Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2024-07-30 09:59:43.453017 daemon-err , zebra[1207]:  [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0
2024-07-30 09:59:48.250440 daemon-err , zebra[1207]:  [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (100) vrf 0
2024-07-30 10:00:01.526014 daemon-err , zebra[1207]:  [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0
2024-07-30 10:00:05.189893 daemon-err , zebra[1207]:  [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (100) vrf 0
2024-07-30 10:00:19.660302 daemon-err , zebra[1207]:  [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0
2024-07-30 10:00:19.678139 daemon-err , zebra[1207]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: No such file or directory, type=RTM_DELNEXTHOP(105), seq=2549, pid=3733931046
2024-07-30 10:00:19.678253 daemon-err , zebra[1207]:  [YA619-S7J5M][EC 4043309075] Failed to uninstall Nexthop ID (1063) from the kernel
2024-07-30 10:03:17.298766 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LOCALVRF in VRF 105
2024-07-30 10:03:17.298815 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LOCALVRF in VRF 105
2024-07-30 10:03:36.041496 kern-err , kernel: [ 1707.643540] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/39691
2024-07-30 10:03:36.041514 kern-err , kernel: [ 1707.643684] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/39691
2024-07-30 10:03:36.041536 kern-err , kernel: [ 1707.643747] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/39691
2024-07-30 10:03:45.926718 kern-err , kernel: [ 1717.533658] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/39840
2024-07-30 10:03:45.926730 kern-err , kernel: [ 1717.533755] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/39840
2024-07-30 10:03:45.926740 kern-err , kernel: [ 1717.533822] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/39840
2024-07-30 10:03:45.926750 kern-err , kernel: [ 1717.533886] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/39840
2024-07-30 10:03:45.926775 kern-err , kernel: [ 1717.533994] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/39840
2024-07-30 10:03:45.926843 kern-err , kernel: [ 1717.534071] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/39840
2024-07-30 10:03:45.926862 kern-err , kernel: [ 1717.534141] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/39840
2024-07-30 10:03:45.966621 daemon-err , modulelauncher[39835]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2024-07-30 10:03:45.966757 daemon-err , modulelauncher[39835]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2024-07-30 10:03:45.979249 daemon-err , modulelauncher[39835]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2024-07-30 10:03:45.979377 daemon-err , modulelauncher[39835]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2024-07-30 10:03:51.717351 kern-err , kernel: [ 1722.731256] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40064
2024-07-30 10:03:51.717362 kern-err , kernel: [ 1722.731383] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40064
2024-07-30 10:03:51.721383 kern-err , kernel: [ 1722.731466] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40064
2024-07-30 10:03:51.737293 kern-err , kernel: [ 1722.750044] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40072
2024-07-30 10:03:51.737304 kern-err , kernel: [ 1722.750124] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40072
2024-07-30 10:03:51.737313 kern-err , kernel: [ 1722.750177] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40072
2024-07-30 10:03:51.753303 kern-err , kernel: [ 1722.764114] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40078
2024-07-30 10:03:51.753314 kern-err , kernel: [ 1722.764188] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40078
2024-07-30 10:03:51.753324 kern-err , kernel: [ 1722.764243] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40078
2024-07-30 10:03:59.928858 daemon-err , zebra[1207]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: No such file or directory, type=RTM_DELNEXTHOP(105), seq=2640, pid=3733931046
2024-07-30 10:03:59.928922 daemon-err , zebra[1207]:  [YA619-S7J5M][EC 4043309075] Failed to uninstall Nexthop ID (1113) from the kernel
2024-07-30 10:04:00.145707 kern-err , kernel: [ 1731.157518] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40227
2024-07-30 10:04:00.145717 kern-err , kernel: [ 1731.157600] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40227
2024-07-30 10:04:00.145727 kern-err , kernel: [ 1731.157654] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40227
2024-07-30 10:04:00.145736 kern-err , kernel: [ 1731.157704] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40227
