Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2024-07-17 15:45:02.612615 daemon-err , ntpd[95182]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:45:02.612715 daemon-err , ntpd[95182]:  IO: bind(21) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address
2024-07-17 15:45:02.612729 daemon-err , ntpd[95182]:  IO: unable to create socket on eth0 (5) for fe80::dcad:beff:feef:6c10%2#123
2024-07-17 15:45:03.648867 daemon-err , ntpd[95182]:  IO: bind(22) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address
2024-07-17 15:45:03.648916 daemon-err , ntpd[95182]:  IO: unable to create socket on eth0 (6) for fe80::dcad:beff:feef:6c10%2#123
2019-02-01 12:00:01.910736 daemon-err , ntpd[95435]:  IO: bind(20) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address
2019-02-01 12:00:01.910757 daemon-err , ntpd[95435]:  IO: unable to create socket on eth0 (4) for fe80::dcad:beff:feef:6c10%2#123
2019-02-01 12:00:02.964851 daemon-err , ntpd[95476]:  IO: bind(21) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address
2019-02-01 12:00:02.964874 daemon-err , ntpd[95476]:  IO: unable to create socket on eth0 (5) for fe80::dcad:beff:feef:6c10%2#123
2024-07-17 15:46:35.072252 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 225
2024-07-17 15:46:35.072308 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 225
2024-07-16 12:00:00.746794 daemon-err , ntpd[97305]:  IO: bind(22) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address
2024-07-16 12:00:00.746822 daemon-err , ntpd[97305]:  IO: unable to create socket on eth0 (6) for fe80::dcad:beff:feef:6c10%2#123
2024-07-17 15:46:52.368743 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 227
2024-07-17 15:46:52.368804 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 227
2024-07-17 15:46:52.464846 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 226
2024-07-17 15:46:52.464899 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 226
2024-07-17 15:47:09.667229 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 230
2024-07-17 15:47:09.667280 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 230
2024-07-17 15:47:09.747217 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 229
2024-07-17 15:47:09.747266 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 229
2024-07-17 15:47:51.772236 daemon-err , bgpd[98990]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum0 in VRF 0
2024-07-17 15:48:42.902521 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 233
2024-07-17 15:48:42.902587 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 233
2024-07-17 15:48:54.323616 daemon-err , zebra[1205]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: No such file or directory, type=RTM_DELNEXTHOP(105), seq=5193, pid=3298799966
2024-07-17 15:48:54.323662 daemon-err , zebra[1205]:  [YA619-S7J5M][EC 4043309075] Failed to uninstall Nexthop ID (2340) from the kernel
2024-07-17 15:49:51.027777 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan3 in VRF 238
2024-07-17 15:49:51.027846 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan3 in VRF 238
2024-07-17 15:49:51.119524 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant2 in VRF 237
2024-07-17 15:49:51.119584 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant2 in VRF 237
2024-07-17 15:49:51.203607 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan2 in VRF 236
2024-07-17 15:49:51.203659 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan2 in VRF 236
2024-07-17 15:49:51.287480 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan1 in VRF 235
2024-07-17 15:49:51.287530 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan1 in VRF 235
2024-07-17 15:49:51.363397 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant1 in VRF 234
2024-07-17 15:49:51.363446 daemon-err , staticd[1210]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant1 in VRF 234
2024-07-17 15:50:25.761976 daemon-err , cfgd[1240]:  External python command [cfg.vpn.openvpn scep_trap ovpn1] finished with status 1
2024-07-17 15:50:26.371420 daemon-err , cfgd[1240]:  External python command [cfg.vpn.openvpn scep_trap ovpn1] finished with status 1
2024-07-17 15:51:13.380368 daemon-err , cfgd[1240]:  External python command [op.pki scep info CSR] finished with status 1
2024-07-17 15:51:33.447984 daemon-err , cfgd[1240]:  External python command [op.pki scep info CSR] finished with status 1
2024-07-17 15:51:39.293704 user-err , scep_controller:  Failed to get CA certificate for CSR 'CSR'
2024-07-17 15:51:59.902982 daemon-err , cfgd[1240]:  External python command [cfg.vpn.openvpn scep_trap ovpn1] finished with status 1
2024-07-17 15:51:59.920542 daemon-err , modulelauncher[104769]:  osdx.utils.xos cmd error: swanctl -q
2024-07-17 15:51:59.920606 daemon-err , modulelauncher[104769]:  Command 'swanctl -q' returned non-zero exit status 22.
