Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2024-07-03 14:40:49.785513 authpriv-err , sshd[40381]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2024-07-03 14:40:49.785632 authpriv-err , sshd[40381]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-07-03 14:41:10.091464 authpriv-err , login[40397]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2024-07-03 14:41:10.091585 authpriv-err , login[40397]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-07-03 14:41:15.171476 daemon-err , modulelauncher[40437]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2024-07-03 14:41:15.171502 daemon-err , modulelauncher[40437]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2024-07-03 14:41:15.173734 daemon-err , modulelauncher[40437]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2024-07-03 14:41:15.173758 daemon-err , modulelauncher[40437]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2024-07-03 14:41:15.175930 daemon-err , modulelauncher[40437]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2024-07-03 14:41:15.175953 daemon-err , modulelauncher[40437]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2024-07-03 14:41:15.177905 daemon-err , modulelauncher[40437]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2024-07-03 14:41:15.177928 daemon-err , modulelauncher[40437]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2024-07-03 14:41:15.630963 authpriv-err , sshd[40499]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-07-03 14:41:15.631019 authpriv-err , sshd[40499]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-07-03 14:41:15.997742 authpriv-err , login[40541]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-07-03 14:41:15.997892 authpriv-err , login[40541]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-07-03 14:41:17.627457 daemon-err , modulelauncher[40613]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2024-07-03 14:41:17.627490 daemon-err , modulelauncher[40613]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2024-07-03 14:41:17.629466 daemon-err , modulelauncher[40613]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2024-07-03 14:41:17.629488 daemon-err , modulelauncher[40613]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2024-07-03 14:41:17.631986 daemon-err , modulelauncher[40613]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2024-07-03 14:41:17.632011 daemon-err , modulelauncher[40613]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2024-07-03 14:41:17.634219 daemon-err , modulelauncher[40613]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2024-07-03 14:41:17.634244 daemon-err , modulelauncher[40613]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2024-07-03 14:41:18.085425 authpriv-err , sshd[40647]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-07-03 14:41:18.085544 authpriv-err , sshd[40647]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-07-03 14:41:38.377533 authpriv-err , login[40656]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-07-03 14:41:38.377582 authpriv-err , login[40656]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-07-03 14:41:44.041896 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 27 2024-07-03 14:41:44.041948 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 27 2024-07-03 14:41:54.925714 daemon-err , modulelauncher[41408]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2024-07-03 14:41:54.925746 daemon-err , modulelauncher[41408]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2024-07-03 14:41:54.928066 daemon-err , modulelauncher[41408]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2024-07-03 14:41:54.928092 daemon-err , modulelauncher[41408]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2024-07-03 14:42:01.236771 daemon-err , modulelauncher[41733]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2024-07-03 14:42:01.236797 daemon-err , modulelauncher[41733]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2024-07-03 14:42:01.238472 daemon-err , modulelauncher[41733]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2024-07-03 14:42:01.238488 daemon-err , modulelauncher[41733]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2024-07-03 14:42:02.638334 daemon-err , modulelauncher[41903]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2024-07-03 14:42:02.638364 daemon-err , modulelauncher[41903]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2024-07-03 14:42:02.640403 daemon-err , modulelauncher[41903]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2024-07-03 14:42:02.640422 daemon-err , modulelauncher[41903]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2024-07-03 14:42:46.418852 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2024-07-03 14:42:48.264922 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2024-07-03 14:42:57.024550 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2024-07-03 14:42:58.450904 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2024-07-03 14:43:07.641800 daemon-err , modulelauncher[43991]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2024-07-03 14:43:07.641827 daemon-err , modulelauncher[43991]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2024-07-03 14:43:07.643757 daemon-err , modulelauncher[43991]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2024-07-03 14:43:07.643780 daemon-err , modulelauncher[43991]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2024-07-03 14:43:07.645923 daemon-err , modulelauncher[43991]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2024-07-03 14:43:07.645946 daemon-err , modulelauncher[43991]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2024-07-03 14:43:08.405372 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2024-07-03 14:43:09.001192 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2024-07-03 14:44:06.921826 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan3 in VRF 32 2024-07-03 14:44:06.921892 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan3 in VRF 32 2024-07-03 14:44:07.009711 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant2 in VRF 31 2024-07-03 14:44:07.009786 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant2 in VRF 31 2024-07-03 14:44:07.125702 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan2 in VRF 30 2024-07-03 14:44:07.125760 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan2 in VRF 30 2024-07-03 14:44:07.201747 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan1 in VRF 29 2024-07-03 14:44:07.201795 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan1 in VRF 29 2024-07-03 14:44:07.269700 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant1 in VRF 28 2024-07-03 14:44:07.269759 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant1 in VRF 28 2024-07-03 14:45:26.439995 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 39 2024-07-03 14:45:26.440054 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 39 2024-07-03 14:46:37.824480 daemon-err , bgpd[49374]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum0 in VRF 0 2024-07-03 14:46:45.403936 user-err , OSDxCLI: Unable to open config file /etc/aaa/tacacs/acct-tacgroup1: No such file or directory 2024-07-03 14:46:51.113094 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2024-07-03 14:46:51.168757 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2024-07-03 14:47:00.900752 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2024-07-03 14:47:08.062114 daemon-err , cfgd[1440]: [ interfaces ethernet eth0 alarm down ] 2024-07-03 14:47:08.062168 daemon-err , cfgd[1440]: \"system alarm ALARM_TO_TEST\" does not exist 2024-07-03 14:47:08.062185 daemon-err , cfgd[1440]: Commit validation failed 2024-07-03 14:47:08.063857 daemon-err , cfgd[1440]: [50610]Command output:#012[ interfaces ethernet eth0 alarm down ]#012\"system alarm ALARM_TO_TEST\" does not exist#012Commit validation failed#012 2024-07-03 14:48:36.068211 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 46 2024-07-03 14:48:36.068266 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 46 2024-07-03 14:48:36.164020 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 45 2024-07-03 14:48:36.164071 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 45 2024-07-03 14:48:52.694069 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 49 2024-07-03 14:48:52.694125 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 49 2024-07-03 14:48:52.781905 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 48 2024-07-03 14:48:52.781958 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 48 2024-07-03 14:50:04.968790 daemon-err , zebra[1405]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (100) vrf 0 2024-07-03 14:50:04.985245 daemon-err , zebra[1405]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0 2024-07-03 14:50:04.985294 daemon-err , zebra[1405]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (100) vrf 0 2024-07-03 14:50:14.210898 daemon-err , zebra[1405]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0 2024-07-03 14:52:37.978119 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 65 2024-07-03 14:52:37.978167 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 65 2024-07-03 14:52:37.978270 daemon-err , nhrpd[57316]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 65 2024-07-03 14:52:37.978296 daemon-err , nhrpd[57316]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 65 2024-07-03 14:53:09.241403 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 67 2024-07-03 14:53:09.241469 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 67 2024-07-03 14:53:09.241616 daemon-err , nhrpd[57936]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 67 2024-07-03 14:53:09.241651 daemon-err , nhrpd[57936]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 67 2024-07-03 14:53:42.237767 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 69 2024-07-03 14:53:42.237815 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 69 2024-07-03 14:53:42.237929 daemon-err , nhrpd[58540]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 69 2024-07-03 14:53:42.237954 daemon-err , nhrpd[58540]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 69 2024-07-03 14:53:42.321634 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 70 2024-07-03 14:53:42.321687 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 70 2024-07-03 14:53:42.321709 daemon-err , nhrpd[58540]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 70 2024-07-03 14:53:42.321726 daemon-err , nhrpd[58540]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 70 2024-07-03 14:54:14.814374 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 72 2024-07-03 14:54:14.814436 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 72 2024-07-03 14:54:14.814575 daemon-err , nhrpd[59211]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 72 2024-07-03 14:54:14.814609 daemon-err , nhrpd[59211]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 72 2024-07-03 14:54:14.898340 