10-10 09:03:52.098718 daemon-err , staticd[1286]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 280 2024-10-10 09:04:36.635068 daemon-err , cfgd[1328]: External python command [cfg.auto_scripts process ADVISOR1 SCRIPT_1 true] finished with status 1 2024-10-10 09:05:24.011150 user-err , ERROR: `system script SCRIPT_1` validation error 2024-10-10 09:05:24.011227 user-err , ERROR: "Configuration path: [potato] is not valid" 2024-10-10 09:05:24.011445 daemon-err , cfgd[1328]: [15783]Command output:#012Value validation failed#012 2024-10-10 09:05:24.401410 user-err , ERROR: `system script SCRIPT_1` validation error 2024-10-10 09:05:24.401619 user-err , ERROR: system potato: Invalid operational command. 2024-10-10 09:05:24.402170 daemon-err , cfgd[1328]: [15783]Command output:#012Value validation failed#012 2024-10-10 09:05:32.863634 daemon-err , cfgd[1328]: [ service dhcp-server ] 2024-10-10 09:05:32.863727 daemon-err , cfgd[1328]: \"shared-network\" configuration is required 2024-10-10 09:05:32.863807 daemon-err , cfgd[1328]: Commit validation failed 2024-10-10 09:05:32.866536 daemon-err , cfgd[1328]: [21489]Command output:#012[ service dhcp-server ]#012\"shared-network\" configuration is required#012Commit validation failed#012 2024-10-10 09:05:32.872790 daemon-err , cfgd[1328]: External python command [cfg.auto_scripts execute_script SCRIPT_1] finished with status 1 2024-10-10 09:05:46.086978 daemon-info , systemd[1]: Stopping System Logging Service... 2024-10-10 09:05:46.088106 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="6258" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-10-10 09:05:46.088732 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-10-10 09:05:46.089020 daemon-info , systemd[1]: Stopped System Logging Service. 2024-10-10 09:05:46.090470 daemon-info , systemd[1]: Starting System Logging Service... 2024-10-10 09:05:46.094130 syslog-info , rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-10-10 09:05:46.094344 daemon-notice , cfgd[1328]: [15783]Completed change to active configuration 2024-10-10 09:05:46.094416 daemon-info , systemd[1]: Started System Logging Service. 2024-10-10 09:05:46.094470 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="21911" x-info="https://www.rsyslog.com"] start 2024-10-10 09:05:46.097866 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2024-10-10 09:05:46.136133 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2024-10-10 09:05:46.286584 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog file systemd_msg set system syslog file systemd_msg level info set system syslog file systemd_msg app systemd
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output contains the following tokens:
systemd[1]: Started "DHCP Server Service instance main".Show output
2024-10-10 09:05:54.459832 daemon-info , systemd[1]: Stopping System Logging Service... 2024-10-10 09:05:54.460851 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-10-10 09:05:54.461237 daemon-info , systemd[1]: Stopped System Logging Service. 2024-10-10 09:05:54.462945 daemon-info , systemd[1]: Starting System Logging Service... 2024-10-10 09:05:54.465485 daemon-info , systemd[1]: Started System Logging Service. 2024-10-10 09:05:55.202622 daemon-info , systemd[1]: Started "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog file systemd_msg set system syslog file systemd_msg level info set system syslog file systemd_msg app systemd set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output contains the following tokens:
Started "DHCP Server Service instance main".Show output
2024-10-10 09:06:03.522208 daemon-info , systemd[1]: Stopping System Logging Service... 2024-10-10 09:06:03.523310 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-10-10 09:06:03.523704 daemon-info , systemd[1]: Stopped System Logging Service. 2024-10-10 09:06:03.525206 daemon-info , systemd[1]: Starting System Logging Service... 2024-10-10 09:06:03.528628 daemon-info , systemd[1]: Started System Logging Service. 2024-10-10 09:06:04.195747 daemon-info , systemd[1]: Started "DHCP Server Service instance main".