2024-07-17 15:51:59.985123 daemon-err , cfgd[1240]:  External python command [op.pki scep info CSR] finished with status 1
2024-07-17 15:52:00.364089 daemon-err , cfgd[1240]:  External python command [cfg.vpn.openvpn scep_trap ovpn1] finished with status 1
2024-07-17 15:52:27.535085 daemon-err , ntpd[105017]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:27.535227 daemon-err , ntpd[105017]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:27.977497 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18yFLiyukPUKfcyY5xFLN9CKZ/Zc3UBpkk=] finished with status 1
2024-07-17 15:52:27.977549 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:52:27.977565 daemon-err , cfgd[1240]:  \"U2FsdGVkX18yFLiyukPUKfcyY5xFLN9CKZ/Zc3UBpkk=\" strong-password: score is too weak
2024-07-17 15:52:27.977587 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:52:27.979201 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18yFLiyukPUKfcyY5xFLN9CKZ/Zc3UBpkk=\" strong-password: score is too weak#012Commit validation failed#012
2024-07-17 15:52:32.520241 daemon-err , ntpd[105172]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:32.520355 daemon-err , ntpd[105172]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:33.114329 daemon-err , ntpd[105208]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:33.114436 daemon-err , ntpd[105208]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:33.714664 daemon-err , ntpd[105244]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:33.714853 daemon-err , ntpd[105244]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:34.333610 daemon-err , ntpd[105280]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:34.333831 daemon-err , ntpd[105280]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:34.897150 daemon-err , ntpd[105316]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:34.897379 daemon-err , ntpd[105316]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:35.439348 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=] finished with status 1
2024-07-17 15:52:35.439488 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:52:35.439525 daemon-err , cfgd[1240]:  \"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak
2024-07-17 15:52:35.439566 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:52:35.441962 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak#012Commit validation failed#012
2024-07-17 15:52:36.053410 daemon-err , ntpd[105381]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:36.054788 daemon-err , ntpd[105381]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:36.689718 daemon-err , ntpd[105417]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:36.689745 daemon-err , ntpd[105417]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:37.331372 daemon-err , ntpd[105454]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:37.331546 daemon-err , ntpd[105454]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:37.989264 daemon-err , ntpd[105490]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:37.989416 daemon-err , ntpd[105490]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:38.598046 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=] finished with status 1
2024-07-17 15:52:38.598191 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:52:38.598235 daemon-err , cfgd[1240]:  \"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak
2024-07-17 15:52:38.598278 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:52:38.600286 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak#012Commit validation failed#012
2024-07-17 15:52:39.165595 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=] finished with status 1
2024-07-17 15:52:39.165741 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:52:39.165776 daemon-err , cfgd[1240]:  \"U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=\" strong-password: score is too weak
2024-07-17 15:52:39.165815 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:52:39.168192 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=\" strong-password: score is too weak#012Commit validation failed#012
2024-07-17 15:52:39.810555 daemon-err , ntpd[105580]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:39.810621 daemon-err , ntpd[105580]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:40.377552 daemon-err , ntpd[105616]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:40.377654 daemon-err , ntpd[105616]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:40.955639 daemon-err , ntpd[105652]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:40.955807 daemon-err , ntpd[105652]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:41.475416 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=] finished with status 1
2024-07-17 15:52:41.475468 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:52:41.475485 daemon-err , cfgd[1240]:  \"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak
2024-07-17 15:52:41.475508 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:52:41.477479 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak#012Commit validation failed#012
2024-07-17 15:52:42.036383 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=] finished with status 1
2024-07-17 15:52:42.036447 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:52:42.036485 daemon-err , cfgd[1240]:  \"U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=\" strong-password: score is too weak
2024-07-17 15:52:42.036511 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:52:42.038539 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=\" strong-password: score is too weak#012Commit validation failed#012
2024-07-17 15:52:42.604462 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZiyRcSQHiKFMfgG87IXPTZA=] finished with status 1
2024-07-17 15:52:42.604515 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:52:42.604533 daemon-err , cfgd[1240]:  \"U2FsdGVkX18DE7d4p72hZiyRcSQHiKFMfgG87IXPTZA=\" strong-password: score is too weak
2024-07-17 15:52:42.604557 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:52:42.606471 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZiyRcSQHiKFMfgG87IXPTZA=\" strong-password: score is too weak#012Commit validation failed#012
2024-07-17 15:52:43.276646 daemon-err , ntpd[105767]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:43.276803 daemon-err , ntpd[105767]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:43.873333 daemon-err , ntpd[105803]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:43.873556 daemon-err , ntpd[105803]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:44.460593 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=] finished with status 1
2024-07-17 15:52:44.460643 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:52:44.460663 daemon-err , cfgd[1240]:  \"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak
2024-07-17 15:52:44.460682 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:52:44.462520 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZq3Gk5L4celSCFOiZy7DRtg=\" strong-password: score is too weak#012Commit validation failed#012
2024-07-17 15:52:45.002876 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=] finished with status 1
2024-07-17 15:52:45.002942 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:52:45.002964 daemon-err , cfgd[1240]:  \"U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=\" strong-password: score is too weak
2024-07-17 15:52:45.002984 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:52:45.004721 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZpxeXe0QM4dKdi+Fo9lF7Rc=\" strong-password: score is too weak#012Commit validation failed#012
2024-07-17 15:52:45.540607 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZiyRcSQHiKFMfgG87IXPTZA=] finished with status 1
2024-07-17 15:52:45.540664 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:52:45.540689 daemon-err , cfgd[1240]:  \"U2FsdGVkX18DE7d4p72hZiyRcSQHiKFMfgG87IXPTZA=\" strong-password: score is too weak
2024-07-17 15:52:45.540716 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:52:45.542120 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZiyRcSQHiKFMfgG87IXPTZA=\" strong-password: score is too weak#012Commit validation failed#012
2024-07-17 15:52:46.091803 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18DE7d4p72hZsL/MA7fyNh4u8ffWRbPRFw=] finished with status 1
2024-07-17 15:52:46.091996 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:52:46.092055 daemon-err , cfgd[1240]:  \"U2FsdGVkX18DE7d4p72hZsL/MA7fyNh4u8ffWRbPRFw=\" strong-password: score is too weak
2024-07-17 15:52:46.092108 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:52:46.094468 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18DE7d4p72hZsL/MA7fyNh4u8ffWRbPRFw=\" strong-password: score is too weak#012Commit validation failed#012
2024-07-17 15:52:52.567779 daemon-err , ntpd[106061]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:52.567925 daemon-err , ntpd[106061]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:52:58.990892 daemon-err , ntpd[106251]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:52:58.991005 daemon-err , ntpd[106251]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:53:03.786171 daemon-err , cfgd[1240]:  [93486]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-07-17 15:53:04.132501 daemon-err , cfgd[1240]:  [93486]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-07-17 15:53:05.286508 daemon-err , ntpd[106487]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:53:05.286638 daemon-err , ntpd[106487]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:53:05.927253 daemon-err , ntpd[106524]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:53:05.927268 daemon-err , ntpd[106524]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:53:06.574148 daemon-err , ntpd[106560]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:53:06.574277 daemon-err , ntpd[106560]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:53:14.599930 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18bSoSA/yYt5/JvNZiTqEY+BK6gZ2blW18=] finished with status 1