daemon-err , nhrpd[59211]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 73 2024-07-03 14:54:14.898407 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 73 2024-07-03 14:54:14.898438 daemon-err , nhrpd[59211]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 73 2024-07-03 14:54:14.898465 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 73 2024-07-03 14:54:48.637179 daemon-err , nhrpd[59922]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 76 2024-07-03 14:54:48.637228 daemon-err , nhrpd[59922]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 76 2024-07-03 14:54:48.637318 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 76 2024-07-03 14:54:48.637336 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 76 2024-07-03 14:54:48.721017 daemon-err , nhrpd[59922]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 77 2024-07-03 14:54:48.721085 daemon-err , nhrpd[59922]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 77 2024-07-03 14:54:48.721118 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 77 2024-07-03 14:54:48.721145 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 77 2024-07-03 14:54:48.820928 daemon-err , nhrpd[59922]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 75 2024-07-03 14:54:48.820987 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 75 2024-07-03 14:54:48.821006 daemon-err , nhrpd[59922]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 75 2024-07-03 14:54:48.821032 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 75 2024-07-03 14:55:22.919717 daemon-err , nhrpd[60688]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 80 2024-07-03 14:55:22.919780 daemon-err , nhrpd[60688]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 80 2024-07-03 14:55:22.919902 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 80 2024-07-03 14:55:22.919928 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 80 2024-07-03 14:55:22.987651 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 81 2024-07-03 14:55:22.987708 daemon-err , nhrpd[60688]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 81 2024-07-03 14:55:22.987732 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 81 2024-07-03 14:55:22.987753 daemon-err , nhrpd[60688]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 81 2024-07-03 14:55:23.071545 daemon-err , nhrpd[60688]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 79 2024-07-03 14:55:23.071609 daemon-err , nhrpd[60688]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 79 2024-07-03 14:55:23.071740 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 79 2024-07-03 14:55:23.071758 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 79 2024-07-03 14:55:55.965066 daemon-err , nhrpd[61426]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 84 2024-07-03 14:55:55.965112 daemon-err , nhrpd[61426]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 84 2024-07-03 14:55:55.965205 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 84 2024-07-03 14:55:55.965224 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 84 2024-07-03 14:55:56.048796 daemon-err , nhrpd[61426]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 85 2024-07-03 14:55:56.048844 daemon-err , nhrpd[61426]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 85 2024-07-03 14:55:56.048861 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 85 2024-07-03 14:55:56.048892 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 85 2024-07-03 14:55:56.120760 daemon-err , nhrpd[61426]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 83 2024-07-03 14:55:56.120806 daemon-err , nhrpd[61426]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 83 2024-07-03 14:55:56.120825 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 83 2024-07-03 14:55:56.120848 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 83 2024-07-03 14:56:38.656609 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 87 2024-07-03 14:56:38.656655 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 87 2024-07-03 14:57:01.141720 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 88 2024-07-03 14:57:01.141765 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 88 2024-07-03 14:57:22.118133 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 89 2024-07-03 14:57:22.118184 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 89 2024-07-03 14:57:44.083117 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 91 2024-07-03 14:57:44.083172 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 91 2024-07-03 14:57:44.166893 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 90 2024-07-03 14:57:44.166955 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 90 2024-07-03 14:58:05.210255 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 93 2024-07-03 14:58:05.210322 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 93 2024-07-03 14:58:05.314270 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 92 2024-07-03 14:58:05.314348 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 92 2024-07-03 14:59:08.191442 daemon-err , zebra[1405]: [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down 2024-07-03 14:59:08.191515 daemon-err , zebra[1405]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=2733, pid=2230117891 2024-07-03 14:59:08.191540 daemon-err , zebra[1405]: [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1157[if 97]) into the kernel 2024-07-03 14:59:50.410453 daemon-err , zebra[1405]: [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down 