2024-07-30 10:04:00.145745 kern-err , kernel: [ 1731.157804] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40227
2024-07-30 10:04:00.145800 kern-err , kernel: [ 1731.157870] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40227
2024-07-30 10:04:00.145812 kern-err , kernel: [ 1731.157929] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40227
2024-07-30 10:04:00.156086 daemon-err , modulelauncher[40222]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2024-07-30 10:04:00.156133 daemon-err , modulelauncher[40222]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2024-07-30 10:04:00.171547 daemon-err , modulelauncher[40222]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2024-07-30 10:04:00.171615 daemon-err , modulelauncher[40222]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2024-07-30 10:04:05.189154 kern-err , kernel: [ 1737.171012] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40457
2024-07-30 10:04:05.189170 kern-err , kernel: [ 1737.171088] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40457
2024-07-30 10:04:05.189182 kern-err , kernel: [ 1737.171153] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40457
2024-07-30 10:04:05.209134 kern-err , kernel: [ 1737.190135] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40465
2024-07-30 10:04:05.209145 kern-err , kernel: [ 1737.190224] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40465
2024-07-30 10:04:05.209151 kern-err , kernel: [ 1737.190276] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40465
2024-07-30 10:04:05.225132 kern-err , kernel: [ 1737.205688] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40471
2024-07-30 10:04:05.225139 kern-err , kernel: [ 1737.205764] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40471
2024-07-30 10:04:05.225145 kern-err , kernel: [ 1737.205811] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40471
2024-07-30 10:04:12.045145 kern-err , kernel: [ 1744.023839] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40620
2024-07-30 10:04:12.045166 kern-err , kernel: [ 1744.023929] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40620
2024-07-30 10:04:12.045173 kern-err , kernel: [ 1744.024006] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40620
2024-07-30 10:04:12.045178 kern-err , kernel: [ 1744.024068] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40620
2024-07-30 10:04:12.045183 kern-err , kernel: [ 1744.024174] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40620
2024-07-30 10:04:12.045235 kern-err , kernel: [ 1744.024249] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40620
2024-07-30 10:04:12.045292 kern-err , kernel: [ 1744.024319] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40620
2024-07-30 10:04:12.054060 daemon-err , modulelauncher[40615]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2024-07-30 10:04:12.054109 daemon-err , modulelauncher[40615]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2024-07-30 10:04:12.065332 daemon-err , modulelauncher[40615]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2024-07-30 10:04:12.065367 daemon-err , modulelauncher[40615]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2024-07-30 10:04:16.880186 kern-err , kernel: [ 1748.866907] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40847
2024-07-30 10:04:16.880198 kern-err , kernel: [ 1748.866992] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40847
2024-07-30 10:04:16.880208 kern-err , kernel: [ 1748.867042] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40847
2024-07-30 10:04:16.900179 kern-err , kernel: [ 1748.886655] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40855
2024-07-30 10:04:16.900187 kern-err , kernel: [ 1748.886728] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40855
2024-07-30 10:04:16.900196 kern-err , kernel: [ 1748.886785] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40855
2024-07-30 10:04:16.916192 kern-err , kernel: [ 1748.901312] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40861
2024-07-30 10:04:16.916202 kern-err , kernel: [ 1748.901388] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40861
2024-07-30 10:04:16.916209 kern-err , kernel: [ 1748.901437] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/40861
2024-07-30 10:04:23.956222 kern-err , kernel: [ 1755.939667] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41010
2024-07-30 10:04:23.956234 kern-err , kernel: [ 1755.939769] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41010
2024-07-30 10:04:23.956245 kern-err , kernel: [ 1755.939835] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41010
2024-07-30 10:04:23.956256 kern-err , kernel: [ 1755.939898] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41010