2024-07-17 15:53:14.600079 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:53:14.600122 daemon-err , cfgd[1240]:  \"U2FsdGVkX18bSoSA/yYt5/JvNZiTqEY+BK6gZ2blW18=\" strong-password: score is too weak
2024-07-17 15:53:14.600165 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:53:14.601925 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18bSoSA/yYt5/JvNZiTqEY+BK6gZ2blW18=\" strong-password: score is too weak#012Commit validation failed#012
2024-07-17 15:53:15.108331 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18S50702MpF5fIxj8n72KUr/0NucMqj74U=] finished with status 1
2024-07-17 15:53:15.108394 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:53:15.108420 daemon-err , cfgd[1240]:  \"U2FsdGVkX18S50702MpF5fIxj8n72KUr/0NucMqj74U=\" strong-password: score is too weak
2024-07-17 15:53:15.108444 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:53:15.110190 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18S50702MpF5fIxj8n72KUr/0NucMqj74U=\" strong-password: score is too weak#012Commit validation failed#012
2024-07-17 15:53:15.712549 daemon-err , ntpd[106918]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:53:15.712744 daemon-err , ntpd[106918]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:53:20.600612 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18JvGQYOugxf+i81z2wcrYpE8U9ABU14r4=] finished with status 2
2024-07-17 15:53:20.600673 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:53:20.600707 daemon-err , cfgd[1240]:  \"U2FsdGVkX18JvGQYOugxf+i81z2wcrYpE8U9ABU14r4=\" strong-password: not long enough
2024-07-17 15:53:20.600731 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:53:20.602697 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18JvGQYOugxf+i81z2wcrYpE8U9ABU14r4=\" strong-password: not long enough#012Commit validation failed#012
2024-07-17 15:53:21.386287 daemon-err , ntpd[107090]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:53:21.386452 daemon-err , ntpd[107090]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:53:26.453644 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/zGlvYHL98PQwWnu1CPrg6mYKaRk2yROE=] finished with status 3
2024-07-17 15:53:26.453719 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:53:26.453737 daemon-err , cfgd[1240]:  \"U2FsdGVkX1/zGlvYHL98PQwWnu1CPrg6mYKaRk2yROE=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2024-07-17 15:53:26.453758 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:53:26.455282 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX1/zGlvYHL98PQwWnu1CPrg6mYKaRk2yROE=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012
2024-07-17 15:53:27.013754 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX189Jf29LMgdcl8d9JE0V0DoAGwqxQnf5as=] finished with status 3
2024-07-17 15:53:27.013900 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:53:27.013941 daemon-err , cfgd[1240]:  \"U2FsdGVkX189Jf29LMgdcl8d9JE0V0DoAGwqxQnf5as=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2024-07-17 15:53:27.013977 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:53:27.015924 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX189Jf29LMgdcl8d9JE0V0DoAGwqxQnf5as=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012
2024-07-17 15:53:27.546972 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18oRG4gsdnxT5J7+TgBu1IFZS+w7xMuuqA=] finished with status 3
2024-07-17 15:53:27.547118 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:53:27.547159 daemon-err , cfgd[1240]:  \"U2FsdGVkX18oRG4gsdnxT5J7+TgBu1IFZS+w7xMuuqA=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2024-07-17 15:53:27.547206 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:53:27.548873 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX18oRG4gsdnxT5J7+TgBu1IFZS+w7xMuuqA=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012
2024-07-17 15:53:28.102427 daemon-err , cfgd[1240]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+k2UktDf3U7f+ESsvHcxGbI7MNTSuvxn0=] finished with status 1
2024-07-17 15:53:28.102501 daemon-err , cfgd[1240]:  [ system ntp authentication-key 1 encrypted-key ]
2024-07-17 15:53:28.102537 daemon-err , cfgd[1240]:  \"U2FsdGVkX1+k2UktDf3U7f+ESsvHcxGbI7MNTSuvxn0=\" strong-password: score is too weak
2024-07-17 15:53:28.102572 daemon-err , cfgd[1240]:  Commit validation failed
2024-07-17 15:53:28.104295 daemon-err , cfgd[1240]:  [93486]Command output:#012[ system ntp authentication-key 1 encrypted-key ]#012\"U2FsdGVkX1+k2UktDf3U7f+ESsvHcxGbI7MNTSuvxn0=\" strong-password: score is too weak#012Commit validation failed#012
2024-07-17 15:53:28.730615 daemon-err , ntpd[107319]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-17 15:53:28.730751 daemon-err , ntpd[107319]:  AUTH: authreadkeys: added 1 keys
