Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2024-10-09 08:39:28.715936 daemon-err , zebra[1399]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (100) vrf 0 2024-10-09 08:39:37.972053 daemon-err , zebra[1399]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0 2024-10-09 08:39:48.097486 daemon-err , zebra[1399]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (100) vrf 0 2024-10-09 08:40:01.032223 daemon-err , zebra[1399]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0 2024-10-09 08:40:10.526469 daemon-err , zebra[1399]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (100) vrf 0 2024-10-09 08:40:45.085900 user-crit , systemd-coredump[109574]: Process 109416 (Suricata-Main) of user 0 dumped core.#012#012Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64#012Stack trace of thread 109416:#012#0 0x00005615a14110e7 n/a (suricata + 0x48a0e7)#012#1 0x00005615a1179da9 StorageFreeAll (suricata + 0x1f2da9)#012#2 0x00005615a1152afd LiveDeviceListClean (suricata + 0x1c bafd)#012#3 0x00005615a1144479 SuricataMain (suricata + 0x1bd479)#012#4 0x00007fce980d324a n/a (libc.so.6 + 0x2724a)#012#5 0x00007fce980d3305 __libc_start_main (libc.so.6 + 0x27305)#012#6 0x00005615a113f791 _start (suricata + 0x1b8791)#012ELF object binary architecture: AMD x86-64 2024-10-09 08:40:45.469956 daemon-err , zebra[1399]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0 2024-10-09 08:40:55.189037 daemon-err , zebra[1399]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (100) vrf 0 2024-10-09 08:41:04.943226 daemon-err , zebra[1399]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0 2024-10-09 08:41:13.018556 daemon-err , zebra[1399]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (100) vrf 0 2024-10-09 08:41:23.068876 daemon-err , zebra[1399]: [PWG9W-384QK][EC 4043309090] Unknown netlink nlmsg_type (101) vrf 0 2024-10-09 09:01:21.009081 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:02:03.437882 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:02:21.370869 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:02:54.573080 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:03:12.879414 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:03:31.463245 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:03:49.322000 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:04:08.247950 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:04:27.214322 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:04:46.305708 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:05:04.113325 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:05:38.515202 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:05:58.018235 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:06:17.221287 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:06:35.983977 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:07:00.128352 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:07:26.530373 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:07:45.994334 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:08:10.193139 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:08:37.554183 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:08:56.138648 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:09:20.514340 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:09:47.836617 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:10:07.251904 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:10:31.358764 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:10:58.480263 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:11:17.031181 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:11:41.182983 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:12:08.507751 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:12:33.851175 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:12:58.069458 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:13:23.233827 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:13:48.023386 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:14:13.588451 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:15:21.904820 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:15:41.444046 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:16:16.742305 