2024-07-30 10:04:23.956266 kern-err , kernel: [ 1755.940015] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41010
2024-07-30 10:04:23.956329 kern-err , kernel: [ 1755.940090] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41010
2024-07-30 10:04:23.956341 kern-err , kernel: [ 1755.940174] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41010
2024-07-30 10:04:23.964778 daemon-err , modulelauncher[41005]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2024-07-30 10:04:23.964814 daemon-err , modulelauncher[41005]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2024-07-30 10:04:23.975315 daemon-err , modulelauncher[41005]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2024-07-30 10:04:23.975369 daemon-err , modulelauncher[41005]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2024-07-30 10:04:30.760575 kern-err , kernel: [ 1761.803346] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41225
2024-07-30 10:04:30.760598 kern-err , kernel: [ 1761.803423] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41225
2024-07-30 10:04:30.760609 kern-err , kernel: [ 1761.803488] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41225
2024-07-30 10:04:30.780601 kern-err , kernel: [ 1761.824985] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41233
2024-07-30 10:04:30.780613 kern-err , kernel: [ 1761.825076] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41233
2024-07-30 10:04:30.780625 kern-err , kernel: [ 1761.825135] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41233
2024-07-30 10:04:30.796564 kern-err , kernel: [ 1761.839921] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41239
2024-07-30 10:04:30.796571 kern-err , kernel: [ 1761.840007] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41239
2024-07-30 10:04:30.796577 kern-err , kernel: [ 1761.840054] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41239
2024-07-30 10:04:36.708617 kern-err , kernel: [ 1767.754922] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41366
2024-07-30 10:04:36.708624 kern-err , kernel: [ 1767.754988] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41366
2024-07-30 10:04:36.708630 kern-err , kernel: [ 1767.755041] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41366
2024-07-30 10:04:36.708635 kern-err , kernel: [ 1767.755092] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41366
2024-07-30 10:04:36.708641 kern-err , kernel: [ 1767.755168] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41366
2024-07-30 10:04:36.708674 kern-err , kernel: [ 1767.755219] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41366
2024-07-30 10:04:36.708680 kern-err , kernel: [ 1767.755267] BUG: using smp_processor_id() in preemptible [00000000] code: sysctl/41366
2024-07-30 10:04:36.731962 daemon-err , modulelauncher[41361]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2024-07-30 10:04:36.732017 daemon-err , modulelauncher[41361]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2024-07-30 10:04:36.743442 daemon-err , modulelauncher[41361]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2024-07-30 10:04:36.743497 daemon-err , modulelauncher[41361]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2024-07-30 10:04:47.428901 daemon-err , cfgd[1242]:  External python command [cfg.auto_scripts process ADVISOR1 SCRIPT_1 true] finished with status 1
2024-07-30 10:05:24.866801 user-err , ERROR:  `system script SCRIPT_1` validation error
2024-07-30 10:05:24.866835 user-err , ERROR:  0
2024-07-30 10:05:24.866868 daemon-err , cfgd[1242]:  [1789]Command output:#012Value validation failed#012
2024-07-30 10:05:25.188911 user-err , ERROR:  `system script SCRIPT_1` validation error
2024-07-30 10:05:25.189115 user-err , ERROR:  system potato: Invalid operational command.
2024-07-30 10:05:25.189475 daemon-err , cfgd[1242]:  [1789]Command output:#012Value validation failed#012
2024-07-30 10:05:31.089037 daemon-err , cfgd[1242]:  [ service dhcp-server ]
2024-07-30 10:05:31.089054 daemon-err , cfgd[1242]:  \"shared-network\" configuration is required
2024-07-30 10:05:31.089074 daemon-err , cfgd[1242]:  Commit validation failed
2024-07-30 10:05:31.090694 daemon-err , cfgd[1242]:  [43085]Command output:#012[ service dhcp-server ]#012\"shared-network\" configuration is required#012Commit validation failed#012
2024-07-30 10:05:31.095813 daemon-err , cfgd[1242]:  External python command [cfg.auto_scripts execute_script SCRIPT_1] finished with status 1
2024-07-29 12:00:00.791333 daemon-err , ntpd[44031]:  IO: bind(22) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address