2024-07-17 15:53:29.104053 daemon-err , cfgd[1240]:  [93486]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-07-17 15:53:29.448559 daemon-err , cfgd[1240]:  [93486]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-07-17 15:53:29.831058 daemon-err , cfgd[1240]:  [93486]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-07-17 15:53:30.156748 daemon-err , cfgd[1240]:  [93486]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-07-17 15:53:39.348346 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-17 15:53:39.348670 syslog-info , rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="59611" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-17 15:53:39.349254 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-17 15:53:39.349367 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-17 15:53:39.378116 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-17 15:53:39.380109 syslog-info , rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-17 15:53:39.380157 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-17 15:53:39.380479 syslog-info , rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="107713" x-info="https://www.rsyslog.com"] start
2024-07-17 15:53:39.380807 daemon-notice , cfgd[1240]:  [93486]Completed change to active configuration
2024-07-17 15:53:39.382846 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2024-07-17 15:53:39.400285 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2024-07-17 15:53:39.537058 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2024-07-17 15:53:45.467532 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-17 15:53:45.468386 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-17 15:53:45.468424 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-17 15:53:45.515922 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-17 15:53:45.518888 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-17 15:53:46.216456 daemon-info , systemd[1]:  Created slice system-dhcpd.slice - Slice /system/dhcpd.
2024-07-17 15:53:46.263973 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2024-07-17 15:53:51.653109 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-17 15:53:51.653858 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-17 15:53:51.653976 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-17 15:53:51.670932 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-17 15:53:51.672605 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-17 15:53:52.346813 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.147 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.147/0.147/0.147/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-17T15:53:58.506238+00:00 10.215.168.64  2024-07-17T15:53:57.741354+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-17T15:53:58.506238+00:00 10.215.168.64  2024-07-17T15:53:57.741480+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="108292" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-17T15:53:58.506238+00:00 10.215.168.64  2024-07-17T15:53:57.742395+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-17T15:53:58.506238+00:00 10.215.168.64  2024-07-17T15:53:57.742451+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-17T15:53:58.506238+00:00 10.215.168.64  2024-07-17T15:53:57.762799+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-17T15:53:58.506238+00:00 10.215.168.64  2024-07-17T15:53:57.765158+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-17T15:53:58.506238+00:00 10.215.168.64  2024-07-17T15:53:57.765199+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-17T15:53:58.506238+00:00 10.215.168.64  2024-07-17T15:53:57.765238+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="108417" x-info="https://www.rsyslog.com"] start
2024-07-17T15:53:58.506238+00:00 10.215.168.64  2024-07-17T15:53:57.766277+00:00 daemon-notice osdx cfgd[1240]:  [93486]Completed change to active configuration
2024-07-17T15:53:58.508358+00:00 10.215.168.64  2024-07-17T15:53:57.768573+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-17T15:53:58.523294+00:00 10.215.168.64  2024-07-17T15:53:57.783519+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-17T15:53:58.663799+00:00 10.215.168.64  2024-07-17T15:53:57.923978+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-07-17T15:53:58.718778+00:00 10.215.168.64  2024-07-17T15:53:57.978875+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.132 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.132/0.132/0.132/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-17T15:53:59.103953+00:00 10.215.168.64  2024-07-17T15:53:58.364097+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-07-17T15:53:59.283959+00:00 10.215.168.64  2024-07-17T15:53:58.543967+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-07-17T15:53:59.299013+00:00 10.215.168.64  2024-07-17T15:53:58.559157+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-07-17T15:54:00.054923+00:00 10.215.168.64  