Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2024-07-17 15:45:02.612615 daemon-err , ntpd[95182]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:45:02.612715 daemon-err , ntpd[95182]: IO: bind(21) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address 2024-07-17 15:45:02.612729 daemon-err , ntpd[95182]: IO: unable to create socket on eth0 (5) for fe80::dcad:beff:feef:6c10%2#123 2024-07-17 15:45:03.648867 daemon-err , ntpd[95182]: IO: bind(22) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address 2024-07-17 15:45:03.648916 daemon-err , ntpd[95182]: IO: unable to create socket on eth0 (6) for fe80::dcad:beff:feef:6c10%2#123 2019-02-01 12:00:01.910736 daemon-err , ntpd[95435]: IO: bind(20) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address 2019-02-01 12:00:01.910757 daemon-err , ntpd[95435]: IO: unable to create socket on eth0 (4) for fe80::dcad:beff:feef:6c10%2#123 2019-02-01 12:00:02.964851 daemon-err , ntpd[95476]: IO: bind(21) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address 2019-02-01 12:00:02.964874 daemon-err , ntpd[95476]: IO: unable to create socket on eth0 (5) for fe80::dcad:beff:feef:6c10%2#123 2024-07-17 15:46:35.072252 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 225 2024-07-17 15:46:35.072308 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 225 2024-07-16 12:00:00.746794 daemon-err , ntpd[97305]: IO: bind(22) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address 2024-07-16 12:00:00.746822 daemon-err , ntpd[97305]: IO: unable to create socket on eth0 (6) for fe80::dcad:beff:feef:6c10%2#123 2024-07-17 15:46:52.368743 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 227 2024-07-17 15:46:52.368804 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 227 2024-07-17 15:46:52.464846 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 226 2024-07-17 15:46:52.464899 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 226 2024-07-17 15:47:09.667229 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 230 2024-07-17 15:47:09.667280 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 230 2024-07-17 15:47:09.747217 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 229 2024-07-17 15:47:09.747266 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 229 2024-07-17 15:47:51.772236 daemon-err , bgpd[98990]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum0 in VRF 0 2024-07-17 15:48:42.902521 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 233 2024-07-17 15:48:42.902587 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 233 2024-07-17 15:48:54.323616 daemon-err , zebra[1205]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: No such file or directory, type=RTM_DELNEXTHOP(105), seq=5193, pid=3298799966 2024-07-17 15:48:54.323662 daemon-err , zebra[1205]: [YA619-S7J5M][EC 4043309075] Failed to uninstall Nexthop ID (2340) from the kernel 2024-07-17 15:49:51.027777 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan3 in VRF 238 2024-07-17 15:49:51.027846 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan3 in VRF 238 2024-07-17 15:49:51.119524 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant2 in VRF 237 2024-07-17 15:49:51.119584 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant2 in VRF 237 2024-07-17 15:49:51.203607 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan2 in VRF 236 2024-07-17 15:49:51.203659 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan2 in VRF 236 2024-07-17 15:49:51.287480 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan1 in VRF 235 2024-07-17 15:49:51.287530 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan1 in VRF 235 2024-07-17 15:49:51.363397 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant1 in VRF 234 2024-07-17 15:49:51.363446 daemon-err , staticd[1210]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant1 in VRF 234 2024-07-17 15:50:25.761976 daemon-err , cfgd[1240]: External python command [cfg.vpn.openvpn scep_trap ovpn1] finished with status 1 2024-07-17 15:50:26.371420 daemon-err , cfgd[1240]: External python command [cfg.vpn.openvpn scep_trap ovpn1] finished with status 1 2024-07-17 15:51:13.380368 daemon-err , cfgd[1240]: External python command [op.pki scep info CSR] finished with status 1 2024-07-17 15:51:33.447984 daemon-err , cfgd[1240]: External python command [op.pki scep info CSR] finished with status 1 2024-07-17 15:51:39.293704 user-err , scep_controller: Failed to get CA certificate for CSR 'CSR' 2024-07-17 15:51:59.902982 daemon-err , cfgd[1240]: External python command [cfg.vpn.openvpn scep_trap ovpn1] finished with status 1 2024-07-17 15:51:59.920542 daemon-err , modulelauncher[104769]: osdx.utils.xos cmd error: swanctl -q 2024-07-17 15:51:59.920606 daemon-err , modulelauncher[104769]: Command 'swanctl -q' returned non-zero exit status 22. 