Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2024-07-03 14:40:49.785513 authpriv-err , sshd[40381]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2024-07-03 14:40:49.785632 authpriv-err , sshd[40381]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2024-07-03 14:41:10.091464 authpriv-err , login[40397]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2024-07-03 14:41:10.091585 authpriv-err , login[40397]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2024-07-03 14:41:15.171476 daemon-err , modulelauncher[40437]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-07-03 14:41:15.171502 daemon-err , modulelauncher[40437]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-07-03 14:41:15.173734 daemon-err , modulelauncher[40437]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-07-03 14:41:15.173758 daemon-err , modulelauncher[40437]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-07-03 14:41:15.175930 daemon-err , modulelauncher[40437]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-07-03 14:41:15.175953 daemon-err , modulelauncher[40437]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-07-03 14:41:15.177905 daemon-err , modulelauncher[40437]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-07-03 14:41:15.177928 daemon-err , modulelauncher[40437]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-07-03 14:41:15.630963 authpriv-err , sshd[40499]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-07-03 14:41:15.631019 authpriv-err , sshd[40499]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2024-07-03 14:41:15.997742 authpriv-err , login[40541]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-07-03 14:41:15.997892 authpriv-err , login[40541]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2024-07-03 14:41:17.627457 daemon-err , modulelauncher[40613]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-07-03 14:41:17.627490 daemon-err , modulelauncher[40613]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-07-03 14:41:17.629466 daemon-err , modulelauncher[40613]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-07-03 14:41:17.629488 daemon-err , modulelauncher[40613]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-07-03 14:41:17.631986 daemon-err , modulelauncher[40613]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-07-03 14:41:17.632011 daemon-err , modulelauncher[40613]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-07-03 14:41:17.634219 daemon-err , modulelauncher[40613]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-07-03 14:41:17.634244 daemon-err , modulelauncher[40613]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-07-03 14:41:18.085425 authpriv-err , sshd[40647]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-07-03 14:41:18.085544 authpriv-err , sshd[40647]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2024-07-03 14:41:38.377533 authpriv-err , login[40656]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-07-03 14:41:38.377582 authpriv-err , login[40656]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2024-07-03 14:41:44.041896 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 27
2024-07-03 14:41:44.041948 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 27
2024-07-03 14:41:54.925714 daemon-err , modulelauncher[41408]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-07-03 14:41:54.925746 daemon-err , modulelauncher[41408]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-07-03 14:41:54.928066 daemon-err , modulelauncher[41408]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-07-03 14:41:54.928092 daemon-err , modulelauncher[41408]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-07-03 14:42:01.236771 daemon-err , modulelauncher[41733]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-07-03 14:42:01.236797 daemon-err , modulelauncher[41733]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-07-03 14:42:01.238472 daemon-err , modulelauncher[41733]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-07-03 14:42:01.238488 daemon-err , modulelauncher[41733]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-07-03 14:42:02.638334 daemon-err , modulelauncher[41903]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-07-03 14:42:02.638364 daemon-err , modulelauncher[41903]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-07-03 14:42:02.640403 daemon-err , modulelauncher[41903]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-07-03 14:42:02.640422 daemon-err , modulelauncher[41903]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-07-03 14:42:46.418852 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2024-07-03 14:42:48.264922 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2024-07-03 14:42:57.024550 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2024-07-03 14:42:58.450904 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2024-07-03 14:43:07.641800 daemon-err , modulelauncher[43991]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2024-07-03 14:43:07.641827 daemon-err , modulelauncher[43991]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2024-07-03 14:43:07.643757 daemon-err , modulelauncher[43991]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2024-07-03 14:43:07.643780 daemon-err , modulelauncher[43991]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2024-07-03 14:43:07.645923 daemon-err , modulelauncher[43991]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2024-07-03 14:43:07.645946 daemon-err , modulelauncher[43991]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2024-07-03 14:43:08.405372 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2024-07-03 14:43:09.001192 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2024-07-03 14:44:06.921826 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan3 in VRF 32