2024-07-17T15:53:59.315028+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-07-17T15:54:00.371630+00:00 10.215.168.64  2024-07-17T15:53:59.631677+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-07-17T15:54:00.430984+00:00 10.215.168.64  2024-07-17T15:53:59.691059+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-07-17T15:54:00.530147+00:00 10.215.168.64  2024-07-17T15:53:59.790265+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-07-17T15:54:00.601196+00:00 10.215.168.64  2024-07-17T15:53:59.861244+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2024-07-17T15:54:04.337103+00:00 10.215.168.64  2024-07-17T15:54:03.944305+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-17T15:54:04.337103+00:00 10.215.168.64  2024-07-17T15:54:03.944419+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="108504" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-17T15:54:04.337103+00:00 10.215.168.64  2024-07-17T15:54:03.945161+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-17T15:54:04.337103+00:00 10.215.168.64  2024-07-17T15:54:03.945203+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-17T15:54:04.337103+00:00 10.215.168.64  2024-07-17T15:54:03.966584+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-17T15:54:04.337211+00:00 10.215.168.64  2024-07-17T15:54:03.968920+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-17T15:54:04.337220+00:00 10.215.168.64  2024-07-17T15:54:03.968983+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-17T15:54:04.337336+00:00 10.215.168.64  2024-07-17T15:54:03.969288+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="108660" x-info="https://www.rsyslog.com"] start
2024-07-17T15:54:04.337825+00:00 10.215.168.64  2024-07-17T15:54:03.969778+00:00 daemon-notice osdx cfgd[1240]:  [93486]Completed change to active configuration
2024-07-17T15:54:04.340175+00:00 10.215.168.64  2024-07-17T15:54:03.972074+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-17T15:54:04.355303+00:00 10.215.168.64  2024-07-17T15:54:03.987220+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-17T15:54:04.558166+00:00 10.215.168.64  2024-07-17T15:54:04.190061+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1  vrf VRF0    count 1 size 56 timeout 1'.
2024-07-17T15:54:04.617752+00:00 10.215.168.64  2024-07-17T15:54:04.249587+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.124 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.124/0.124/0.124/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-17T15:54:05.020449+00:00 10.215.168.64  2024-07-17T15:54:04.652186+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-07-17T15:54:05.174165+00:00 10.215.168.64  2024-07-17T15:54:04.805879+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-07-17T15:54:05.189483+00:00 10.215.168.64  2024-07-17T15:54:04.821207+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-07-17T15:54:05.902459+00:00 10.215.168.64  2024-07-17T15:54:05.534220+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-07-17T15:54:06.244424+00:00 10.215.168.64  2024-07-17T15:54:05.876198+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-07-17T15:54:06.295093+00:00 10.215.168.64  2024-07-17T15:54:05.926758+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-07-17T15:54:06.401851+00:00 10.215.168.64  2024-07-17T15:54:06.033433+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-07-17T15:54:06.463420+00:00 10.215.168.64  2024-07-17T15:54:06.095211+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2024-07-17T15:54:09.973478+00:00 10.215.168.64  2024-07-17T15:54:09.779429+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-17T15:54:09.973478+00:00 10.215.168.64  2024-07-17T15:54:09.779696+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="108747" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-17T15:54:09.973478+00:00 10.215.168.64  2024-07-17T15:54:09.780386+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-17T15:54:09.973478+00:00 10.215.168.64  2024-07-17T15:54:09.780478+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-17T15:54:09.973478+00:00 10.215.168.64  2024-07-17T15:54:09.803318+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-17T15:54:09.973478+00:00 10.215.168.64  2024-07-17T15:54:09.805191+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-17T15:54:09.973478+00:00 10.215.168.64  2024-07-17T15:54:09.805232+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="108900" x-info="https://www.rsyslog.com"] start
2024-07-17T15:54:09.973478+00:00 10.215.168.64  2024-07-17T15:54:09.805257+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-17T15:54:09.973757+00:00 10.215.168.64  2024-07-17T15:54:09.806095+00:00 daemon-notice osdx cfgd[1240]:  [93486]Completed change to active configuration