2024-07-17 15:51:59.985123 daemon-err , cfgd[1240]: External python command [op.pki scep info CSR] finished with status 1 2024-07-17 15:52:00.364089 daemon-err , cfgd[1240]: External python command [cfg.vpn.openvpn scep_trap ovpn1] finished with status 1 2024-07-17 15:52:27.535085 daemon-err , ntpd[105017]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:27.535227 daemon-err , ntpd[105017]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:27.977497 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18yFLiyukPUKfcyY5xFLN9CKZ/Zc3UBpkk=] finished with status 1 2024-07-17 15:52:27.977549 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:52:27.977565 daemon-err , cfgd[1240]: \"U2FsdGVkX18yFLiyukPUKfcyY5xFLN9CKZ/Zc3UBpkk=\" strong-password: score is too weak 2024-07-17 15:52:27.977587 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:52:27.979201 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18yFLiyukPUKfcyY5xFLN9CKZ/Zc3UBpkk=\" strong-password: score is too weak#012Commit validation failed#012 2024-07-17 15:52:32.520241 daemon-err , ntpd[105172]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:32.520355 daemon-err , ntpd[105172]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:33.114329 daemon-err , ntpd[105208]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:33.114436 daemon-err , ntpd[105208]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:33.714664 daemon-err , ntpd[105244]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:33.714853 daemon-err , ntpd[105244]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:34.333610 daemon-err , ntpd[105280]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:34.333831 daemon-err , ntpd[105280]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:34.897150 daemon-err , ntpd[105316]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:34.897379 daemon-err , ntpd[105316]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:35.439348 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=] finished with status 1 2024-07-17 15:52:35.439488 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:52:35.439525 daemon-err , cfgd[1240]: \"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak 2024-07-17 15:52:35.439566 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:52:35.441962 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak#012Commit validation failed#012 2024-07-17 15:52:36.053410 daemon-err , ntpd[105381]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:36.054788 daemon-err , ntpd[105381]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:36.689718 daemon-err , ntpd[105417]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:36.689745 daemon-err , ntpd[105417]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:37.331372 daemon-err , ntpd[105454]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:37.331546 daemon-err , ntpd[105454]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:37.989264 daemon-err , ntpd[105490]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:37.989416 daemon-err , ntpd[105490]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:38.598046 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=] finished with status 1 2024-07-17 15:52:38.598191 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:52:38.598235 daemon-err , cfgd[1240]: \"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak 2024-07-17 15:52:38.598278 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:52:38.600286 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak#012Commit validation failed#012 2024-07-17 15:52:39.165595 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=] finished with status 1 2024-07-17 15:52:39.165741 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:52:39.165776 daemon-err , cfgd[1240]: \"U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=\" strong-password: score is too weak 2024-07-17 15:52:39.165815 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:52:39.168192 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=\" strong-password: score is too weak#012Commit validation failed#012 2024-07-17 15:52:39.810555 daemon-err , ntpd[105580]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:39.810621 daemon-err , ntpd[105580]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:40.377552 daemon-err , ntpd[105616]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:40.377654 daemon-err , ntpd[105616]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:40.955639 daemon-err , ntpd[105652]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:40.955807 daemon-err , ntpd[105652]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:41.475416 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=] finished with status 1 2024-07-17 15:52:41.475468 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:52:41.475485 daemon-err , cfgd[1240]: \"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak 2024-07-17 15:52:41.475508 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:52:41.477479 