2024-07-03 14:59:50.410510 daemon-err , zebra[1405]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=2801, pid=2230117891 2024-07-03 14:59:50.410533 daemon-err , zebra[1405]: [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1190[if 101]) into the kernel 2024-07-03 14:59:50.429569 daemon-err , zebra[1405]: [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down 2024-07-03 14:59:50.429618 daemon-err , zebra[1405]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=2806, pid=2230117891 2024-07-03 14:59:50.429636 daemon-err , zebra[1405]: [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1190[if 101]) into the kernel 2024-07-03 14:59:50.570707 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 100 2024-07-03 14:59:50.570752 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 100 2024-07-03 15:00:11.816754 daemon-err , zebra[1405]: [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down 2024-07-03 15:00:11.816813 daemon-err , zebra[1405]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=2865, pid=2230117891 2024-07-03 15:00:11.816845 daemon-err , zebra[1405]: [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1220[if 104]) into the kernel 2024-07-03 15:00:11.944188 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 103 2024-07-03 15:00:11.944244 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 103 2024-07-03 15:00:34.926959 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 106 2024-07-03 15:00:34.927005 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 106 2024-07-03 15:00:35.026790 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 107 2024-07-03 15:00:35.026854 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 107 2024-07-03 15:00:56.282207 daemon-err , zebra[1405]: [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down 2024-07-03 15:00:56.282271 daemon-err , zebra[1405]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=3025, pid=2230117891 2024-07-03 15:00:56.282296 daemon-err , zebra[1405]: [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1269[if 111]) into the kernel 2024-07-03 15:00:56.409733 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 109 2024-07-03 15:00:56.409781 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 109 2024-07-03 15:00:56.497619 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 110 2024-07-03 15:00:56.497670 daemon-err , staticd[1410]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 110 2024-07-03 15:01:04.668005 daemon-info , systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-03 15:01:04.668182 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="51270" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-03 15:01:04.669094 daemon-info , systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-03 15:01:04.669228 daemon-info , systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-03 15:01:04.692623 daemon-info , systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-03 15:01:04.695104 syslog-info , rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-03 15:01:04.695147 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="68350" x-info="https://www.rsyslog.com"] start 2024-07-03 15:01:04.695177 daemon-info , systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-03 15:01:04.696022 daemon-notice , cfgd[1440]: [51147]Completed change to active configuration 2024-07-03 15:01:04.698131 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2024-07-03 15:01:04.713514 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2024-07-03 15:01:04.858594 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.Show output
2024-07-03 15:01:10.711804 daemon-info , systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-03 15:01:10.712765 daemon-info , systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-03 15:01:10.712845 daemon-info , systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-03 15:01:10.741508 daemon-info , systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-03 15:01:10.744256 daemon-info , systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-03 15:01:11.441997 daemon-info , systemd[1]: Created slice system-dhcpd.slice - Slice /system/dhcpd. 2024-07-03 15:01:11.477449 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
Started.*"DHCP Server Service instance main"\.Show output
2024-07-03 15:01:17.631927 daemon-info , systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-03 15:01:17.632903 daemon-info , systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-03 15:01:17.633057 daemon-info , systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-03 15:01:17.659375 daemon-info , systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-03 15:01:17.661273 daemon-info , systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-03 15:01:18.283317 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.177 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.177/0.177/0.177/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-07-03T15:01:24.760642+00:00 10.215.168.64 2024-07-03T15:01:23.922897+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-03T15:01:24.760642+00:00 10.215.168.64 2024-07-03T15:01:23.923033+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="68885" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-03T15:01:24.760642+00:00 10.215.168.64 2024-07-03T15:01:23.923721+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-03T15:01:24.760642+00:00 10.215.168.64 