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:16:36.088052 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:16:52.392014 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:17:08.492056 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:17:14.995582 daemon-err , snmpd[140629]: snmpd: send_trap: Failure in sendto (Network is unreachable) 2024-10-09 09:17:20.502631 daemon-err , snmpd[140629]: snmpd: send_trap: Failure in sendto (Network is unreachable) 2024-10-09 09:17:21.098295 daemon-err , snmpd[140696]: snmpd: send_trap: Failure in sendto (Network is unreachable) 2024-10-09 09:17:27.862556 daemon-err , snmpd[140696]: snmpd: send_trap: Failure in sendto (Network is unreachable) 2024-10-09 09:17:27.862842 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:17:28.703232 daemon-err , snmpd[140745]: snmpd: send_trap: Failure in sendto (Network is unreachable) 2024-10-09 09:17:35.143660 daemon-err , snmpd[140745]: snmpd: send_trap: Failure in sendto (Network is unreachable) 2024-10-09 09:17:46.814287 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:17:54.120158 user-err , ERROR: Dissociating VRF from service: cnm 2024-10-09 09:17:54.214182 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 301 2024-10-09 09:17:54.214253 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 301 2024-10-09 09:18:00.667963 daemon-err , snmpd[141200]: snmpd: send_trap: Unknown engine ID (Network is unreachable) 2024-10-09 09:18:06.256953 daemon-err , snmpd[141200]: snmpd: send_trap: Unknown engine ID (Network is unreachable) 2024-10-09 09:18:06.257777 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:18:06.791159 daemon-err , snmpd[141272]: snmpd: send_trap: Unknown engine ID (Network is unreachable) 2024-10-09 09:18:13.512194 daemon-err , snmpd[141272]: snmpd: send_trap: Unknown engine ID (Network is unreachable) 2024-10-09 09:18:14.075528 daemon-err , snmpd[141322]: snmpd: send_trap: Unknown engine ID (Network is unreachable) 2024-10-09 09:18:20.983080 daemon-err , snmpd[141322]: snmpd: send_trap: Unknown engine ID (Network is unreachable) 2024-10-09 09:18:27.732600 daemon-err , snmpd[141375]: snmpd: send_trap: Timeout 2024-10-09 09:18:33.739467 daemon-err , snmpd[141375]: snmpd: send_trap: Timeout 2024-10-09 09:18:40.421318 daemon-err , snmpd[141428]: snmpd: send_trap: Timeout 2024-10-09 09:18:41.110538 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:18:48.381962 user-err , ERROR: Dissociating VRF from service: cnm 2024-10-09 09:18:48.463249 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 302 2024-10-09 09:18:48.463329 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 302 2024-10-09 09:19:03.290993 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:19:07.885889 user-err , ERROR: Dissociating VRF from service: cnm 2024-10-09 09:19:07.957193 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 303 2024-10-09 09:19:07.957274 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 303 2024-10-09 09:19:23.589449 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:19:28.415026 user-err , ERROR: Dissociating VRF from service: cnm 2024-10-09 09:19:28.501217 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 304 2024-10-09 09:19:28.501294 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 304 2024-10-09 09:19:39.410616 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:20:10.344776 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:20:42.626401 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:21:01.559507 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:21:19.865947 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:21:58.691199 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:22:16.237383 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:22:41.849582 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:22:59.653611 daemon-err , zebra[1399]: [ZBSQQ-8BYDT][EC 100663303] Failed to set snmp fd back to original settings: Bad file descriptor(9) 2024-10-09 09:24:28.845965 daemon-err , dhcpd[147627]: Multiple interfaces match the same subnet: eth0.100 eth0.101 2024-10-09 09:24:28.846068 daemon-err , dhcpd[147627]: Multiple interfaces match the same shared network: eth0.100 eth0.101 2024-10-09 09:24:28.967317 daemon-err , dhcpd[147632]: Multiple interfaces match the same subnet: eth0.100 eth0.101 2024-10-09 09:24:28.967389 