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak#012Commit validation failed#012 2024-07-17 15:52:42.036383 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=] finished with status 1 2024-07-17 15:52:42.036447 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:52:42.036485 daemon-err , cfgd[1240]: \"U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=\" strong-password: score is too weak 2024-07-17 15:52:42.036511 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:52:42.038539 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=\" strong-password: score is too weak#012Commit validation failed#012 2024-07-17 15:52:42.604462 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZiyRcSQHiKFMfgG87IXPTZA=] finished with status 1 2024-07-17 15:52:42.604515 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:52:42.604533 daemon-err , cfgd[1240]: \"U2FsdGVkX18DE7d4p72hZiyRcSQHiKFMfgG87IXPTZA=\" strong-password: score is too weak 2024-07-17 15:52:42.604557 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:52:42.606471 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZiyRcSQHiKFMfgG87IXPTZA=\" strong-password: score is too weak#012Commit validation failed#012 2024-07-17 15:52:43.276646 daemon-err , ntpd[105767]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:43.276803 daemon-err , ntpd[105767]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:43.873333 daemon-err , ntpd[105803]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:43.873556 daemon-err , ntpd[105803]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:44.460593 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=] finished with status 1 2024-07-17 15:52:44.460643 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:52:44.460663 daemon-err , cfgd[1240]: \"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak 2024-07-17 15:52:44.460682 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:52:44.462520 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak#012Commit validation failed#012 2024-07-17 15:52:45.002876 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=] finished with status 1 2024-07-17 15:52:45.002942 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:52:45.002964 daemon-err , cfgd[1240]: \"U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=\" strong-password: score is too weak 2024-07-17 15:52:45.002984 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:52:45.004721 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=\" strong-password: score is too weak#012Commit validation failed#012 2024-07-17 15:52:45.540607 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZiyRcSQHiKFMfgG87IXPTZA=] finished with status 1 2024-07-17 15:52:45.540664 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:52:45.540689 daemon-err , cfgd[1240]: \"U2FsdGVkX18DE7d4p72hZiyRcSQHiKFMfgG87IXPTZA=\" strong-password: score is too weak 2024-07-17 15:52:45.540716 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:52:45.542120 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZiyRcSQHiKFMfgG87IXPTZA=\" strong-password: score is too weak#012Commit validation failed#012 2024-07-17 15:52:46.091803 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZsL/MA7fyNh4u8ffWRbPRFw=] finished with status 1 2024-07-17 15:52:46.091996 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:52:46.092055 daemon-err , cfgd[1240]: \"U2FsdGVkX18DE7d4p72hZsL/MA7fyNh4u8ffWRbPRFw=\" strong-password: score is too weak 2024-07-17 15:52:46.092108 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:52:46.094468 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZsL/MA7fyNh4u8ffWRbPRFw=\" strong-password: score is too weak#012Commit validation failed#012 2024-07-17 15:52:52.567779 daemon-err , ntpd[106061]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:52.567925 daemon-err , ntpd[106061]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:52:58.990892 daemon-err , ntpd[106251]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:52:58.991005 daemon-err , ntpd[106251]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:53:03.786171 daemon-err , cfgd[1240]: [93486]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-07-17 15:53:04.132501 daemon-err , cfgd[1240]: [93486]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-07-17 15:53:05.286508 daemon-err , ntpd[106487]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:53:05.286638 daemon-err , ntpd[106487]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:53:05.927253 daemon-err , ntpd[106524]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:53:05.927268 daemon-err , ntpd[106524]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:53:06.574148 daemon-err , ntpd[106560]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:53:06.574277 daemon-err , ntpd[106560]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:53:14.599930 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18bSoSA/yYt5/JvNZiTqEY+BK6gZ2blW18=] finished