2024-07-03 14:44:06.921892 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan3 in VRF 32
2024-07-03 14:44:07.009711 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant2 in VRF 31
2024-07-03 14:44:07.009786 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant2 in VRF 31
2024-07-03 14:44:07.125702 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan2 in VRF 30
2024-07-03 14:44:07.125760 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan2 in VRF 30
2024-07-03 14:44:07.201747 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan1 in VRF 29
2024-07-03 14:44:07.201795 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan1 in VRF 29
2024-07-03 14:44:07.269700 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant1 in VRF 28
2024-07-03 14:44:07.269759 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant1 in VRF 28
2024-07-03 14:45:26.439995 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 39
2024-07-03 14:45:26.440054 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 39
2024-07-03 14:46:37.824480 daemon-err , bgpd[49374]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum0 in VRF 0
2024-07-03 14:46:45.403936 user-err , OSDxCLI:  Unable to open config file /etc/aaa/tacacs/acct-tacgroup1: No such file or directory
2024-07-03 14:46:51.113094 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2024-07-03 14:46:51.168757 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2024-07-03 14:47:00.900752 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2024-07-03 14:47:08.062114 daemon-err , cfgd[1440]:  [ interfaces ethernet eth0 alarm down ]
2024-07-03 14:47:08.062168 daemon-err , cfgd[1440]:  \"system alarm ALARM_TO_TEST\" does not exist
2024-07-03 14:47:08.062185 daemon-err , cfgd[1440]:  Commit validation failed
2024-07-03 14:47:08.063857 daemon-err , cfgd[1440]:  [50610]Command output:#012[ interfaces ethernet eth0 alarm down ]#012\"system alarm ALARM_TO_TEST\" does not exist#012Commit validation failed#012
2024-07-03 14:48:36.068211 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 46
2024-07-03 14:48:36.068266 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 46
2024-07-03 14:48:36.164020 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 45
2024-07-03 14:48:36.164071 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 45
2024-07-03 14:48:52.694069 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 49
2024-07-03 14:48:52.694125 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 49
2024-07-03 14:48:52.781905 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 48
2024-07-03 14:48:52.781958 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 48
2024-07-03 14:50:04.968790 daemon-err , zebra[1405]:  [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (100) vrf 0
2024-07-03 14:50:04.985245 daemon-err , zebra[1405]:  [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0
2024-07-03 14:50:04.985294 daemon-err , zebra[1405]:  [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (100) vrf 0
2024-07-03 14:50:14.210898 daemon-err , zebra[1405]:  [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0
2024-07-03 14:52:37.978119 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 65
2024-07-03 14:52:37.978167 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 65
2024-07-03 14:52:37.978270 daemon-err , nhrpd[57316]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 65
2024-07-03 14:52:37.978296 daemon-err , nhrpd[57316]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 65
2024-07-03 14:53:09.241403 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 67
2024-07-03 14:53:09.241469 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 67
2024-07-03 14:53:09.241616 daemon-err , nhrpd[57936]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 67
2024-07-03 14:53:09.241651 daemon-err , nhrpd[57936]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 67
2024-07-03 14:53:42.237767 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 69
2024-07-03 14:53:42.237815 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 69
2024-07-03 14:53:42.237929 daemon-err , nhrpd[58540]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 69
2024-07-03 14:53:42.237954 daemon-err , nhrpd[58540]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 69
2024-07-03 14:53:42.321634 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 70
2024-07-03 14:53:42.321687 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 70
2024-07-03 14:53:42.321709 daemon-err , nhrpd[58540]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 70
2024-07-03 14:53:42.321726 daemon-err , nhrpd[58540]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 70
2024-07-03 14:54:14.814374 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 72
2024-07-03 14:54:14.814436 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 72
2024-07-03 14:54:14.814575 daemon-err , nhrpd[59211]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 72
2024-07-03 14:54:14.814609 daemon-err , nhrpd[59211]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 72
2024-07-03 14:54:14.898340 daemon-err , nhrpd[59211]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 73
2024-07-03 14:54:14.898407 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 73