2024-07-29 12:00:00.791351 daemon-err , ntpd[44031]:  IO: unable to create socket on eth0 (6) for fe80::dcad:beff:feef:6c10%2#123
2024-07-30 10:06:44.798203 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 114
2024-07-30 10:06:44.798263 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 114
2024-07-30 10:07:04.316440 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 116
2024-07-30 10:07:04.316505 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 116
2024-07-30 10:07:04.388338 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 115
2024-07-30 10:07:04.388383 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 115
2024-07-30 10:07:22.925364 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 119
2024-07-30 10:07:22.925414 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 119
2024-07-30 10:07:23.017243 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 118
2024-07-30 10:07:23.017310 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 118
2019-02-01 12:00:02.098953 daemon-err , dhclient[45609]:  receive_packet failed on eth0: Network is down
2019-02-01 12:00:02.181583 daemon-err , ntpd[45651]:  IO: bind(20) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address
2019-02-01 12:00:02.181600 daemon-err , ntpd[45651]:  IO: unable to create socket on eth0 (4) for fe80::dcad:beff:feef:6c10%2#123
2019-02-01 12:00:03.296936 daemon-err , ntpd[45698]:  IO: bind(21) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address
2019-02-01 12:00:03.296955 daemon-err , ntpd[45698]:  IO: unable to create socket on eth0 (5) for fe80::dcad:beff:feef:6c10%2#123
2019-01-01 10:00:14.227670 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 121
2019-01-01 10:00:14.227730 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 121
2019-02-01 12:00:02.079362 daemon-err , ntpd[46048]:  IO: bind(20) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address
2019-02-01 12:00:02.079379 daemon-err , ntpd[46048]:  IO: unable to create socket on eth0 (4) for fe80::dcad:beff:feef:6c10%2#123
2024-07-30 10:08:01.005297 daemon-err , ntpd[46411]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-30 10:08:01.005460 daemon-err , ntpd[46411]:  AUTH: authreadkeys: added 1 keys
2024-07-30 10:08:01.006118 daemon-err , ntpd[46411]:  IO: bind(21) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address
2024-07-30 10:08:01.006140 daemon-err , ntpd[46411]:  IO: unable to create socket on eth0 (5) for fe80::dcad:beff:feef:6c10%2#123
2024-07-30 10:08:02.047307 daemon-err , ntpd[46411]:  IO: bind(22) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address
2024-07-30 10:08:02.047372 daemon-err , ntpd[46411]:  IO: unable to create socket on eth0 (6) for fe80::dcad:beff:feef:6c10%2#123
2024-07-30 10:08:12.714384 daemon-err , ntpd[46639]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-30 10:08:12.714400 daemon-err , ntpd[46639]:  AUTH: authreadkeys: added 1 keys
2024-07-30 10:08:12.714504 daemon-err , ntpd[46639]:  IO: bind(21) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address
2024-07-30 10:08:12.714517 daemon-err , ntpd[46639]:  IO: unable to create socket on eth0 (5) for fe80::dcad:beff:feef:6c10%2#123
2024-07-30 10:08:13.758679 daemon-err , ntpd[46639]:  IO: bind(22) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address
2024-07-30 10:08:13.758734 daemon-err , ntpd[46639]:  IO: unable to create socket on eth0 (6) for fe80::dcad:beff:feef:6c10%2#123
2024-07-30 10:08:21.915813 daemon-err , ntpd[46881]:  AUTH: authreadkeys: reading /etc/ntp.keys
2024-07-30 10:08:21.916026 daemon-err , ntpd[46881]:  AUTH: authreadkeys: added 1 keys
2024-07-30 10:08:21.916799 daemon-err , ntpd[46881]:  IO: bind(21) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address
2024-07-30 10:08:21.916821 daemon-err , ntpd[46881]:  IO: unable to create socket on eth0 (5) for fe80::dcad:beff:feef:6c10%2#123
2024-07-30 10:08:22.960778 daemon-err , ntpd[46881]:  IO: bind(22) AF_INET6 fe80::dcad:beff:feef:6c10%2#123 flags 0x1 failed: Cannot assign requested address
2024-07-30 10:08:22.960860 daemon-err , ntpd[46881]:  IO: unable to create socket on eth0 (6) for fe80::dcad:beff:feef:6c10%2#123
2024-07-30 10:09:46.463820 daemon-err , cfgd[1242]:  External python command [op.pki scep info CSR] finished with status 1
2024-07-30 10:10:06.583018 daemon-err , cfgd[1242]:  External python command [op.pki scep info CSR] finished with status 1
2024-07-30 10:10:12.104577 user-err , scep_controller:  Failed to get CA certificate for CSR 'CSR'
2024-07-30 10:10:33.210214 daemon-err , modulelauncher[48468]:  osdx.utils.xos cmd error: swanctl -q
2024-07-30 10:10:33.210264 daemon-err , modulelauncher[48468]:  Command 'swanctl -q' returned non-zero exit status 22.