2024-07-03T15:01:23.923763+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-03T15:01:24.760642+00:00 10.215.168.64 2024-07-03T15:01:23.939804+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-03T15:01:24.760642+00:00 10.215.168.64 2024-07-03T15:01:23.942189+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-03T15:01:24.760642+00:00 10.215.168.64 2024-07-03T15:01:23.942222+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="68984" x-info="https://www.rsyslog.com"] start 2024-07-03T15:01:24.760642+00:00 10.215.168.64 2024-07-03T15:01:23.942248+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-03T15:01:24.760642+00:00 10.215.168.64 2024-07-03T15:01:23.942579+00:00 daemon-notice osdx cfgd[1440]: [51147]Completed change to active configuration 2024-07-03T15:01:24.762494+00:00 10.215.168.64 2024-07-03T15:01:23.944826+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-07-03T15:01:24.799414+00:00 10.215.168.64 2024-07-03T15:01:23.981760+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-07-03T15:01:24.943734+00:00 10.215.168.64 2024-07-03T15:01:24.125883+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-07-03T15:01:24.998899+00:00 10.215.168.64 2024-07-03T15:01:24.181152+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.138 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.138/0.138/0.138/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-07-03T15:01:25.500068+00:00 10.215.168.64 2024-07-03T15:01:24.675751+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-07-03T15:01:25.706309+00:00 10.215.168.64 2024-07-03T15:01:24.888450+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-07-03T15:01:25.726554+00:00 10.215.168.64 2024-07-03T15:01:24.908713+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-07-03T15:01:26.483178+00:00 10.215.168.64 2024-07-03T15:01:25.665439+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-07-03T15:01:26.800808+00:00 10.215.168.64 2024-07-03T15:01:25.983105+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-07-03T15:01:26.857526+00:00 10.215.168.64 2024-07-03T15:01:26.039729+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-07-03T15:01:26.962874+00:00 10.215.168.64 2024-07-03T15:01:26.145116+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-07-03T15:01:27.031920+00:00 10.215.168.64 2024-07-03T15:01:26.213004+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2024-07-03T15:01:30.724553+00:00 10.215.168.64 2024-07-03T15:01:30.041874+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-03T15:01:30.724553+00:00 10.215.168.64 2024-07-03T15:01:30.042162+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69071" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-03T15:01:30.724553+00:00 10.215.168.64 2024-07-03T15:01:30.042630+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-03T15:01:30.724553+00:00 10.215.168.64 2024-07-03T15:01:30.042737+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-03T15:01:30.724553+00:00 10.215.168.64 2024-07-03T15:01:30.070455+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-03T15:01:30.724553+00:00 10.215.168.64 2024-07-03T15:01:30.072196+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-03T15:01:30.724553+00:00 10.215.168.64 2024-07-03T15:01:30.072232+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-03T15:01:30.724553+00:00 10.215.168.64 2024-07-03T15:01:30.072263+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69197" x-info="https://www.rsyslog.com"] start 2024-07-03T15:01:30.724553+00:00 10.215.168.64 2024-07-03T15:01:30.073065+00:00 daemon-notice osdx cfgd[1440]: [51147]Completed change to active configuration 2024-07-03T15:01:30.726396+00:00 10.215.168.64 2024-07-03T15:01:30.075168+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-07-03T15:01:30.758369+00:00 10.215.168.64 2024-07-03T15:01:30.107132+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-07-03T15:01:30.933746+00:00 10.215.168.64 2024-07-03T15:01:30.282548+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2024-07-03T15:01:31.001557+00:00 10.215.168.64 2024-07-03T15:01:30.350293+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-interface eth0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.146 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.146/0.146/0.146/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-07-03T15:01:31.426423+00:00 10.215.168.64 2024-07-03T15:01:30.775179+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-07-03T15:01:31.661722+00:00 10.215.168.64 2024-07-03T15:01:31.010433+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-07-03T15:01:31.677599+00:00 10.215.168.64 2024-07-03T15:01:31.026338+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-07-03T15:01:32.500129+00:00 10.215.168.64 2024-07-03T15:01:31.848720+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-07-03T15:01:32.836195+00:00 10.215.168.64 2024-07-03T15:01:32.184750+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-07-03T15:01:32.899310+00:00 10.215.168.64 2024-07-03T15:01:32.247952+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-07-03T15:01:33.004370+00:00 10.215.168.64 2024-07-03T15:01:32.352999+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-07-03T15:01:33.067882+00:00 10.215.168.64 2024-07-03T15:01:32.416565+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2024-07-03T15:01:36.889011+00:00 10.215.168.64 2024-07-03T15:01:35.947378+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69284" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-03T15:01:36.889026+00:00 10.215.168.64 