2024-07-03 14:54:14.898438 daemon-err , nhrpd[59211]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 73
2024-07-03 14:54:14.898465 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 73
2024-07-03 14:54:48.637179 daemon-err , nhrpd[59922]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 76
2024-07-03 14:54:48.637228 daemon-err , nhrpd[59922]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 76
2024-07-03 14:54:48.637318 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 76
2024-07-03 14:54:48.637336 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 76
2024-07-03 14:54:48.721017 daemon-err , nhrpd[59922]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 77
2024-07-03 14:54:48.721085 daemon-err , nhrpd[59922]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 77
2024-07-03 14:54:48.721118 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 77
2024-07-03 14:54:48.721145 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 77
2024-07-03 14:54:48.820928 daemon-err , nhrpd[59922]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 75
2024-07-03 14:54:48.820987 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 75
2024-07-03 14:54:48.821006 daemon-err , nhrpd[59922]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 75
2024-07-03 14:54:48.821032 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 75
2024-07-03 14:55:22.919717 daemon-err , nhrpd[60688]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 80
2024-07-03 14:55:22.919780 daemon-err , nhrpd[60688]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 80
2024-07-03 14:55:22.919902 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 80
2024-07-03 14:55:22.919928 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 80
2024-07-03 14:55:22.987651 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 81
2024-07-03 14:55:22.987708 daemon-err , nhrpd[60688]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 81
2024-07-03 14:55:22.987732 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 81
2024-07-03 14:55:22.987753 daemon-err , nhrpd[60688]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 81
2024-07-03 14:55:23.071545 daemon-err , nhrpd[60688]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 79
2024-07-03 14:55:23.071609 daemon-err , nhrpd[60688]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 79
2024-07-03 14:55:23.071740 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 79
2024-07-03 14:55:23.071758 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 79
2024-07-03 14:55:55.965066 daemon-err , nhrpd[61426]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 84
2024-07-03 14:55:55.965112 daemon-err , nhrpd[61426]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 84
2024-07-03 14:55:55.965205 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 84
2024-07-03 14:55:55.965224 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 84
2024-07-03 14:55:56.048796 daemon-err , nhrpd[61426]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 85
2024-07-03 14:55:56.048844 daemon-err , nhrpd[61426]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 85
2024-07-03 14:55:56.048861 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 85
2024-07-03 14:55:56.048892 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 85
2024-07-03 14:55:56.120760 daemon-err , nhrpd[61426]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 83
2024-07-03 14:55:56.120806 daemon-err , nhrpd[61426]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 83
2024-07-03 14:55:56.120825 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 83
2024-07-03 14:55:56.120848 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 83
2024-07-03 14:56:38.656609 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 87
2024-07-03 14:56:38.656655 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 87
2024-07-03 14:57:01.141720 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 88
2024-07-03 14:57:01.141765 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 88
2024-07-03 14:57:22.118133 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 89
2024-07-03 14:57:22.118184 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 89
2024-07-03 14:57:44.083117 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 91
2024-07-03 14:57:44.083172 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 91
2024-07-03 14:57:44.166893 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 90
2024-07-03 14:57:44.166955 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 90
2024-07-03 14:58:05.210255 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 93
2024-07-03 14:58:05.210322 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 93
2024-07-03 14:58:05.314270 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 92
2024-07-03 14:58:05.314348 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 92
2024-07-03 14:59:08.191442 daemon-err , zebra[1405]:  [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down
2024-07-03 14:59:08.191515 daemon-err , zebra[1405]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=2733, pid=2230117891
2024-07-03 14:59:08.191540 daemon-err , zebra[1405]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1157[if 97]) into the kernel
2024-07-03 14:59:50.410453 daemon-err , zebra[1405]:  [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down
2024-07-03 14:59:50.410510 daemon-err , zebra[1405]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=2801, pid=2230117891
2024-07-03 14:59:50.410533 daemon-err , zebra[1405]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1190[if 101]) into the kernel