2024-07-30 10:10:33.280113 daemon-err , cfgd[1242]:  External python command [op.pki scep info CSR] finished with status 1
2024-07-30 10:11:01.631952 local0-notice , osdx-reboot:  shutdown v4.1.1.2 2024-07-30 09:35:09 - 2024-07-30 10:11:01 (up 35 minutes)
2024-07-30 10:11:01.654710 local0-notice , osdx-reboot:  bootup v4.1.1.2 2024-07-30 10:11:01 (reason: Power Failure)
2024-07-30 10:11:09.775762 local0-notice , osdx-reboot:  shutdown v4.1.1.2 2024-07-30 09:35:09 - 2024-07-30 10:11:09 (up 36 minutes)
2024-07-30 10:11:09.797936 local0-notice , osdx-reboot:  bootup v4.1.1.2 2024-07-30 10:11:09 (reason: Power Failure)
2024-07-30 10:11:12.554463 local0-notice , osdx-reboot:  shutdown v4.1.1.2 2024-07-30 09:35:08 - 2024-07-30 10:11:12 (up 36 minutes)
2024-07-30 10:11:12.577385 local0-notice , osdx-reboot:  bootup v4.1.1.2 2024-07-30 10:11:12 (reason: Power Failure)
2024-07-30 10:11:20.628591 local0-notice , osdx-reboot:  shutdown v4.1.1.2 2024-07-30 09:35:08 - 2024-07-30 10:11:20 (up 36 minutes)
2024-07-30 10:11:20.650697 local0-notice , osdx-reboot:  bootup v4.1.1.2 2024-07-30 10:11:20 (reason: Power Failure)
2024-07-30 10:11:28.751727 local0-notice , osdx-reboot:  shutdown v4.1.1.2 2024-07-30 09:35:08 - 2024-07-30 10:11:28 (up 36 minutes)
2024-07-30 10:11:28.770987 local0-notice , osdx-reboot:  bootup v4.1.1.2 2024-07-30 10:11:28 (reason: Power Failure)
2024-07-30 10:11:31.129632 local0-notice , osdx-reboot:  shutdown v4.1.1.2 2024-07-30 09:35:08 - 2024-07-30 10:11:31 (up 36 minutes)
2024-07-30 10:11:31.155009 local0-notice , osdx-reboot:  bootup v4.1.1.2 2024-07-30 10:11:31 (reason: Power Failure)
2024-07-30 10:12:18.418501 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 124
2024-07-30 10:12:18.418552 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 124
2024-07-30 10:14:02.114321 daemon-err , zebra[1207]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: No such file or directory, type=RTM_DELNEXTHOP(105), seq=3307, pid=3733931046
2024-07-30 10:14:02.114494 daemon-err , zebra[1207]:  [YA619-S7J5M][EC 4043309075] Failed to uninstall Nexthop ID (1431) from the kernel
2024-07-30 10:14:02.796094 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan3 in VRF 129
2024-07-30 10:14:02.796150 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan3 in VRF 129
2024-07-30 10:14:02.903831 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant2 in VRF 128
2024-07-30 10:14:02.903878 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant2 in VRF 128
2024-07-30 10:14:02.995918 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan2 in VRF 127
2024-07-30 10:14:02.995965 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan2 in VRF 127
2024-07-30 10:14:03.104035 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan1 in VRF 126
2024-07-30 10:14:03.104088 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan1 in VRF 126
2024-07-30 10:14:03.175814 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant1 in VRF 125
2024-07-30 10:14:03.175878 daemon-err , staticd[1212]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant1 in VRF 125
2024-07-30 10:14:12.526442 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-30 10:14:12.526605 syslog-info , rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="1660" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-30 10:14:12.527165 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-30 10:14:12.527258 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-30 10:14:12.560074 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-30 10:14:12.561874 syslog-info , rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-30 10:14:12.561910 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-30 10:14:12.561938 syslog-info , rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="64731" x-info="https://www.rsyslog.com"] start
2024-07-30 10:14:12.562928 daemon-notice , cfgd[1242]:  [60091]Completed change to active configuration
2024-07-30 10:14:12.565102 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2024-07-30 10:14:12.580933 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2024-07-30 10:14:12.706453 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2024-07-30 10:14:18.645265 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-30 10:14:18.646129 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-30 10:14:18.646176 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-30 10:14:18.682153 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-30 10:14:18.685857 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-30 10:14:19.418644 daemon-info , systemd[1]:  Created slice system-dhcpd.slice - Slice /system/dhcpd.