with status 1 2024-07-17 15:53:14.600079 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:53:14.600122 daemon-err , cfgd[1240]: \"U2FsdGVkX18bSoSA/yYt5/JvNZiTqEY+BK6gZ2blW18=\" strong-password: score is too weak 2024-07-17 15:53:14.600165 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:53:14.601925 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18bSoSA/yYt5/JvNZiTqEY+BK6gZ2blW18=\" strong-password: score is too weak#012Commit validation failed#012 2024-07-17 15:53:15.108331 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18S50702MpF5fIxj8n72KUr/0NucMqj74U=] finished with status 1 2024-07-17 15:53:15.108394 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:53:15.108420 daemon-err , cfgd[1240]: \"U2FsdGVkX18S50702MpF5fIxj8n72KUr/0NucMqj74U=\" strong-password: score is too weak 2024-07-17 15:53:15.108444 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:53:15.110190 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18S50702MpF5fIxj8n72KUr/0NucMqj74U=\" strong-password: score is too weak#012Commit validation failed#012 2024-07-17 15:53:15.712549 daemon-err , ntpd[106918]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:53:15.712744 daemon-err , ntpd[106918]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:53:20.600612 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18JvGQYOugxf+i81z2wcrYpE8U9ABU14r4=] finished with status 2 2024-07-17 15:53:20.600673 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:53:20.600707 daemon-err , cfgd[1240]: \"U2FsdGVkX18JvGQYOugxf+i81z2wcrYpE8U9ABU14r4=\" strong-password: not long enough 2024-07-17 15:53:20.600731 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:53:20.602697 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18JvGQYOugxf+i81z2wcrYpE8U9ABU14r4=\" strong-password: not long enough#012Commit validation failed#012 2024-07-17 15:53:21.386287 daemon-err , ntpd[107090]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:53:21.386452 daemon-err , ntpd[107090]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:53:26.453644 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/zGlvYHL98PQwWnu1CPrg6mYKaRk2yROE=] finished with status 3 2024-07-17 15:53:26.453719 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:53:26.453737 daemon-err , cfgd[1240]: \"U2FsdGVkX1/zGlvYHL98PQwWnu1CPrg6mYKaRk2yROE=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-07-17 15:53:26.453758 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:53:26.455282 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX1/zGlvYHL98PQwWnu1CPrg6mYKaRk2yROE=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-07-17 15:53:27.013754 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX189Jf29LMgdcl8d9JE0V0DoAGwqxQnf5as=] finished with status 3 2024-07-17 15:53:27.013900 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:53:27.013941 daemon-err , cfgd[1240]: \"U2FsdGVkX189Jf29LMgdcl8d9JE0V0DoAGwqxQnf5as=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-07-17 15:53:27.013977 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:53:27.015924 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX189Jf29LMgdcl8d9JE0V0DoAGwqxQnf5as=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-07-17 15:53:27.546972 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18oRG4gsdnxT5J7+TgBu1IFZS+w7xMuuqA=] finished with status 3 2024-07-17 15:53:27.547118 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:53:27.547159 daemon-err , cfgd[1240]: \"U2FsdGVkX18oRG4gsdnxT5J7+TgBu1IFZS+w7xMuuqA=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-07-17 15:53:27.547206 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:53:27.548873 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18oRG4gsdnxT5J7+TgBu1IFZS+w7xMuuqA=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-07-17 15:53:28.102427 daemon-err , cfgd[1240]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+k2UktDf3U7f+ESsvHcxGbI7MNTSuvxn0=] finished with status 1 2024-07-17 15:53:28.102501 daemon-err , cfgd[1240]: [ system ntp authentication-key 1 encrypted-key ] 2024-07-17 15:53:28.102537 daemon-err , cfgd[1240]: \"U2FsdGVkX1+k2UktDf3U7f+ESsvHcxGbI7MNTSuvxn0=\" strong-password: score is too weak 2024-07-17 15:53:28.102572 daemon-err , cfgd[1240]: Commit validation failed 2024-07-17 15:53:28.104295 daemon-err , cfgd[1240]: [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX1+k2UktDf3U7f+ESsvHcxGbI7MNTSuvxn0=\" strong-password: score is too weak#012Commit validation failed#012 2024-07-17 15:53:28.730615 daemon-err , ntpd[107319]: AUTH: authreadkeys: reading /etc/ntp.keys 2024-07-17 15:53:28.730751 daemon-err , ntpd[107319]: AUTH: authreadkeys: added 1 keys 2024-07-17 15:53:29.104053 daemon-err , cfgd[1240]: [93486]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-07-17 15:53:29.448559 daemon-err , cfgd[1240]: [93486]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-07-17 15:53:29.831058 daemon-err , cfgd[1240]: [93486]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-07-17 15:53:30.156748 daemon-err , cfgd[1240]: [93486]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-07-17 15:53:39.348346 daemon-info , systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-17 15:53:39.348670 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="59611" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-17 15:53:39.349254 daemon-info , systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-17 15:53:39.349367 daemon-info , systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-17 15:53:39.378116 daemon-info , systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-17 15:53:39.380109 syslog-info , rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-17 15:53:39.380157 daemon-info , systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-17 15:53:39.380479 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="107713" x-info="https://www.rsyslog.com"] start 2024-07-17 15:53:39.380807 daemon-notice , cfgd[1240]: [93486]Completed change to active configuration 2024-07-17 15:53:39.382846 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2024-07-17 15:53:39.400285 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2024-07-17 15:53:39.537058 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.Show output
2024-07-17 15:53:45.467532 daemon-info , systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-17 15:53:45.468386 daemon-info , systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-17 15:53:45.468424 daemon-info , systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-17 15:53:45.515922 daemon-info , systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-17 15:53:45.518888 daemon-info , systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-17 15:53:46.216456 daemon-info , systemd[1]: Created slice system-dhcpd.slice - Slice /system/dhcpd. 2024-07-17 15:53:46.263973 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
Started.*"DHCP Server Service instance main"\.Show output
2024-07-17 15:53:51.653109 daemon-info , systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-17 15:53:51.653858 daemon-info , systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-17 15:53:51.653976 daemon-info , systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-17 15:53:51.670932 daemon-info , systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-17 15:53:51.672605 daemon-info , systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-17 15:53:52.346813 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.147 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.147/0.147/0.147/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-07-17T15:53:58.506238+00:00 10.215.168.64 2024-07-17T15:53:57.741354+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-17T15:53:58.506238+00:00 10.215.168.64 2024-07-17T15:53:57.741480+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="108292" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-17T15:53:58.506238+00:00 10.215.168.64 2024-07-17T15:53:57.742395+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-17T15:53:58.506238+00:00 10.215.168.64 2024-07-17T15:53:57.742451+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-17T15:53:58.506238+00:00 10.215.168.64 2024-07-17T15:53:57.762799+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-17T15:53:58.506238+00:00 10.215.168.64 2024-07-17T15:53:57.765158+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-17T15:53:58.506238+00:00 10.215.168.64 2024-07-17T15:53:57.765199+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-17T15:53:58.506238+00:00 10.215.168.64 2024-07-17T15:53:57.765238+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="108417" x-info="https://www.rsyslog.com"] start 2024-07-17T15:53:58.506238+00:00 10.215.168.64 2024-07-17T15:53:57.766277+00:00 daemon-notice osdx cfgd[1240]: [93486]Completed change to active configuration 2024-07-17T15:53:58.508358+00:00 10.215.168.64 2024-07-17T15:53:57.768573+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-07-17T15:53:58.523294+00:00 10.215.168.64 2024-07-17T15:53:57.783519+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-07-17T15:53:58.663799+00:00 10.215.168.64 2024-07-17T15:53:57.923978+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-07-17T15:53:58.718778+00:00 10.215.168.64 2024-07-17T15:53:57.978875+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.132 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.132/0.132/0.132/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-07-17T15:53:59.103953+00:00 10.215.168.64 2024-07-17T15:53:58.364097+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-07-17T15:53:59.283959+00:00 10.215.168.64 2024-07-17T15:53:58.543967+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-07-17T15:53:59.299013+00:00 10.215.168.64 2024-07-17T15:53:58.559157+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-07-17T15:54:00.054923+00:00 