2024-07-03 14:59:50.429569 daemon-err , zebra[1405]:  [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down
2024-07-03 14:59:50.429618 daemon-err , zebra[1405]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=2806, pid=2230117891
2024-07-03 14:59:50.429636 daemon-err , zebra[1405]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1190[if 101]) into the kernel
2024-07-03 14:59:50.570707 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 100
2024-07-03 14:59:50.570752 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 100
2024-07-03 15:00:11.816754 daemon-err , zebra[1405]:  [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down
2024-07-03 15:00:11.816813 daemon-err , zebra[1405]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=2865, pid=2230117891
2024-07-03 15:00:11.816845 daemon-err , zebra[1405]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1220[if 104]) into the kernel
2024-07-03 15:00:11.944188 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 103
2024-07-03 15:00:11.944244 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 103
2024-07-03 15:00:34.926959 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 106
2024-07-03 15:00:34.927005 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 106
2024-07-03 15:00:35.026790 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 107
2024-07-03 15:00:35.026854 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 107
2024-07-03 15:00:56.282207 daemon-err , zebra[1405]:  [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down
2024-07-03 15:00:56.282271 daemon-err , zebra[1405]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=3025, pid=2230117891
2024-07-03 15:00:56.282296 daemon-err , zebra[1405]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1269[if 111]) into the kernel
2024-07-03 15:00:56.409733 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 109
2024-07-03 15:00:56.409781 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 109
2024-07-03 15:00:56.497619 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 110
2024-07-03 15:00:56.497670 daemon-err , staticd[1410]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 110
2024-07-03 15:01:04.668005 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-03 15:01:04.668182 syslog-info , rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="51270" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-03 15:01:04.669094 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-03 15:01:04.669228 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-03 15:01:04.692623 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-03 15:01:04.695104 syslog-info , rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-03 15:01:04.695147 syslog-info , rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="68350" x-info="https://www.rsyslog.com"] start
2024-07-03 15:01:04.695177 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-03 15:01:04.696022 daemon-notice , cfgd[1440]:  [51147]Completed change to active configuration
2024-07-03 15:01:04.698131 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2024-07-03 15:01:04.713514 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2024-07-03 15:01:04.858594 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2024-07-03 15:01:10.711804 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-03 15:01:10.712765 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-03 15:01:10.712845 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-03 15:01:10.741508 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-03 15:01:10.744256 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-03 15:01:11.441997 daemon-info , systemd[1]:  Created slice system-dhcpd.slice - Slice /system/dhcpd.
2024-07-03 15:01:11.477449 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2024-07-03 15:01:17.631927 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-03 15:01:17.632903 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-03 15:01:17.633057 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-03 15:01:17.659375 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-03 15:01:17.661273 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-03 15:01:18.283317 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.177 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.177/0.177/0.177/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-03T15:01:24.760642+00:00 10.215.168.64  2024-07-03T15:01:23.922897+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-03T15:01:24.760642+00:00 10.215.168.64  2024-07-03T15:01:23.923033+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="68885" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-03T15:01:24.760642+00:00 10.215.168.64  2024-07-03T15:01:23.923721+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-03T15:01:24.760642+00:00 10.215.168.64  2024-07-03T15:01:23.923763+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-03T15:01:24.760642+00:00 10.215.168.64  2024-07-03T15:01:23.939804+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-03T15:01:24.760642+00:00 10.215.168.64  2024-07-03T15:01:23.942189+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-03T15:01:24.760642+00:00 10.215.168.64  2024-07-03T15:01:23.942222+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="68984" x-info="https://www.rsyslog.com"] start
2024-07-03T15:01:24.760642+00:00 10.215.168.64  2024-07-03T15:01:23.942248+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-03T15:01:24.760642+00:00 10.215.168.64  2024-07-03T15:01:23.942579+00:00 daemon-notice osdx cfgd[1440]:  [51147]Completed change to active configuration