2024-07-03T15:01:35.947125+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-03T15:01:36.889044+00:00 10.215.168.64 2024-07-03T15:01:35.948075+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-03T15:01:36.889063+00:00 10.215.168.64 2024-07-03T15:01:35.948198+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-03T15:01:36.889081+00:00 10.215.168.64 2024-07-03T15:01:35.972523+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-03T15:01:36.889626+00:00 10.215.168.64 2024-07-03T15:01:35.975823+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-03T15:01:36.889626+00:00 10.215.168.64 2024-07-03T15:01:35.975878+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69411" x-info="https://www.rsyslog.com"] start 2024-07-03T15:01:36.889626+00:00 10.215.168.64 2024-07-03T15:01:35.975909+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-03T15:01:36.889633+00:00 10.215.168.64 2024-07-03T15:01:35.976047+00:00 daemon-notice osdx cfgd[1440]: [51147]Completed change to active configuration 2024-07-03T15:01:36.891723+00:00 10.215.168.64 2024-07-03T15:01:35.978111+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-07-03T15:01:36.909984+00:00 10.215.168.64 2024-07-03T15:01:35.996388+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-07-03T15:01:37.118651+00:00 10.215.168.64 2024-07-03T15:01:36.205000+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-07-03T15:01:37.187567+00:00 10.215.168.64 2024-07-03T15:01:36.273807+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and UDP
Description
Add a remote host to send syslog messages through a specific local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.189 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.189/0.189/0.189/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-07-03T15:01:42.576111+00:00 33.33.33.33 2024-07-03T15:01:41.744078+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-03T15:01:42.576111+00:00 33.33.33.33 2024-07-03T15:01:41.744579+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69498" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-03T15:01:42.576111+00:00 33.33.33.33 2024-07-03T15:01:41.744624+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-03T15:01:42.576111+00:00 33.33.33.33 2024-07-03T15:01:41.744658+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-03T15:01:42.576111+00:00 33.33.33.33 2024-07-03T15:01:41.767244+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-03T15:01:42.576111+00:00 33.33.33.33 2024-07-03T15:01:41.769317+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-03T15:01:42.576270+00:00 33.33.33.33 2024-07-03T15:01:41.769367+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-03T15:01:42.576270+00:00 33.33.33.33 2024-07-03T15:01:41.769415+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69610" x-info="https://www.rsyslog.com"] start 2024-07-03T15:01:42.576855+00:00 33.33.33.33 2024-07-03T15:01:41.770103+00:00 daemon-notice osdx cfgd[1440]: [51147]Completed change to active configuration 2024-07-03T15:01:42.578908+00:00 33.33.33.33 2024-07-03T15:01:41.772100+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-07-03T15:01:42.594168+00:00 33.33.33.33 2024-07-03T15:01:41.787345+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-07-03T15:01:42.721918+00:00 33.33.33.33 2024-07-03T15:01:41.914991+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-07-03T15:01:42.776618+00:00 33.33.33.33 2024-07-03T15:01:41.969572+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and VRF
Description
Add a remote host to send syslog messages through a VRF and a local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.170 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.170/0.170/0.170/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-07-03T15:01:43.188576+00:00 33.33.33.33 2024-07-03T15:01:42.381722+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-07-03T15:01:43.344832+00:00 33.33.33.33 2024-07-03T15:01:42.537768+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-07-03T15:01:43.364550+00:00 33.33.33.33 2024-07-03T15:01:42.557690+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-07-03T15:01:44.136523+00:00 33.33.33.33 2024-07-03T15:01:43.329623+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-07-03T15:01:44.483452+00:00 33.33.33.33 2024-07-03T15:01:43.676339+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-07-03T15:01:44.537194+00:00 33.33.33.33 2024-07-03T15:01:43.730262+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-07-03T15:01:44.646201+00:00 33.33.33.33 2024-07-03T15:01:43.839251+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-07-03T15:01:44.714358+00:00 33.33.33.33 2024-07-03T15:01:43.907436+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2024-07-03T15:01:48.941420+00:00 33.33.33.33 2024-07-03T15:01:48.372061+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-03T15:01:48.941420+00:00 33.33.33.33 2024-07-03T15:01:48.372233+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69697" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-03T15:01:48.941420+00:00 33.33.33.33 2024-07-03T15:01:48.372687+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-03T15:01:48.941420+00:00 33.33.33.33 2024-07-03T15:01:48.372780+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-03T15:01:48.941420+00:00 33.33.33.33 2024-07-03T15:01:48.395879+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-03T15:01:48.941420+00:00 33.33.33.33 2024-07-03T15:01:48.398304+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-03T15:01:48.941420+00:00 