daemon-err , dhcpd[147632]: Multiple interfaces match the same shared network: eth0.100 eth0.101 2024-10-09 09:24:43.734145 user-err , ERROR: Dissociating VRF from service: cnm 2024-10-09 09:24:43.827664 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 313 2024-10-09 09:24:43.827736 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 313 2024-10-09 09:24:43.923396 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 314 2024-10-09 09:24:43.923490 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 314 2024-10-09 09:24:51.639205 user-err , ERROR: DHCPv6 Server not configured to listen on any interface 2024-10-09 09:24:51.641274 daemon-err , cfgd[1434]: External python command [cfg.dhcp_server check_subnets v6] finished with status 1 2024-10-09 09:24:51.641455 daemon-err , cfgd[1434]: Commit validation failed 2024-10-09 09:24:51.644944 daemon-err , cfgd[1434]: [101017]Command output:#012[ interfaces ethernet eth0 address 10::1/24 ]#012DHCP Server not configured to listen on any interface#012Commit validation failed#012 2024-10-09 09:25:01.750168 user-err , ERROR: DHCPv6 Server not configured to listen on any interface 2024-10-09 09:25:01.750772 daemon-err , cfgd[1434]: External python command [cfg.dhcp_server check_subnets v6] finished with status 1 2024-10-09 09:25:01.750927 daemon-err , cfgd[1434]: Commit validation failed 2024-10-09 09:25:01.753863 daemon-err , cfgd[1434]: [101017]Command output:#012[ interfaces ethernet eth1 address 20::1/24 ]#012DHCP Server not configured to listen on any interface#012Commit validation failed#012 2024-10-09 09:25:04.850719 user-err , ERROR: Dissociating VRF from service: cnm 2024-10-09 09:25:04.923762 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF-1 in VRF 317 2024-10-09 09:25:04.923815 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF-1 in VRF 317 2024-10-09 09:25:10.441810 user-err , ERROR: DHCPv6 Server not configured to listen on any interface 2024-10-09 09:25:10.441949 daemon-err , cfgd[1434]: External python command [cfg.dhcp_server check_subnets v6] finished with status 1 2024-10-09 09:25:10.441998 daemon-err , cfgd[1434]: Commit validation failed 2024-10-09 09:25:10.444084 daemon-err , cfgd[1434]: [101017]Command output:#012[ interfaces ethernet eth0 address 10::1/24 ]#012DHCP Server not configured to listen on any interface#012Commit validation failed#012 2024-10-09 09:25:21.664204 user-err , ERROR: DHCPv6 Server not configured to listen on any interface 2024-10-09 09:25:21.666053 daemon-err , cfgd[1434]: External python command [cfg.dhcp_server check_subnets v6] finished with status 1 2024-10-09 09:25:21.667066 daemon-err , cfgd[1434]: Commit validation failed 2024-10-09 09:25:21.669892 daemon-err , cfgd[1434]: [101017]Command output:#012[ interfaces ethernet eth0 address 10::1/24 ]#012DHCP Server not configured to listen on any interface#012Commit validation failed#012 2024-10-09 09:25:25.457127 user-err , ERROR: Dissociating VRF from service: cnm 2024-10-09 09:25:25.520448 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF-1 in VRF 318 2024-10-09 09:25:25.520536 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF-1 in VRF 318 2024-10-09 09:26:11.631142 daemon-err , modulelauncher[150024]: osdx.utils.xos cmd error: nft -f /tmp/tmpkv0klvhp 2024-10-09 09:26:11.631340 daemon-err , modulelauncher[150024]: Command 'nft -f /tmp/tmpkv0klvhp' returned non-zero exit status 1. 2024-10-09 09:27:06.997320 user-err , ERROR: Dissociating VRF from service: cnm 2024-10-09 09:27:07.092525 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF 1 in VRF 319 2024-10-09 09:27:07.092591 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF 1 in VRF 319 2024-10-09 09:27:49.400696 daemon-crit , dnscrypt-proxy[157200]: Unable to retrieve source [RD]: [Invalid encoded public key] 2024-10-09 09:27:49.400738 daemon-alert , dnscrypt-proxy[157200]: Invalid encoded public key 2024-10-09 09:27:50.754314 daemon-crit , dnscrypt-proxy[157246]: Unable to retrieve source [RD]: [Invalid encoded public key] 2024-10-09 09:27:50.754360 daemon-alert , dnscrypt-proxy[157246]: Invalid encoded public key 2024-10-09 09:27:51.956518 daemon-crit , dnscrypt-proxy[157277]: Unable to retrieve source [RD]: [Invalid encoded public key] 2024-10-09 09:27:51.956544 daemon-alert , dnscrypt-proxy[157277]: Invalid encoded public key 2024-10-09 09:27:53.194382 daemon-crit , dnscrypt-proxy[157313]: Unable to retrieve source [RD]: [Invalid encoded public key] 2024-10-09 09:27:53.194416 daemon-alert , dnscrypt-proxy[157313]: Invalid encoded public key 2024-10-09 09:27:54.451779 daemon-crit , dnscrypt-proxy[157347]: Unable to retrieve source [RD]: [Invalid encoded public key] 2024-10-09 09:27:54.451821 daemon-alert , dnscrypt-proxy[157347]: Invalid encoded public key 2024-10-09 09:27:55.640052 daemon-err , systemd[1]: Failed to start dnscrypt-proxy.service - DNSCrypt client proxy. 