2024-07-03T15:01:24.762494+00:00 10.215.168.64  2024-07-03T15:01:23.944826+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-03T15:01:24.799414+00:00 10.215.168.64  2024-07-03T15:01:23.981760+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-03T15:01:24.943734+00:00 10.215.168.64  2024-07-03T15:01:24.125883+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-07-03T15:01:24.998899+00:00 10.215.168.64  2024-07-03T15:01:24.181152+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.138 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.138/0.138/0.138/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-03T15:01:25.500068+00:00 10.215.168.64  2024-07-03T15:01:24.675751+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-07-03T15:01:25.706309+00:00 10.215.168.64  2024-07-03T15:01:24.888450+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-07-03T15:01:25.726554+00:00 10.215.168.64  2024-07-03T15:01:24.908713+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-07-03T15:01:26.483178+00:00 10.215.168.64  2024-07-03T15:01:25.665439+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-07-03T15:01:26.800808+00:00 10.215.168.64  2024-07-03T15:01:25.983105+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-07-03T15:01:26.857526+00:00 10.215.168.64  2024-07-03T15:01:26.039729+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-07-03T15:01:26.962874+00:00 10.215.168.64  2024-07-03T15:01:26.145116+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-07-03T15:01:27.031920+00:00 10.215.168.64  2024-07-03T15:01:26.213004+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2024-07-03T15:01:30.724553+00:00 10.215.168.64  2024-07-03T15:01:30.041874+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-03T15:01:30.724553+00:00 10.215.168.64  2024-07-03T15:01:30.042162+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69071" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-03T15:01:30.724553+00:00 10.215.168.64  2024-07-03T15:01:30.042630+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-03T15:01:30.724553+00:00 10.215.168.64  2024-07-03T15:01:30.042737+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-03T15:01:30.724553+00:00 10.215.168.64  2024-07-03T15:01:30.070455+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-03T15:01:30.724553+00:00 10.215.168.64  2024-07-03T15:01:30.072196+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-03T15:01:30.724553+00:00 10.215.168.64  2024-07-03T15:01:30.072232+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-03T15:01:30.724553+00:00 10.215.168.64  2024-07-03T15:01:30.072263+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69197" x-info="https://www.rsyslog.com"] start
2024-07-03T15:01:30.724553+00:00 10.215.168.64  2024-07-03T15:01:30.073065+00:00 daemon-notice osdx cfgd[1440]:  [51147]Completed change to active configuration
2024-07-03T15:01:30.726396+00:00 10.215.168.64  2024-07-03T15:01:30.075168+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-03T15:01:30.758369+00:00 10.215.168.64  2024-07-03T15:01:30.107132+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-03T15:01:30.933746+00:00 10.215.168.64  2024-07-03T15:01:30.282548+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1  vrf VRF0    count 1 size 56 timeout 1'.
2024-07-03T15:01:31.001557+00:00 10.215.168.64  2024-07-03T15:01:30.350293+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.146 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.146/0.146/0.146/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-03T15:01:31.426423+00:00 10.215.168.64  2024-07-03T15:01:30.775179+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-07-03T15:01:31.661722+00:00 10.215.168.64  2024-07-03T15:01:31.010433+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-07-03T15:01:31.677599+00:00 10.215.168.64  2024-07-03T15:01:31.026338+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-07-03T15:01:32.500129+00:00 10.215.168.64  2024-07-03T15:01:31.848720+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-07-03T15:01:32.836195+00:00 10.215.168.64  2024-07-03T15:01:32.184750+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-07-03T15:01:32.899310+00:00 10.215.168.64  2024-07-03T15:01:32.247952+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-07-03T15:01:33.004370+00:00 10.215.168.64  2024-07-03T15:01:32.352999+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-07-03T15:01:33.067882+00:00 10.215.168.64  2024-07-03T15:01:32.416565+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2024-07-03T15:01:36.889011+00:00 10.215.168.64  2024-07-03T15:01:35.947378+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69284" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-03T15:01:36.889026+00:00 10.215.168.64  2024-07-03T15:01:35.947125+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-03T15:01:36.889044+00:00 10.215.168.64  2024-07-03T15:01:35.948075+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-03T15:01:36.889063+00:00 10.215.168.64  2024-07-03T15:01:35.948198+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-03T15:01:36.889081+00:00 10.215.168.64  2024-07-03T15:01:35.972523+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-03T15:01:36.889626+00:00 10.215.168.64  2024-07-03T15:01:35.975823+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-03T15:01:36.889626+00:00 10.215.168.64  2024-07-03T15:01:35.975878+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69411" x-info="https://www.rsyslog.com"] start