2024-07-17T15:54:09.976308+00:00 10.215.168.64  2024-07-17T15:54:09.808628+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-17T15:54:10.028176+00:00 10.215.168.64  2024-07-17T15:54:09.860409+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-17T15:54:10.181400+00:00 10.215.168.64  2024-07-17T15:54:10.013656+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-07-17T15:54:10.242854+00:00 10.215.168.64  2024-07-17T15:54:10.075094+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.249 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.249/0.249/0.249/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-17T15:54:16.067205+00:00 33.33.33.33  2024-07-17T15:54:15.865341+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-17T15:54:16.067205+00:00 33.33.33.33  2024-07-17T15:54:15.865457+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="108987" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-17T15:54:16.067205+00:00 33.33.33.33  2024-07-17T15:54:15.866074+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-17T15:54:16.067205+00:00 33.33.33.33  2024-07-17T15:54:15.866113+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-17T15:54:16.067205+00:00 33.33.33.33  2024-07-17T15:54:15.894404+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-17T15:54:16.067205+00:00 33.33.33.33  2024-07-17T15:54:15.897239+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-17T15:54:16.067205+00:00 33.33.33.33  2024-07-17T15:54:15.897271+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="109122" x-info="https://www.rsyslog.com"] start
2024-07-17T15:54:16.067205+00:00 33.33.33.33  2024-07-17T15:54:15.897297+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-17T15:54:16.067205+00:00 33.33.33.33  2024-07-17T15:54:15.898221+00:00 daemon-notice osdx cfgd[1240]:  [93486]Completed change to active configuration
2024-07-17T15:54:16.069573+00:00 33.33.33.33  2024-07-17T15:54:15.900791+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-17T15:54:16.085785+00:00 33.33.33.33  2024-07-17T15:54:15.917020+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-17T15:54:16.245761+00:00 33.33.33.33  2024-07-17T15:54:16.076804+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-07-17T15:54:16.301481+00:00 33.33.33.33  2024-07-17T15:54:16.132447+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.160 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.160/0.160/0.160/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-17T15:54:16.691293+00:00 33.33.33.33  2024-07-17T15:54:16.522381+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-07-17T15:54:16.870849+00:00 33.33.33.33  2024-07-17T15:54:16.701835+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-07-17T15:54:16.890033+00:00 33.33.33.33  2024-07-17T15:54:16.721133+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-07-17T15:54:17.647494+00:00 33.33.33.33  2024-07-17T15:54:17.478593+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-07-17T15:54:17.985239+00:00 33.33.33.33  2024-07-17T15:54:17.816257+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-07-17T15:54:18.034834+00:00 33.33.33.33  2024-07-17T15:54:17.865743+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-07-17T15:54:18.142553+00:00 33.33.33.33  2024-07-17T15:54:17.973468+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-07-17T15:54:18.206635+00:00 33.33.33.33  2024-07-17T15:54:18.037744+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2024-07-17T15:54:22.197857+00:00 33.33.33.33  2024-07-17T15:54:21.217645+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-17T15:54:22.197857+00:00 33.33.33.33  2024-07-17T15:54:21.217963+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="109209" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-17T15:54:22.197857+00:00 33.33.33.33  2024-07-17T15:54:21.218475+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-17T15:54:22.197857+00:00 33.33.33.33  2024-07-17T15:54:21.218594+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-17T15:54:22.197857+00:00 33.33.33.33  2024-07-17T15:54:21.239443+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-17T15:54:22.197857+00:00 33.33.33.33  2024-07-17T15:54:21.241261+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-17T15:54:22.197857+00:00 33.33.33.33  2024-07-17T15:54:21.241301+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="109377" x-info="https://www.rsyslog.com"] start
2024-07-17T15:54:22.197857+00:00 33.33.33.33  2024-07-17T15:54:21.241333+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-17T15:54:22.198070+00:00 33.33.33.33  2024-07-17T15:54:21.241883+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2024-07-17T15:54:22.198075+00:00 33.33.33.33  2024-07-17T15:54:21.242189+00:00 daemon-notice osdx cfgd[1240]:  [93486]Completed change to active configuration
2024-07-17T15:54:22.200334+00:00 33.33.33.33  2024-07-17T15:54:21.244342+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-17T15:54:22.216782+00:00 33.33.33.33  2024-07-17T15:54:21.260924+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-17T15:54:22.429639+00:00 33.33.33.33  2024-07-17T15:54:21.473738+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1  vrf VRF0    count 1 size 56 timeout 1'.