2024-07-30 10:14:19.450092 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2024-07-30 10:14:24.715997 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-30 10:14:24.716756 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-30 10:14:24.716851 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-30 10:14:24.736632 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-30 10:14:24.739734 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-30 10:14:25.476664 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.170 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.170/0.170/0.170/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-30T10:14:32.247817+00:00 10.215.168.64  2024-07-30T10:14:31.723117+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-30T10:14:32.247817+00:00 10.215.168.64  2024-07-30T10:14:31.723377+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="65310" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-30T10:14:32.247817+00:00 10.215.168.64  2024-07-30T10:14:31.723873+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-30T10:14:32.247817+00:00 10.215.168.64  2024-07-30T10:14:31.723965+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-30T10:14:32.247817+00:00 10.215.168.64  2024-07-30T10:14:31.746396+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-30T10:14:32.247817+00:00 10.215.168.64  2024-07-30T10:14:31.748281+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-30T10:14:32.247817+00:00 10.215.168.64  2024-07-30T10:14:31.748312+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-30T10:14:32.247817+00:00 10.215.168.64  2024-07-30T10:14:31.748345+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="65432" x-info="https://www.rsyslog.com"] start
2024-07-30T10:14:32.247817+00:00 10.215.168.64  2024-07-30T10:14:31.749175+00:00 daemon-notice osdx cfgd[1242]:  [60091]Completed change to active configuration
2024-07-30T10:14:32.247817+00:00 10.215.168.64  2024-07-30T10:14:31.751391+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-30T10:14:32.247817+00:00 10.215.168.64  2024-07-30T10:14:31.770240+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-30T10:14:32.381883+00:00 10.215.168.64  2024-07-30T10:14:31.910677+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-07-30T10:14:32.436258+00:00 10.215.168.64  2024-07-30T10:14:31.965013+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.181 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.181/0.181/0.181/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-30T10:14:32.864390+00:00 10.215.168.64  2024-07-30T10:14:32.393081+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-07-30T10:14:33.015476+00:00 10.215.168.64  2024-07-30T10:14:32.544298+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-07-30T10:14:33.035083+00:00 10.215.168.64  2024-07-30T10:14:32.563833+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-07-30T10:14:33.887725+00:00 10.215.168.64  2024-07-30T10:14:33.416354+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-07-30T10:14:34.221677+00:00 10.215.168.64  2024-07-30T10:14:33.750491+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-07-30T10:14:34.285780+00:00 10.215.168.64  2024-07-30T10:14:33.814441+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-07-30T10:14:34.392539+00:00 10.215.168.64  2024-07-30T10:14:33.921038+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-07-30T10:14:34.457997+00:00 10.215.168.64  2024-07-30T10:14:33.986684+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2024-07-30T10:14:38.323993+00:00 10.215.168.64  2024-07-30T10:14:38.176546+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-30T10:14:38.323993+00:00 10.215.168.64  2024-07-30T10:14:38.176735+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="65519" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-30T10:14:38.323993+00:00 10.215.168.64  2024-07-30T10:14:38.177239+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-30T10:14:38.323993+00:00 10.215.168.64  2024-07-30T10:14:38.177354+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-30T10:14:38.323993+00:00 10.215.168.64  2024-07-30T10:14:38.213202+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-30T10:14:38.324980+00:00 10.215.168.64  2024-07-30T10:14:38.215437+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-30T10:14:38.324980+00:00 10.215.168.64  2024-07-30T10:14:38.215486+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-30T10:14:38.324984+00:00 10.215.168.64  2024-07-30T10:14:38.215524+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="65670" x-info="https://www.rsyslog.com"] start
2024-07-30T10:14:38.324991+00:00 10.215.168.64  2024-07-30T10:14:38.216114+00:00 daemon-notice osdx cfgd[1242]:  [60091]Completed change to active configuration
2024-07-30T10:14:38.327082+00:00 10.215.168.64  2024-07-30T10:14:38.218568+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-30T10:14:38.342598+00:00 10.215.168.64  2024-07-30T10:14:38.234019+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-30T10:14:38.552787+00:00 10.215.168.64  2024-07-30T10:14:38.444184+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1  vrf VRF0    count 1 size 56 timeout 1'.
2024-07-30T10:14:38.611231+00:00 10.215.168.64  2024-07-30T10:14:38.502624+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.134 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.134/0.134/0.134/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-30T10:14:39.093827+00:00 10.215.168.64  2024-07-30T10:14:38.985154+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-07-30T10:14:39.284520+00:00 10.215.168.64  2024-07-30T10:14:39.175896+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-07-30T10:14:39.300876+00:00 10.215.168.64  2024-07-30T10:14:39.192242+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-07-30T10:14:40.226954+00:00 10.215.168.64  2024-07-30T10:14:40.118220+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-07-30T10:14:40.644057+00:00 10.215.168.64  2024-07-30T10:14:40.535342+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-07-30T10:14:40.713890+00:00 10.215.168.64  2024-07-30T10:14:40.605159+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-07-30T10:14:40.839266+00:00 10.215.168.64  2024-07-30T10:14:40.730564+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-07-30T10:14:40.932207+00:00 10.215.168.64  2024-07-30T10:14:40.823509+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2024-07-30T10:14:44.984725+00:00 10.215.168.64  2024-07-30T10:14:44.016066+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-30T10:14:44.984725+00:00 10.215.168.64  2024-07-30T10:14:44.016195+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="65766" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-30T10:14:44.984725+00:00 10.215.168.64  2024-07-30T10:14:44.016883+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-30T10:14:44.984725+00:00 10.215.168.64  2024-07-30T10:14:44.016982+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-30T10:14:44.984725+00:00 10.215.168.64  2024-07-30T10:14:44.050753+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-30T10:14:44.984725+00:00 10.215.168.64  2024-07-30T10:14:44.052841+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-30T10:14:44.984725+00:00 10.215.168.64  2024-07-30T10:14:44.052870+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="65920" x-info="https://www.rsyslog.com"] start