2024-07-03T15:01:36.889626+00:00 10.215.168.64  2024-07-03T15:01:35.975909+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-03T15:01:36.889633+00:00 10.215.168.64  2024-07-03T15:01:35.976047+00:00 daemon-notice osdx cfgd[1440]:  [51147]Completed change to active configuration
2024-07-03T15:01:36.891723+00:00 10.215.168.64  2024-07-03T15:01:35.978111+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-03T15:01:36.909984+00:00 10.215.168.64  2024-07-03T15:01:35.996388+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-03T15:01:37.118651+00:00 10.215.168.64  2024-07-03T15:01:36.205000+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-07-03T15:01:37.187567+00:00 10.215.168.64  2024-07-03T15:01:36.273807+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.189 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.189/0.189/0.189/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-03T15:01:42.576111+00:00 33.33.33.33  2024-07-03T15:01:41.744078+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-03T15:01:42.576111+00:00 33.33.33.33  2024-07-03T15:01:41.744579+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69498" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-03T15:01:42.576111+00:00 33.33.33.33  2024-07-03T15:01:41.744624+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-03T15:01:42.576111+00:00 33.33.33.33  2024-07-03T15:01:41.744658+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-03T15:01:42.576111+00:00 33.33.33.33  2024-07-03T15:01:41.767244+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-03T15:01:42.576111+00:00 33.33.33.33  2024-07-03T15:01:41.769317+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-03T15:01:42.576270+00:00 33.33.33.33  2024-07-03T15:01:41.769367+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-03T15:01:42.576270+00:00 33.33.33.33  2024-07-03T15:01:41.769415+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69610" x-info="https://www.rsyslog.com"] start
2024-07-03T15:01:42.576855+00:00 33.33.33.33  2024-07-03T15:01:41.770103+00:00 daemon-notice osdx cfgd[1440]:  [51147]Completed change to active configuration
2024-07-03T15:01:42.578908+00:00 33.33.33.33  2024-07-03T15:01:41.772100+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-03T15:01:42.594168+00:00 33.33.33.33  2024-07-03T15:01:41.787345+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-03T15:01:42.721918+00:00 33.33.33.33  2024-07-03T15:01:41.914991+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-07-03T15:01:42.776618+00:00 33.33.33.33  2024-07-03T15:01:41.969572+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.170 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.170/0.170/0.170/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-03T15:01:43.188576+00:00 33.33.33.33  2024-07-03T15:01:42.381722+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-07-03T15:01:43.344832+00:00 33.33.33.33  2024-07-03T15:01:42.537768+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-07-03T15:01:43.364550+00:00 33.33.33.33  2024-07-03T15:01:42.557690+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-07-03T15:01:44.136523+00:00 33.33.33.33  2024-07-03T15:01:43.329623+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-07-03T15:01:44.483452+00:00 33.33.33.33  2024-07-03T15:01:43.676339+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-07-03T15:01:44.537194+00:00 33.33.33.33  2024-07-03T15:01:43.730262+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-07-03T15:01:44.646201+00:00 33.33.33.33  2024-07-03T15:01:43.839251+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-07-03T15:01:44.714358+00:00 33.33.33.33  2024-07-03T15:01:43.907436+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2024-07-03T15:01:48.941420+00:00 33.33.33.33  2024-07-03T15:01:48.372061+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-03T15:01:48.941420+00:00 33.33.33.33  2024-07-03T15:01:48.372233+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69697" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-03T15:01:48.941420+00:00 33.33.33.33  2024-07-03T15:01:48.372687+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-03T15:01:48.941420+00:00 33.33.33.33  2024-07-03T15:01:48.372780+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-03T15:01:48.941420+00:00 33.33.33.33  2024-07-03T15:01:48.395879+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-03T15:01:48.941420+00:00 33.33.33.33  2024-07-03T15:01:48.398304+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-03T15:01:48.941420+00:00 33.33.33.33  2024-07-03T15:01:48.398341+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69840" x-info="https://www.rsyslog.com"] start
2024-07-03T15:01:48.941420+00:00 33.33.33.33  2024-07-03T15:01:48.398377+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-03T15:01:48.941420+00:00 33.33.33.33  2024-07-03T15:01:48.398830+00:00 daemon-notice osdx cfgd[1440]:  [51147]Completed change to active configuration
2024-07-03T15:01:48.941420+00:00 33.33.33.33  2024-07-03T15:01:48.398946+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2024-07-03T15:01:48.943635+00:00 33.33.33.33  2024-07-03T15:01:48.401227+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-03T15:01:48.973208+00:00 33.33.33.33  2024-07-03T15:01:48.430721+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-03T15:01:49.136204+00:00 33.33.33.33  2024-07-03T15:01:48.593605+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1  vrf VRF0    count 1 size 56 timeout 1'.