2024-07-17T15:54:22.485202+00:00 33.33.33.33  2024-07-17T15:54:21.529182+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.169 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.169/0.169/0.169/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-17T15:54:27.963497+00:00 10.215.168.64  2024-07-17T15:54:26.755333+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-17T15:54:27.963497+00:00 10.215.168.64  2024-07-17T15:54:26.755457+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="109464" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-17T15:54:27.963575+00:00 10.215.168.64  2024-07-17T15:54:26.755924+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-17T15:54:27.963575+00:00 10.215.168.64  2024-07-17T15:54:26.756020+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-17T15:54:27.963575+00:00 10.215.168.64  2024-07-17T15:54:26.803738+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-17T15:54:27.963575+00:00 10.215.168.64  2024-07-17T15:54:26.810459+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-17T15:54:27.963575+00:00 10.215.168.64  2024-07-17T15:54:26.810502+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="109624" x-info="https://www.rsyslog.com"] start
2024-07-17T15:54:27.963575+00:00 10.215.168.64  2024-07-17T15:54:26.810532+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-17T15:54:27.963575+00:00 10.215.168.64  2024-07-17T15:54:26.811433+00:00 daemon-notice osdx cfgd[1240]:  [93486]Completed change to active configuration
2024-07-17T15:54:27.963575+00:00 10.215.168.64  2024-07-17T15:54:26.813469+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-17T15:54:27.963575+00:00 10.215.168.64  2024-07-17T15:54:26.837547+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-17T15:54:27.963575+00:00 10.215.168.64  2024-07-17T15:54:26.901853+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2024-07-17T15:54:27.963575+00:00 10.215.168.64  2024-07-17T15:54:26.901927+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2024-07-17T15:54:28.031873+00:00 10.215.168.64  2024-07-17T15:54:26.983499+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-07-17T15:54:29.309082+00:00 10.215.168.64  2024-07-17T15:54:28.260630+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.275 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.275/0.275/0.275/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-17T15:54:35.349711+00:00 33.33.33.33  2024-07-17T15:54:34.061798+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-17T15:54:35.350006+00:00 33.33.33.33  2024-07-17T15:54:34.062057+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="109720" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-17T15:54:35.350006+00:00 33.33.33.33  2024-07-17T15:54:34.062415+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-17T15:54:35.350006+00:00 33.33.33.33  2024-07-17T15:54:34.062547+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-17T15:54:35.350006+00:00 33.33.33.33  2024-07-17T15:54:34.085622+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-17T15:54:35.350006+00:00 33.33.33.33  2024-07-17T15:54:34.088150+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-17T15:54:35.350006+00:00 33.33.33.33  2024-07-17T15:54:34.088191+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="109859" x-info="https://www.rsyslog.com"] start
2024-07-17T15:54:35.350006+00:00 33.33.33.33  2024-07-17T15:54:34.088212+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-17T15:54:35.350006+00:00 33.33.33.33  2024-07-17T15:54:34.089212+00:00 daemon-notice osdx cfgd[1240]:  [93486]Completed change to active configuration
2024-07-17T15:54:35.350006+00:00 33.33.33.33  2024-07-17T15:54:34.091666+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-17T15:54:35.350006+00:00 33.33.33.33  2024-07-17T15:54:34.110026+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-17T15:54:35.350006+00:00 33.33.33.33  2024-07-17T15:54:34.253629+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-07-17T15:54:35.350006+00:00 33.33.33.33  2024-07-17T15:54:34.470223+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2024-07-17T15:54:35.350006+00:00 33.33.33.33  2024-07-17T15:54:34.470277+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2024-07-17T15:54:36.397493+00:00 33.33.33.33  2024-07-17T15:54:35.526679+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.