2024-07-30T10:14:44.984725+00:00 10.215.168.64  2024-07-30T10:14:44.052890+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-30T10:14:44.985094+00:00 10.215.168.64  2024-07-30T10:14:44.053817+00:00 daemon-notice osdx cfgd[1242]:  [60091]Completed change to active configuration
2024-07-30T10:14:44.987304+00:00 10.215.168.64  2024-07-30T10:14:44.056018+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-30T10:14:45.031896+00:00 10.215.168.64  2024-07-30T10:14:44.100541+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-30T10:14:45.224260+00:00 10.215.168.64  2024-07-30T10:14:44.292914+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-07-30T10:14:45.279304+00:00 10.215.168.64  2024-07-30T10:14:44.347924+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.108 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.108/0.108/0.108/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-30T10:14:51.157067+00:00 33.33.33.33  2024-07-30T10:14:51.014420+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-30T10:14:51.157067+00:00 33.33.33.33  2024-07-30T10:14:51.014662+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="66007" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-30T10:14:51.157067+00:00 33.33.33.33  2024-07-30T10:14:51.015144+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-30T10:14:51.157067+00:00 33.33.33.33  2024-07-30T10:14:51.015233+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-30T10:14:51.157067+00:00 33.33.33.33  2024-07-30T10:14:51.038439+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-30T10:14:51.157067+00:00 33.33.33.33  2024-07-30T10:14:51.040065+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-30T10:14:51.157067+00:00 33.33.33.33  2024-07-30T10:14:51.040093+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="66142" x-info="https://www.rsyslog.com"] start
2024-07-30T10:14:51.157067+00:00 33.33.33.33  2024-07-30T10:14:51.040115+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-30T10:14:51.157067+00:00 33.33.33.33  2024-07-30T10:14:51.040734+00:00 daemon-notice osdx cfgd[1242]:  [60091]Completed change to active configuration
2024-07-30T10:14:51.159193+00:00 33.33.33.33  2024-07-30T10:14:51.043443+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-30T10:14:51.174682+00:00 33.33.33.33  2024-07-30T10:14:51.058900+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-30T10:14:51.322095+00:00 33.33.33.33  2024-07-30T10:14:51.206192+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-07-30T10:14:51.399544+00:00 33.33.33.33  2024-07-30T10:14:51.283651+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.105 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.105/0.105/0.105/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-30T10:14:52.202726+00:00 33.33.33.33  2024-07-30T10:14:52.086894+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-07-30T10:14:52.451703+00:00 33.33.33.33  2024-07-30T10:14:52.335837+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-07-30T10:14:52.466954+00:00 33.33.33.33  2024-07-30T10:14:52.351059+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-07-30T10:14:53.394232+00:00 33.33.33.33  2024-07-30T10:14:53.278312+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-07-30T10:14:53.789633+00:00 33.33.33.33  2024-07-30T10:14:53.673749+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-07-30T10:14:53.907797+00:00 33.33.33.33  2024-07-30T10:14:53.791873+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-07-30T10:14:53.975422+00:00 33.33.33.33  2024-07-30T10:14:53.859481+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-07-30T10:14:54.128162+00:00 33.33.33.33  2024-07-30T10:14:54.012201+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2024-07-30T10:14:58.509919+00:00 33.33.33.33  2024-07-30T10:14:58.368965+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-30T10:14:58.509919+00:00 33.33.33.33  2024-07-30T10:14:58.369072+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="66238" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-30T10:14:58.509919+00:00 33.33.33.33  2024-07-30T10:14:58.369658+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-30T10:14:58.509919+00:00 33.33.33.33  2024-07-30T10:14:58.369693+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-30T10:14:58.509919+00:00 33.33.33.33  2024-07-30T10:14:58.387899+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-30T10:14:58.509919+00:00 33.33.33.33  2024-07-30T10:14:58.390782+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-30T10:14:58.509919+00:00 33.33.33.33  2024-07-30T10:14:58.390821+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="66408" x-info="https://www.rsyslog.com"] start
2024-07-30T10:14:58.509919+00:00 33.33.33.33  2024-07-30T10:14:58.390846+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-30T10:14:58.509919+00:00 33.33.33.33  2024-07-30T10:14:58.390969+00:00 daemon-notice osdx cfgd[1242]:  [60091]Completed change to active configuration
2024-07-30T10:14:58.509919+00:00 33.33.33.33  2024-07-30T10:14:58.391207+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2024-07-30T10:14:58.513770+00:00 33.33.33.33  2024-07-30T10:14:58.394819+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-30T10:14:58.551431+00:00 33.33.33.33  2024-07-30T10:14:58.432866+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-30T10:14:58.761108+00:00 33.33.33.33  2024-07-30T10:14:58.642537+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1  vrf VRF0    count 1 size 56 timeout 1'.