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set interfaces ethernet eth0 address 10.215.168.64/24
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.211 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.211/0.211/0.211/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-10-10T09:06:13.315509+00:00 10.215.168.64 2024-10-10T09:06:12.572326+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-10-10T09:06:13.315509+00:00 10.215.168.64 2024-10-10T09:06:12.572561+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="22619" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-10-10T09:06:13.315509+00:00 10.215.168.64 2024-10-10T09:06:12.573281+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-10-10T09:06:13.315509+00:00 10.215.168.64 2024-10-10T09:06:12.573692+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-10-10T09:06:13.315509+00:00 10.215.168.64 2024-10-10T09:06:12.576059+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-10-10T09:06:13.315509+00:00 10.215.168.64 2024-10-10T09:06:12.578473+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-10-10T09:06:13.315509+00:00 10.215.168.64 2024-10-10T09:06:12.579290+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-10-10T09:06:13.315644+00:00 10.215.168.64 2024-10-10T09:06:12.579484+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="22743" x-info="https://www.rsyslog.com"] start 2024-10-10T09:06:13.316895+00:00 10.215.168.64 2024-10-10T09:06:12.580793+00:00 daemon-notice osdx cfgd[1328]: [15783]Completed change to active configuration 2024-10-10T09:06:13.320874+00:00 10.215.168.64 2024-10-10T09:06:12.584415+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-10-10T09:06:13.347719+00:00 10.215.168.64 2024-10-10T09:06:12.611576+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-10-10T09:06:13.536571+00:00 10.215.168.64 2024-10-10T09:06:12.800419+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-10-10T09:06:13.625330+00:00 10.215.168.64 2024-10-10T09:06:12.889128+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system syslog host 10.215.168.1 local-vrf VRF0 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than VRF0. PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.301 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.301/0.301/0.301/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-10-10T09:06:14.120009+00:00 10.215.168.64 2024-10-10T09:06:13.383761+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-10-10T09:06:14.149129+00:00 10.215.168.64 2024-10-10T09:06:13.412865+00:00 daemon-warning osdx zebra[1281]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): 2024-10-10T09:06:14.417794+00:00 10.215.168.64 2024-10-10T09:06:13.681599+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-10-10T09:06:14.429182+00:00 10.215.168.64 2024-10-10T09:06:13.692945+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-10-10T09:06:15.817453+00:00 10.215.168.64 2024-10-10T09:06:15.081270+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-10-10T09:06:15.990261+00:00 10.215.168.64 2024-10-10T09:06:15.254008+00:00 daemon-warning osdx zebra[1281]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): 2024-10-10T09:06:16.404437+00:00 10.215.168.64 2024-10-10T09:06:15.668189+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-10-10T09:06:16.523756+00:00 10.215.168.64 2024-10-10T09:06:15.787534+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-10-10T09:06:16.645815+00:00 10.215.168.64 2024-10-10T09:06:15.909579+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-10-10T09:06:21.720980+00:00 10.215.168.64 2024-10-10T09:06:20.966968+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-10-10T09:06:21.720980+00:00 10.215.168.64 2024-10-10T09:06:20.967172+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="22864" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-10-10T09:06:21.720980+00:00 10.215.168.64 2024-10-10T09:06:20.968026+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-10-10T09:06:21.720980+00:00 10.215.168.64 2024-10-10T09:06:20.968086+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-10-10T09:06:21.721000+00:00 10.215.168.64 2024-10-10T09:06:20.969249+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-10-10T09:06:21.721000+00:00 10.215.168.64 2024-10-10T09:06:20.972822+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-10-10T09:06:21.721000+00:00 10.215.168.64 2024-10-10T09:06:20.972905+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="23016" x-info="https://www.rsyslog.com"] start 2024-10-10T09:06:21.721028+00:00 10.215.168.64 2024-10-10T09:06:20.972963+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-10-10T09:06:21.721037+00:00 10.215.168.64 2024-10-10T09:06:20.974106+00:00 daemon-notice osdx cfgd[1328]: [15783]Completed change to active configuration 2024-10-10T09:06:21.724112+00:00 10.215.168.64 2024-10-10T09:06:20.977406+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-10-10T09:06:21.751090+00:00 10.215.168.64 2024-10-10T09:06:21.004401+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-10-10T09:06:22.047517+00:00 10.215.168.64 2024-10-10T09:06:21.300730+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2024-10-10T09:06:22.128192+00:00 10.215.168.64 2024-10-10T09:06:21.381457+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set interfaces ethernet eth0 address 10.215.168.64/24 set system syslog host 10.215.168.1 local-interface eth0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.173 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.173/0.173/0.173/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-10-10T09:06:22.651656+00:00 10.215.168.64 2024-10-10T09:06:21.904806+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-10-10T09:06:22.964286+00:00 10.215.168.64 2024-10-10T09:06:22.217576+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-10-10T09:06:22.976893+00:00 