10.215.168.64 2024-07-17T15:53:59.315028+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-07-17T15:54:00.371630+00:00 10.215.168.64 2024-07-17T15:53:59.631677+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-07-17T15:54:00.430984+00:00 10.215.168.64 2024-07-17T15:53:59.691059+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-07-17T15:54:00.530147+00:00 10.215.168.64 2024-07-17T15:53:59.790265+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-07-17T15:54:00.601196+00:00 10.215.168.64 2024-07-17T15:53:59.861244+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2024-07-17T15:54:04.337103+00:00 10.215.168.64 2024-07-17T15:54:03.944305+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-17T15:54:04.337103+00:00 10.215.168.64 2024-07-17T15:54:03.944419+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="108504" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-17T15:54:04.337103+00:00 10.215.168.64 2024-07-17T15:54:03.945161+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-17T15:54:04.337103+00:00 10.215.168.64 2024-07-17T15:54:03.945203+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-17T15:54:04.337103+00:00 10.215.168.64 2024-07-17T15:54:03.966584+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-17T15:54:04.337211+00:00 10.215.168.64 2024-07-17T15:54:03.968920+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-17T15:54:04.337220+00:00 10.215.168.64 2024-07-17T15:54:03.968983+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-17T15:54:04.337336+00:00 10.215.168.64 2024-07-17T15:54:03.969288+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="108660" x-info="https://www.rsyslog.com"] start 2024-07-17T15:54:04.337825+00:00 10.215.168.64 2024-07-17T15:54:03.969778+00:00 daemon-notice osdx cfgd[1240]: [93486]Completed change to active configuration 2024-07-17T15:54:04.340175+00:00 10.215.168.64 2024-07-17T15:54:03.972074+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-07-17T15:54:04.355303+00:00 10.215.168.64 2024-07-17T15:54:03.987220+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-07-17T15:54:04.558166+00:00 10.215.168.64 2024-07-17T15:54:04.190061+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2024-07-17T15:54:04.617752+00:00 10.215.168.64 2024-07-17T15:54:04.249587+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-interface eth0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.124 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.124/0.124/0.124/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-07-17T15:54:05.020449+00:00 10.215.168.64 2024-07-17T15:54:04.652186+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-07-17T15:54:05.174165+00:00 10.215.168.64 2024-07-17T15:54:04.805879+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-07-17T15:54:05.189483+00:00 10.215.168.64 2024-07-17T15:54:04.821207+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-07-17T15:54:05.902459+00:00 10.215.168.64 2024-07-17T15:54:05.534220+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-07-17T15:54:06.244424+00:00 10.215.168.64 2024-07-17T15:54:05.876198+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-07-17T15:54:06.295093+00:00 10.215.168.64 2024-07-17T15:54:05.926758+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-07-17T15:54:06.401851+00:00 10.215.168.64 2024-07-17T15:54:06.033433+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-07-17T15:54:06.463420+00:00 10.215.168.64 2024-07-17T15:54:06.095211+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2024-07-17T15:54:09.973478+00:00 10.215.168.64 2024-07-17T15:54:09.779429+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-17T15:54:09.973478+00:00 10.215.168.64 2024-07-17T15:54:09.779696+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="108747" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-17T15:54:09.973478+00:00 10.215.168.64 2024-07-17T15:54:09.780386+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-17T15:54:09.973478+00:00 10.215.168.64 2024-07-17T15:54:09.780478+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-17T15:54:09.973478+00:00 10.215.168.64 2024-07-17T15:54:09.803318+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-17T15:54:09.973478+00:00 10.215.168.64 2024-07-17T15:54:09.805191+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-17T15:54:09.973478+00:00 10.215.168.64 2024-07-17T15:54:09.805232+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="108900" x-info="https://www.rsyslog.com"] start 2024-07-17T15:54:09.973478+00:00 10.215.168.64 2024-07-17T15:54:09.805257+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-17T15:54:09.973757+00:00 10.215.168.64 2024-07-17T15:54:09.806095+00:00 daemon-notice osdx cfgd[1240]: [93486]Completed change to active configuration 2024-07-17T15:54:09.976308+00:00 10.215.168.64 2024-07-17T15:54:09.808628+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-07-17T15:54:10.028176+00:00 10.215.168.64 2024-07-17T15:54:09.860409+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-07-17T15:54:10.181400+00:00 10.215.168.64 2024-07-17T15:54:10.013656+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-07-17T15:54:10.242854+00:00 10.215.168.64 2024-07-17T15:54:10.075094+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and UDP