2024-07-30T10:14:58.818303+00:00 33.33.33.33  2024-07-30T10:14:58.699699+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.224 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.224/0.224/0.224/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-30T10:15:06.144771+00:00 10.215.168.64  2024-07-30T10:15:05.157348+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-30T10:15:06.144771+00:00 10.215.168.64  2024-07-30T10:15:05.157496+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="66506" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-30T10:15:06.144857+00:00 10.215.168.64  2024-07-30T10:15:05.158091+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-30T10:15:06.144857+00:00 10.215.168.64  2024-07-30T10:15:05.158204+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-30T10:15:06.144857+00:00 10.215.168.64  2024-07-30T10:15:05.176546+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-30T10:15:06.144857+00:00 10.215.168.64  2024-07-30T10:15:05.184684+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-30T10:15:06.144857+00:00 10.215.168.64  2024-07-30T10:15:05.184733+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="66673" x-info="https://www.rsyslog.com"] start
2024-07-30T10:15:06.144857+00:00 10.215.168.64  2024-07-30T10:15:05.184764+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-30T10:15:06.144857+00:00 10.215.168.64  2024-07-30T10:15:05.186944+00:00 daemon-notice osdx cfgd[1242]:  [60091]Completed change to active configuration
2024-07-30T10:15:06.144857+00:00 10.215.168.64  2024-07-30T10:15:05.189748+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-30T10:15:06.144857+00:00 10.215.168.64  2024-07-30T10:15:05.229933+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-30T10:15:06.144857+00:00 10.215.168.64  2024-07-30T10:15:05.353546+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-07-30T10:15:06.144857+00:00 10.215.168.64  2024-07-30T10:15:05.813213+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2024-07-30T10:15:06.144857+00:00 10.215.168.64  2024-07-30T10:15:05.813285+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2024-07-30T10:15:06.945863+00:00 10.215.168.64  2024-07-30T10:15:06.673992+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.134 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.134/0.134/0.134/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-07-30T10:15:13.184883+00:00 33.33.33.33  2024-07-30T10:15:12.157137+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-07-30T10:15:13.185001+00:00 33.33.33.33  2024-07-30T10:15:12.157285+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="66769" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-07-30T10:15:13.185001+00:00 33.33.33.33  2024-07-30T10:15:12.157776+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-07-30T10:15:13.185001+00:00 33.33.33.33  2024-07-30T10:15:12.157903+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-07-30T10:15:13.185001+00:00 33.33.33.33  2024-07-30T10:15:12.179993+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-07-30T10:15:13.185001+00:00 33.33.33.33  2024-07-30T10:15:12.183221+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-07-30T10:15:13.185001+00:00 33.33.33.33  2024-07-30T10:15:12.183264+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="66908" x-info="https://www.rsyslog.com"] start
2024-07-30T10:15:13.185001+00:00 33.33.33.33  2024-07-30T10:15:12.183285+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-07-30T10:15:13.185001+00:00 33.33.33.33  2024-07-30T10:15:12.183460+00:00 daemon-notice osdx cfgd[1242]:  [60091]Completed change to active configuration
2024-07-30T10:15:13.185001+00:00 33.33.33.33  2024-07-30T10:15:12.185929+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-07-30T10:15:13.185001+00:00 33.33.33.33  2024-07-30T10:15:12.207355+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-07-30T10:15:13.185001+00:00 33.33.33.33  2024-07-30T10:15:12.217042+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2024-07-30T10:15:13.185001+00:00 33.33.33.33  2024-07-30T10:15:12.217106+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2024-07-30T10:15:13.347220+00:00 33.33.33.33  2024-07-30T10:15:12.391958+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-07-30T10:15:13.571748+00:00 33.33.33.33  2024-07-30T10:15:12.616406+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.