10.215.168.64 2024-10-10T09:06:22.230196+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-10-10T09:06:24.491712+00:00 10.215.168.64 2024-10-10T09:06:23.744968+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-10-10T09:06:24.868639+00:00 10.215.168.64 2024-10-10T09:06:24.121872+00:00 daemon-warning osdx zebra[1281]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): 2024-10-10T09:06:25.137594+00:00 10.215.168.64 2024-10-10T09:06:24.390841+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-10-10T09:06:25.267250+00:00 10.215.168.64 2024-10-10T09:06:24.520455+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-10-10T09:06:25.383945+00:00 10.215.168.64 2024-10-10T09:06:24.637158+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-10-10T09:06:30.093711+00:00 10.215.168.64 2024-10-10T09:06:29.533147+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-10-10T09:06:30.093711+00:00 10.215.168.64 2024-10-10T09:06:29.533471+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="23137" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-10-10T09:06:30.093711+00:00 10.215.168.64 2024-10-10T09:06:29.534525+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-10-10T09:06:30.093730+00:00 10.215.168.64 2024-10-10T09:06:29.534940+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-10-10T09:06:30.093742+00:00 10.215.168.64 2024-10-10T09:06:29.536796+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-10-10T09:06:30.093920+00:00 10.215.168.64 2024-10-10T09:06:29.539390+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-10-10T09:06:30.093930+00:00 10.215.168.64 2024-10-10T09:06:29.539479+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-10-10T09:06:30.093944+00:00 10.215.168.64 2024-10-10T09:06:29.539586+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="23291" x-info="https://www.rsyslog.com"] start 2024-10-10T09:06:30.095272+00:00 10.215.168.64 2024-10-10T09:06:29.540944+00:00 daemon-notice osdx cfgd[1328]: [15783]Completed change to active configuration 2024-10-10T09:06:30.098092+00:00 10.215.168.64 2024-10-10T09:06:29.543548+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-10-10T09:06:30.145389+00:00 10.215.168.64 2024-10-10T09:06:29.591086+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-10-10T09:06:30.345840+00:00 10.215.168.64 2024-10-10T09:06:29.791469+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-10-10T09:06:30.443888+00:00 10.215.168.64 2024-10-10T09:06:29.889418+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca running://ca.crt set system syslog host 10.215.168.1 tls permittedPeer "rsyslog.server.com" set interfaces ethernet eth0 address 10.215.168.64/24
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.201 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.201/0.201/0.201/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server {log_file}
file and read the
{log_msg}
log message:
Show output
2024-10-10T09:06:30.904243+00:00 10.215.168.64 2024-10-10T09:06:30.343925+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-10-10T09:06:30.990302+00:00 10.215.168.64 2024-10-10T09:06:30.435943+00:00 daemon-warning osdx zebra[1281]: [RZ3YY-GPH41][EC 100663310] snmp[warning]: Warning: Failed to connect to the agentx master agent ([NIL]): 2024-10-10T09:06:31.225254+00:00 10.215.168.64 2024-10-10T09:06:30.670922+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-10-10T09:06:31.237729+00:00 10.215.168.64 2024-10-10T09:06:30.683268+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-10-10T09:06:32.561179+00:00 10.215.168.64 2024-10-10T09:06:32.006782+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-10-10T09:06:33.248895+00:00 10.215.168.64 2024-10-10T09:06:32.694478+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-10-10T09:06:33.370232+00:00 10.215.168.64 2024-10-10T09:06:32.815855+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-10-10T09:06:33.491983+00:00 10.215.168.64 2024-10-10T09:06:32.937575+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-10-10T09:06:38.678870+00:00 10.215.168.64 2024-10-10T09:06:37.872412+00:00 daemon-info osdx systemd[1]: Stopping System Logging Service... 2024-10-10T09:06:38.678870+00:00 10.215.168.64 2024-10-10T09:06:37.872666+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="23412" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-10-10T09:06:38.678870+00:00 10.215.168.64 2024-10-10T09:06:37.872914+00:00 daemon-info osdx systemd[1]: rsyslog.service: Succeeded. 2024-10-10T09:06:38.678870+00:00 10.215.168.64 2024-10-10T09:06:37.873302+00:00 daemon-info osdx systemd[1]: Stopped System Logging Service. 2024-10-10T09:06:38.678870+00:00 10.215.168.64 2024-10-10T09:06:37.875700+00:00 daemon-info osdx systemd[1]: Starting System Logging Service... 2024-10-10T09:06:38.678870+00:00 10.215.168.64 2024-10-10T09:06:37.885155+00:00 daemon-info osdx systemd[1]: Started System Logging Service. 2024-10-10T09:06:38.678899+00:00 10.215.168.64 2024-10-10T09:06:37.885904+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-10-10T09:06:38.678899+00:00 10.215.168.64 2024-10-10T09:06:37.885995+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="23540" x-info="https://www.rsyslog.com"] start 2024-10-10T09:06:38.678899+00:00 10.215.168.64 2024-10-10T09:06:37.887468+00:00 daemon-notice osdx cfgd[1328]: [15783]Completed change to active configuration 2024-10-10T09:06:38.678899+00:00 10.215.168.64 2024-10-10T09:06:37.890908+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-10-10T09:06:38.678899+00:00 10.215.168.64 2024-10-10T09:06:37.922116+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-10-10T09:06:38.724762+00:00 10.215.168.64 2024-10-10T09:06:38.102445+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-10-10T09:06:38.968907+00:00 10.215.168.64 2024-10-10T09:06:38.346587+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.