2024-10-09 09:28:22.113068 daemon-crit , dnscrypt-proxy[160263]: Unable to retrieve source [RD]: [Invalid encoded public key] 2024-10-09 09:28:22.113108 daemon-alert , dnscrypt-proxy[160263]: Invalid encoded public key 2024-10-09 09:28:23.357780 daemon-crit , dnscrypt-proxy[160303]: Unable to retrieve source [RD]: [Invalid encoded public key] 2024-10-09 09:28:23.357840 daemon-alert , dnscrypt-proxy[160303]: Invalid encoded public key 2024-10-09 09:28:24.582670 daemon-crit , dnscrypt-proxy[160332]: Unable to retrieve source [RD]: [Invalid encoded public key] 2024-10-09 09:28:24.582791 daemon-alert , dnscrypt-proxy[160332]: Invalid encoded public key 2024-10-09 09:28:25.850909 daemon-crit , dnscrypt-proxy[160367]: Unable to retrieve source [RD]: [Invalid encoded public key] 2024-10-09 09:28:25.850947 daemon-alert , dnscrypt-proxy[160367]: Invalid encoded public key 2024-10-09 09:28:27.089798 daemon-crit , dnscrypt-proxy[160394]: Unable to retrieve source [RD]: [Invalid encoded public key] 2024-10-09 09:28:27.089842 daemon-alert , dnscrypt-proxy[160394]: Invalid encoded public key 2024-10-09 09:28:28.283081 daemon-err , systemd[1]: Failed to start dnscrypt-proxy.service - DNSCrypt client proxy. 2024-10-09 09:44:27.083557 user-err , ERROR: Dissociating VRF from service: cnm 2024-10-09 09:44:27.169535 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF GREEN in VRF 320 2024-10-09 09:44:27.169618 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF GREEN in VRF 320 2024-10-09 09:44:27.273230 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 321 2024-10-09 09:44:27.273286 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 321 2024-10-09 09:44:44.267990 user-err , ERROR: Dissociating VRF from service: cnm 2024-10-09 09:44:44.352994 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 322 2024-10-09 09:44:44.353066 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 322 2024-10-09 09:54:30.451311 user-crit , systemd-coredump[317404]: Process 316999 (Suricata-Main) of user 0 dumped core.#012#012Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64#012Stack trace of thread 316999:#012#0 0x000055b1e70480e7 n/a (suricata + 0x48a0e7)#012#1 0x000055b1e6db0da9 StorageFreeAll (suricata + 0x1f2da9)#012#2 0x000055b1e6d89afd LiveDeviceListClean (suricata + 0x1c bafd)#012#3 0x000055b1e6d7b479 SuricataMain (suricata + 0x1bd479)#012#4 0x00007f2bdcd8a24a n/a (libc.so.6 + 0x2724a)#012#5 0x00007f2bdcd8a305 __libc_start_main (libc.so.6 + 0x27305)#012#6 0x000055b1e6d76791 _start (suricata + 0x1b8791)#012ELF object binary architecture: AMD x86-64 2024-10-09 10:10:25.390716 user-err , ERROR: Dissociating VRF from service: cnm 2024-10-09 10:10:25.499539 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF in VRF 360 2024-10-09 10:10:25.499619 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF in VRF 360 2024-10-09 10:10:42.152966 user-err , ERROR: Dissociating VRF from service: cnm 2024-10-09 10:10:42.242127 daemon-err , nhrpd[341910]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF in VRF 363 2024-10-09 10:10:42.242195 daemon-err , nhrpd[341910]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF in VRF 363 2024-10-09 10:10:42.242380 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF in VRF 363 2024-10-09 10:10:42.242425 daemon-err , staticd[1404]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF in VRF 363 2024-10-09 10:12:10.475434 daemon-err , cfgd[1434]: External python command [cfg.auto_scripts process ADVISOR1 SCRIPT_1 true] finished with status 1 2024-10-09 10:12:56.424262 user-err , ERROR: `system script SCRIPT_1` validation error 2024-10-09 10:12:56.424417 user-err , ERROR: 0 2024-10-09 10:12:56.425016 daemon-err , cfgd[1434]: [339745]Command output:#012Value validation failed#012 2024-10-09 10:12:56.791649 user-err , ERROR: `system script SCRIPT_1` validation error 2024-10-09 10:12:56.791860 user-err , ERROR: system potato: Invalid operational command. 