Description
Add a remote host to send syslog messages through a specific local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.249 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.249/0.249/0.249/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-07-17T15:54:16.067205+00:00 33.33.33.33 2024-07-17T15:54:15.865341+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-17T15:54:16.067205+00:00 33.33.33.33 2024-07-17T15:54:15.865457+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="108987" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-17T15:54:16.067205+00:00 33.33.33.33 2024-07-17T15:54:15.866074+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-17T15:54:16.067205+00:00 33.33.33.33 2024-07-17T15:54:15.866113+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-17T15:54:16.067205+00:00 33.33.33.33 2024-07-17T15:54:15.894404+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-17T15:54:16.067205+00:00 33.33.33.33 2024-07-17T15:54:15.897239+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-17T15:54:16.067205+00:00 33.33.33.33 2024-07-17T15:54:15.897271+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="109122" x-info="https://www.rsyslog.com"] start 2024-07-17T15:54:16.067205+00:00 33.33.33.33 2024-07-17T15:54:15.897297+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-17T15:54:16.067205+00:00 33.33.33.33 2024-07-17T15:54:15.898221+00:00 daemon-notice osdx cfgd[1240]: [93486]Completed change to active configuration 2024-07-17T15:54:16.069573+00:00 33.33.33.33 2024-07-17T15:54:15.900791+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-07-17T15:54:16.085785+00:00 33.33.33.33 2024-07-17T15:54:15.917020+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-07-17T15:54:16.245761+00:00 33.33.33.33 2024-07-17T15:54:16.076804+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-07-17T15:54:16.301481+00:00 33.33.33.33 2024-07-17T15:54:16.132447+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and VRF
Description
Add a remote host to send syslog messages through a VRF and a local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.160 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.160/0.160/0.160/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-07-17T15:54:16.691293+00:00 33.33.33.33 2024-07-17T15:54:16.522381+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-07-17T15:54:16.870849+00:00 33.33.33.33 2024-07-17T15:54:16.701835+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-07-17T15:54:16.890033+00:00 33.33.33.33 2024-07-17T15:54:16.721133+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-07-17T15:54:17.647494+00:00 33.33.33.33 2024-07-17T15:54:17.478593+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-07-17T15:54:17.985239+00:00 33.33.33.33 2024-07-17T15:54:17.816257+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-07-17T15:54:18.034834+00:00 33.33.33.33 2024-07-17T15:54:17.865743+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-07-17T15:54:18.142553+00:00 33.33.33.33 2024-07-17T15:54:17.973468+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-07-17T15:54:18.206635+00:00 33.33.33.33 2024-07-17T15:54:18.037744+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2024-07-17T15:54:22.197857+00:00 33.33.33.33 2024-07-17T15:54:21.217645+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-17T15:54:22.197857+00:00 33.33.33.33 2024-07-17T15:54:21.217963+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="109209" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-17T15:54:22.197857+00:00 33.33.33.33 2024-07-17T15:54:21.218475+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-17T15:54:22.197857+00:00 33.33.33.33 2024-07-17T15:54:21.218594+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-17T15:54:22.197857+00:00 33.33.33.33 2024-07-17T15:54:21.239443+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-17T15:54:22.197857+00:00 33.33.33.33 2024-07-17T15:54:21.241261+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-17T15:54:22.197857+00:00 33.33.33.33 2024-07-17T15:54:21.241301+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="109377" x-info="https://www.rsyslog.com"] start 2024-07-17T15:54:22.197857+00:00 33.33.33.33 2024-07-17T15:54:21.241333+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-17T15:54:22.198070+00:00 33.33.33.33 2024-07-17T15:54:21.241883+00:00 syslog-warning osdx rsyslogd: bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ] 2024-07-17T15:54:22.198075+00:00 33.33.33.33 2024-07-17T15:54:21.242189+00:00 daemon-notice osdx cfgd[1240]: [93486]Completed change