2024-07-03T15:01:49.193320+00:00 33.33.33.33  2024-07-03T15:01:48.650756+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.152 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.152/0.152/0.152/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-03T15:01:55.182264+00:00 10.215.168.64  2024-07-03T15:01:54.013014+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-03T15:01:55.182318+00:00 10.215.168.64  2024-07-03T15:01:54.013197+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="69927" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-03T15:01:55.182318+00:00 10.215.168.64  2024-07-03T15:01:54.013903+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-03T15:01:55.182318+00:00 10.215.168.64  2024-07-03T15:01:54.014015+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-03T15:01:55.182318+00:00 10.215.168.64  2024-07-03T15:01:54.039642+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-03T15:01:55.182318+00:00 10.215.168.64  2024-07-03T15:01:54.045758+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-03T15:01:55.182318+00:00 10.215.168.64  2024-07-03T15:01:54.045800+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="70062" x-info="https://www.rsyslog.com"] start
2024-07-03T15:01:55.182318+00:00 10.215.168.64  2024-07-03T15:01:54.045823+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-03T15:01:55.182318+00:00 10.215.168.64  2024-07-03T15:01:54.047362+00:00 daemon-notice osdx cfgd[1440]:  [51147]Completed change to active configuration
2024-07-03T15:01:55.182318+00:00 10.215.168.64  2024-07-03T15:01:54.049231+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-03T15:01:55.182318+00:00 10.215.168.64  2024-07-03T15:01:54.080042+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-03T15:01:55.182318+00:00 10.215.168.64  2024-07-03T15:01:54.146717+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2024-07-03T15:01:55.182318+00:00 10.215.168.64  2024-07-03T15:01:54.146785+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2024-07-03T15:01:55.255958+00:00 10.215.168.64  2024-07-03T15:01:54.228889+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-07-03T15:01:56.550005+00:00 10.215.168.64  2024-07-03T15:01:55.522826+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.179 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.179/0.179/0.179/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-03T15:02:02.731782+00:00 33.33.33.33  2024-07-03T15:02:02.112956+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-03T15:02:02.731782+00:00 33.33.33.33  2024-07-03T15:02:02.113113+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="70158" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-03T15:02:02.731782+00:00 33.33.33.33  2024-07-03T15:02:02.113547+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-03T15:02:02.731782+00:00 33.33.33.33  2024-07-03T15:02:02.113667+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-03T15:02:02.731782+00:00 33.33.33.33  2024-07-03T15:02:02.154349+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-03T15:02:02.731782+00:00 33.33.33.33  2024-07-03T15:02:02.156315+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-03T15:02:02.731782+00:00 33.33.33.33  2024-07-03T15:02:02.156360+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="70274" x-info="https://www.rsyslog.com"] start
2024-07-03T15:02:02.731782+00:00 33.33.33.33  2024-07-03T15:02:02.156382+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-03T15:02:02.773268+00:00 33.33.33.33  2024-07-03T15:02:02.157740+00:00 daemon-notice osdx cfgd[1440]:  [51147]Completed change to active configuration
2024-07-03T15:02:02.773268+00:00 33.33.33.33  2024-07-03T15:02:02.160495+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-03T15:02:02.773268+00:00 33.33.33.33  2024-07-03T15:02:02.175867+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-03T15:02:02.773268+00:00 33.33.33.33  2024-07-03T15:02:02.334235+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-07-03T15:02:02.773268+00:00 33.33.33.33  2024-07-03T15:02:02.355415+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2024-07-03T15:02:02.773268+00:00 33.33.33.33  2024-07-03T15:02:02.355472+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2024-07-03T15:02:03.973684+00:00 33.33.33.33  2024-07-03T15:02:03.605111+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.