2024-10-09 10:12:56.792301 daemon-err , cfgd[1434]: [339745]Command output:#012Value validation failed#012 2024-10-09 10:13:04.746220 daemon-err , cfgd[1434]: [ service dhcp-server ] 2024-10-09 10:13:04.746249 daemon-err , cfgd[1434]: \"shared-network\" configuration is required 2024-10-09 10:13:04.746281 daemon-err , cfgd[1434]: Commit validation failed 2024-10-09 10:13:04.748353 daemon-err , cfgd[1434]: [345786]Command output:#012[ service dhcp-server ]#012\"shared-network\" configuration is required#012Commit validation failed#012 2024-10-09 10:13:04.757616 daemon-err , cfgd[1434]: External python command [cfg.auto_scripts execute_script SCRIPT_1] finished with status 1 2024-10-09 10:13:24.967764 daemon-err , cfgd[1434]: [ interfaces ethernet eth0 alarm down ] 2024-10-09 10:13:24.967820 daemon-err , cfgd[1434]: \"system alarm ALARM_TO_TEST\" does not exist 2024-10-09 10:13:24.967854 daemon-err , cfgd[1434]: Commit validation failed 2024-10-09 10:13:24.970125 daemon-err , cfgd[1434]: [345977]Command output:#012[ interfaces ethernet eth0 alarm down ]#012\"system alarm ALARM_TO_TEST\" does not exist#012Commit validation failed#012 2024-10-09 10:13:36.509313 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2024-10-09 10:13:36.629354 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2024-10-09 10:13:49.091912 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2024-10-09 10:14:03.112830 user-err , OSDxCLI: Unable to open config file /etc/aaa/tacacs/acct-tacgroup1: No such file or directory 2024-10-09 10:15:10.984129 daemon-info , systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-10-09 10:15:10.984343 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="346100" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-10-09 10:15:10.985448 daemon-info , systemd[1]: rsyslog.service: Deactivated successfully. 2024-10-09 10:15:10.985638 daemon-info , systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-10-09 10:15:11.017346 daemon-info , systemd[1]: Starting rsyslog.service - System Logging Service... 2024-10-09 10:15:11.019697 syslog-info , rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-10-09 10:15:11.019755 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="349245" x-info="https://www.rsyslog.com"] start 2024-10-09 10:15:11.019792 daemon-info , systemd[1]: Started rsyslog.service - System Logging Service. 2024-10-09 10:15:11.020764 daemon-notice , cfgd[1434]: [347105]Completed change to active configuration 2024-10-09 10:15:11.023840 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2024-10-09 10:15:11.068687 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2024-10-09 10:15:11.255533 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.Show output
2024-10-09 10:15:19.064765 daemon-info , systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-10-09 10:15:19.065630 daemon-info , systemd[1]: rsyslog.service: Deactivated successfully. 2024-10-09 10:15:19.065900 daemon-info , systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-10-09 10:15:19.085575 daemon-info , systemd[1]: Starting rsyslog.service - System Logging Service... 2024-10-09 10:15:19.087985 daemon-info , systemd[1]: Started rsyslog.service - System Logging Service. 2024-10-09 10:15:20.049507 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
Started.*"DHCP Server Service instance main"\.Show output
2024-10-09 10:15:28.407842 daemon-info , systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-10-09 10:15:28.410386 daemon-info , systemd[1]: rsyslog.service: Deactivated successfully. 2024-10-09 10:15:28.410600 daemon-info , systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-10-09 10:15:28.422561 daemon-info , systemd[1]: Starting rsyslog.service - System Logging Service... 2024-10-09 10:15:28.427548 daemon-info , systemd[1]: Started rsyslog.service - System Logging Service. 