to active configuration 2024-07-17T15:54:22.200334+00:00 33.33.33.33 2024-07-17T15:54:21.244342+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-07-17T15:54:22.216782+00:00 33.33.33.33 2024-07-17T15:54:21.260924+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-07-17T15:54:22.429639+00:00 33.33.33.33 2024-07-17T15:54:21.473738+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2024-07-17T15:54:22.485202+00:00 33.33.33.33 2024-07-17T15:54:21.529182+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.169 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.169/0.169/0.169/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-07-17T15:54:27.963497+00:00 10.215.168.64 2024-07-17T15:54:26.755333+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-17T15:54:27.963497+00:00 10.215.168.64 2024-07-17T15:54:26.755457+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="109464" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-17T15:54:27.963575+00:00 10.215.168.64 2024-07-17T15:54:26.755924+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-17T15:54:27.963575+00:00 10.215.168.64 2024-07-17T15:54:26.756020+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-17T15:54:27.963575+00:00 10.215.168.64 2024-07-17T15:54:26.803738+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-17T15:54:27.963575+00:00 10.215.168.64 2024-07-17T15:54:26.810459+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-17T15:54:27.963575+00:00 10.215.168.64 2024-07-17T15:54:26.810502+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="109624" x-info="https://www.rsyslog.com"] start 2024-07-17T15:54:27.963575+00:00 10.215.168.64 2024-07-17T15:54:26.810532+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-17T15:54:27.963575+00:00 10.215.168.64 2024-07-17T15:54:26.811433+00:00 daemon-notice osdx cfgd[1240]: [93486]Completed change to active configuration 2024-07-17T15:54:27.963575+00:00 10.215.168.64 2024-07-17T15:54:26.813469+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-07-17T15:54:27.963575+00:00 10.215.168.64 2024-07-17T15:54:26.837547+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-07-17T15:54:27.963575+00:00 10.215.168.64 2024-07-17T15:54:26.901853+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2024-07-17T15:54:27.963575+00:00 10.215.168.64 2024-07-17T15:54:26.901927+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2024-07-17T15:54:28.031873+00:00 10.215.168.64 2024-07-17T15:54:26.983499+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-07-17T15:54:29.309082+00:00 10.215.168.64 2024-07-17T15:54:28.260630+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Local Address Single TLS
Description
Add a secured remote host to send syslog messages and show the host name from a fiven local-address
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.275 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.275/0.275/0.275/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-07-17T15:54:35.349711+00:00 33.33.33.33 2024-07-17T15:54:34.061798+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-07-17T15:54:35.350006+00:00 33.33.33.33 2024-07-17T15:54:34.062057+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="109720" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-07-17T15:54:35.350006+00:00 33.33.33.33 2024-07-17T15:54:34.062415+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-07-17T15:54:35.350006+00:00 33.33.33.33 2024-07-17T15:54:34.062547+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-07-17T15:54:35.350006+00:00 33.33.33.33 2024-07-17T15:54:34.085622+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-07-17T15:54:35.350006+00:00 33.33.33.33 2024-07-17T15:54:34.088150+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-07-17T15:54:35.350006+00:00 33.33.33.33 2024-07-17T15:54:34.088191+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="109859" x-info="https://www.rsyslog.com"] start 2024-07-17T15:54:35.350006+00:00 33.33.33.33 2024-07-17T15:54:34.088212+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-07-17T15:54:35.350006+00:00 33.33.33.33 2024-07-17T15:54:34.089212+00:00 daemon-notice osdx cfgd[1240]: [93486]Completed change to active configuration 2024-07-17T15:54:35.350006+00:00 33.33.33.33 2024-07-17T15:54:34.091666+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-07-17T15:54:35.350006+00:00 33.33.33.33 2024-07-17T15:54:34.110026+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-07-17T15:54:35.350006+00:00 33.33.33.33 2024-07-17T15:54:34.253629+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-07-17T15:54:35.350006+00:00 33.33.33.33 2024-07-17T15:54:34.470223+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2024-07-17T15:54:35.350006+00:00 33.33.33.33 2024-07-17T15:54:34.470277+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2024-07-17T15:54:36.397493+00:00 33.33.33.33 2024-07-17T15:54:35.526679+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.