33.33.33.33 2024-07-03T15:01:48.398341+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69840" x-info="https://www.rsyslog.com"] start 2024-07-03T15:01:48.941420+00:00 33.33.33.33 2024-07-03T15:01:48.398377+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-03T15:01:48.941420+00:00 33.33.33.33 2024-07-03T15:01:48.398830+00:00 daemon-notice osdx cfgd[1440]: [51147]Completed change to active configuration 2024-07-03T15:01:48.941420+00:00 33.33.33.33 2024-07-03T15:01:48.398946+00:00 syslog-warning osdx rsyslogd: bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ] 2024-07-03T15:01:48.943635+00:00 33.33.33.33 2024-07-03T15:01:48.401227+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-07-03T15:01:48.973208+00:00 33.33.33.33 2024-07-03T15:01:48.430721+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-07-03T15:01:49.136204+00:00 33.33.33.33 2024-07-03T15:01:48.593605+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2024-07-03T15:01:49.193320+00:00 33.33.33.33 2024-07-03T15:01:48.650756+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.152 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.152/0.152/0.152/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-07-03T15:01:55.182264+00:00 10.215.168.64 2024-07-03T15:01:54.013014+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-03T15:01:55.182318+00:00 10.215.168.64 2024-07-03T15:01:54.013197+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69927" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-03T15:01:55.182318+00:00 10.215.168.64 2024-07-03T15:01:54.013903+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-03T15:01:55.182318+00:00 10.215.168.64 2024-07-03T15:01:54.014015+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-03T15:01:55.182318+00:00 10.215.168.64 2024-07-03T15:01:54.039642+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-03T15:01:55.182318+00:00 10.215.168.64 2024-07-03T15:01:54.045758+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-03T15:01:55.182318+00:00 10.215.168.64 2024-07-03T15:01:54.045800+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="70062" x-info="https://www.rsyslog.com"] start 2024-07-03T15:01:55.182318+00:00 10.215.168.64 2024-07-03T15:01:54.045823+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-03T15:01:55.182318+00:00 10.215.168.64 2024-07-03T15:01:54.047362+00:00 daemon-notice osdx cfgd[1440]: [51147]Completed change to active configuration 2024-07-03T15:01:55.182318+00:00 10.215.168.64 2024-07-03T15:01:54.049231+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-07-03T15:01:55.182318+00:00 10.215.168.64 2024-07-03T15:01:54.080042+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-07-03T15:01:55.182318+00:00 10.215.168.64 2024-07-03T15:01:54.146717+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2024-07-03T15:01:55.182318+00:00 10.215.168.64 2024-07-03T15:01:54.146785+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2024-07-03T15:01:55.255958+00:00 10.215.168.64 2024-07-03T15:01:54.228889+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-07-03T15:01:56.550005+00:00 10.215.168.64 2024-07-03T15:01:55.522826+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Local Address Single TLS
Description
Add a secured remote host to send syslog messages and show the host name from a fiven local-address
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.179 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.179/0.179/0.179/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-07-03T15:02:02.731782+00:00 33.33.33.33 2024-07-03T15:02:02.112956+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-03T15:02:02.731782+00:00 33.33.33.33 2024-07-03T15:02:02.113113+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="70158" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-03T15:02:02.731782+00:00 33.33.33.33 2024-07-03T15:02:02.113547+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-03T15:02:02.731782+00:00 33.33.33.33 2024-07-03T15:02:02.113667+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-03T15:02:02.731782+00:00 33.33.33.33 2024-07-03T15:02:02.154349+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-03T15:02:02.731782+00:00 33.33.33.33 2024-07-03T15:02:02.156315+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-03T15:02:02.731782+00:00 33.33.33.33 2024-07-03T15:02:02.156360+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="70274" x-info="https://www.rsyslog.com"] start 2024-07-03T15:02:02.731782+00:00 33.33.33.33 2024-07-03T15:02:02.156382+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-03T15:02:02.773268+00:00 33.33.33.33 2024-07-03T15:02:02.157740+00:00 daemon-notice osdx cfgd[1440]: [51147]Completed change to active configuration 2024-07-03T15:02:02.773268+00:00 33.33.33.33 2024-07-03T15:02:02.160495+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-07-03T15:02:02.773268+00:00 33.33.33.33 2024-07-03T15:02:02.175867+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-07-03T15:02:02.773268+00:00 33.33.33.33 2024-07-03T15:02:02.334235+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-07-03T15:02:02.773268+00:00 33.33.33.33 2024-07-03T15:02:02.355415+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2024-07-03T15:02:02.773268+00:00 33.33.33.33 2024-07-03T15:02:02.355472+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2024-07-03T15:02:03.973684+00:00 33.33.33.33 2024-07-03T15:02:03.605111+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.