2024-10-09 10:15:29.406572 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.271 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.271/0.271/0.271/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-10-09T10:15:38.374135+00:00 10.215.168.64 2024-10-09T10:15:37.428567+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-10-09T10:15:38.374135+00:00 10.215.168.64 2024-10-09T10:15:37.428943+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="349860" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-10-09T10:15:38.374135+00:00 10.215.168.64 2024-10-09T10:15:37.429675+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-10-09T10:15:38.374135+00:00 10.215.168.64 2024-10-09T10:15:37.429867+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-10-09T10:15:38.374135+00:00 10.215.168.64 2024-10-09T10:15:37.443694+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-10-09T10:15:38.374135+00:00 10.215.168.64 2024-10-09T10:15:37.446197+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-10-09T10:15:38.374226+00:00 10.215.168.64 2024-10-09T10:15:37.446253+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="349993" x-info="https://www.rsyslog.com"] start 2024-10-09T10:15:38.374226+00:00 10.215.168.64 2024-10-09T10:15:37.446307+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-10-09T10:15:38.375925+00:00 10.215.168.64 2024-10-09T10:15:37.448348+00:00 daemon-notice osdx cfgd[1434]: [347105]Completed change to active configuration 2024-10-09T10:15:38.417924+00:00 10.215.168.64 2024-10-09T10:15:37.490368+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-10-09T10:15:38.450113+00:00 10.215.168.64 2024-10-09T10:15:37.522535+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-10-09T10:15:38.626993+00:00 10.215.168.64 2024-10-09T10:15:37.699438+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-10-09T10:15:38.718908+00:00 10.215.168.64 2024-10-09T10:15:37.791384+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.231 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.231/0.231/0.231/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-10-09T10:15:39.207063+00:00 10.215.168.64 2024-10-09T10:15:38.279531+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-10-09T10:15:39.512668+00:00 10.215.168.64 2024-10-09T10:15:38.585086+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-10-09T10:15:39.533799+00:00 10.215.168.64 2024-10-09T10:15:38.606256+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-10-09T10:15:40.732903+00:00 10.215.168.64 2024-10-09T10:15:39.805284+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-10-09T10:15:41.184767+00:00 10.215.168.64 2024-10-09T10:15:40.257130+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-10-09T10:15:41.298832+00:00 10.215.168.64 2024-10-09T10:15:40.371101+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-10-09T10:15:41.407756+00:00 10.215.168.64 2024-10-09T10:15:40.480150+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-10-09T10:15:41.544740+00:00 10.215.168.64 2024-10-09T10:15:40.617130+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2024-10-09T10:15:46.890258+00:00 10.215.168.64 2024-10-09T10:15:45.900023+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-10-09T10:15:46.890258+00:00 10.215.168.64 2024-10-09T10:15:45.900211+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="350091" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-10-09T10:15:46.890258+00:00 10.215.168.64 2024-10-09T10:15:45.900897+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-10-09T10:15:46.890267+00:00 10.215.168.64 2024-10-09T10:15:45.901062+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-10-09T10:15:46.890279+00:00 10.215.168.64 2024-10-09T10:15:45.940664+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-10-09T10:15:46.890279+00:00 10.215.168.64 2024-10-09T10:15:45.943073+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-10-09T10:15:46.890298+00:00 10.215.168.64 2024-10-09T10:15:45.943116+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-10-09T10:15:46.890308+00:00 10.215.168.64 2024-10-09T10:15:45.943166+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="350252" x-info="https://www.rsyslog.com"] start 2024-10-09T10:15:46.890524+00:00 10.215.168.64 2024-10-09T10:15:45.944202+00:00 daemon-notice osdx cfgd[1434]: [347105]Completed change to active configuration 2024-10-09T10:15:46.937886+00:00 10.215.168.64 2024-10-09T10:15:45.991475+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-10-09T10:15:46.961958+00:00 10.215.168.64 2024-10-09T10:15:46.015581+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-10-09T10:15:47.279307+00:00 10.215.168.64 2024-10-09T10:15:46.332766+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2024-10-09T10:15:47.358272+00:00 10.215.168.64 2024-10-09T10:15:46.411741+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-interface eth0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.201 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.201/0.201/0.201/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-10-09T10:15:47.846855+00:00 10.215.168.64 2024-10-09T10:15:46.900310+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-10-09T10:15:48.108131+00:00 10.215.168.64 2024-10-09T10:15:47.161696+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-10-09T10:15:48.135764+00:00 10.215.168.64 2024-10-09T10:15:47.189089+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-10-09T10:15:49.364821+00:00 10.215.168.64 2024-10-09T10:15:48.418373+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-10-09T10:15:49.846861+00:00 10.215.168.64 2024-10-09T10:15:48.900360+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-10-09T10:15:49.958548+00:00 10.215.168.64 2024-10-09T10:15:49.012021+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-10-09T10:15:50.069467+00:00 10.215.168.64 2024-10-09T10:15:49.122987+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-10-09T10:15:50.216363+00:00 10.215.168.64 2024-10-09T10:15:49.269886+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2024-10-09T10:15:55.155456+00:00 10.215.168.64 2024-10-09T10:15:54.456191+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-10-09T10:15:55.155456+00:00 10.215.168.64 2024-10-09T10:15:54.456415+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="350350" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-10-09T10:15:55.155456+00:00 10.215.168.64 2024-10-09T10:15:54.457099+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-10-09T10:15:55.155456+00:00 10.215.168.64 2024-10-09T10:15:54.457231+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-10-09T10:15:55.155456+00:00 10.215.168.64 2024-10-09T10:15:54.487734+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-10-09T10:15:55.155456+00:00 10.215.168.64 2024-10-09T10:15:54.489969+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-10-09T10:15:55.155456+00:00 10.215.168.64 2024-10-09T10:15:54.490027+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="350517" x-info="https://www.rsyslog.com"] start 2024-10-09T10:15:55.155456+00:00 10.215.168.64 2024-10-09T10:15:54.490076+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-10-09T10:15:55.155456+00:00 10.215.168.64 2024-10-09T10:15:54.491497+00:00 daemon-notice osdx cfgd[1434]: [347105]Completed change to active configuration 2024-10-09T10:15:55.192638+00:00 10.215.168.64 2024-10-09T10:15:54.527303+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-10-09T10:15:55.234911+00:00 10.215.168.64 2024-10-09T10:15:54.571248+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-10-09T10:15:55.412700+00:00 10.215.168.64 2024-10-09T10:15:54.748962+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-10-09T10:15:55.498948+00:00 10.215.168.64 2024-10-09T10:15:54.835100+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and UDP
Description
Add a remote host to send syslog messages through a specific local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.211 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.211/0.211/0.211/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-10-09T10:16:03.303674+00:00 33.33.33.33 2024-10-09T10:16:02.807264+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-10-09T10:16:03.303674+00:00 33.33.33.33 2024-10-09T10:16:02.807523+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="350615" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-10-09T10:16:03.303674+00:00 33.33.33.33 2024-10-09T10:16:02.808093+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-10-09T10:16:03.303691+00:00 33.33.33.33 2024-10-09T10:16:02.808461+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-10-09T10:16:03.303691+00:00 33.33.33.33 2024-10-09T10:16:02.836091+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-10-09T10:16:03.303825+00:00 33.33.33.33 2024-10-09T10:16:02.840058+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-10-09T10:16:03.303825+00:00 33.33.33.33 2024-10-09T10:16:02.840122+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="350769" x-info="https://www.rsyslog.com"] start 2024-10-09T10:16:03.303825+00:00 33.33.33.33 2024-10-09T10:16:02.840169+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-10-09T10:16:03.304189+00:00 33.33.33.33 2024-10-09T10:16:02.840888+00:00 daemon-notice osdx cfgd[1434]: [347105]Completed change to active configuration 2024-10-09T10:16:03.342961+00:00 33.33.33.33 2024-10-09T10:16:02.879547+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-10-09T10:16:03.378782+00:00 33.33.33.33 2024-10-09T10:16:02.915418+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-10-09T10:16:03.562250+00:00 33.33.33.33 2024-10-09T10:16:03.098882+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-10-09T10:16:03.650317+00:00 33.33.33.33 2024-10-09T10:16:03.186918+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and VRF
Description
Add a remote host to send syslog messages through a VRF and a local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.260 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.260/0.260/0.260/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-10-09T10:16:04.169019+00:00 33.33.33.33 2024-10-09T10:16:03.705607+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2024-10-09T10:16:04.423585+00:00 33.33.33.33 2024-10-09T10:16:03.960194+00:00 user-warning osdx OSDxCLI: Signal 10 received 2024-10-09T10:16:04.451813+00:00 33.33.33.33 2024-10-09T10:16:03.988257+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2024-10-09T10:16:05.678057+00:00 33.33.33.33 2024-10-09T10:16:05.214627+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2024-10-09T10:16:06.235656+00:00 33.33.33.33 2024-10-09T10:16:05.772183+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2024-10-09T10:16:06.357490+00:00 33.33.33.33 2024-10-09T10:16:05.894106+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2024-10-09T10:16:06.473303+00:00 33.33.33.33 2024-10-09T10:16:06.009699+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2024-10-09T10:16:06.612521+00:00 33.33.33.33 2024-10-09T10:16:06.149079+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2024-10-09T10:16:12.106873+00:00 33.33.33.33 2024-10-09T10:16:11.974740+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-10-09T10:16:12.106873+00:00 33.33.33.33 2024-10-09T10:16:11.974988+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="350867" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-10-09T10:16:12.106873+00:00 33.33.33.33 2024-10-09T10:16:11.975594+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-10-09T10:16:12.106873+00:00 33.33.33.33 2024-10-09T10:16:11.975729+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-10-09T10:16:12.106873+00:00 33.33.33.33 2024-10-09T10:16:11.996651+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-10-09T10:16:12.107202+00:00 33.33.33.33 2024-10-09T10:16:11.999919+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-10-09T10:16:12.107202+00:00 33.33.33.33 2024-10-09T10:16:11.999993+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-10-09T10:16:12.107214+00:00 33.33.33.33 2024-10-09T10:16:12.000064+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="351055" x-info="https://www.rsyslog.com"] start 2024-10-09T10:16:12.107231+00:00 33.33.33.33 2024-10-09T10:16:12.000120+00:00 syslog-warning osdx rsyslogd: bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ] 2024-10-09T10:16:12.107995+00:00 33.33.33.33 2024-10-09T10:16:12.001065+00:00 daemon-notice osdx cfgd[1434]: [347105]Completed change to active configuration 2024-10-09T10:16:12.146790+00:00 33.33.33.33 2024-10-09T10:16:12.039569+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-10-09T10:16:12.172175+00:00 33.33.33.33 2024-10-09T10:16:12.065237+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-10-09T10:16:12.501663+00:00 33.33.33.33 2024-10-09T10:16:12.394725+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2024-10-09T10:16:12.584023+00:00 33.33.33.33 2024-10-09T10:16:12.476981+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.265 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.265/0.265/0.265/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-10-09T10:16:21.416324+00:00 10.215.168.64 2024-10-09T10:16:20.707035+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-10-09T10:16:21.416563+00:00 10.215.168.64 2024-10-09T10:16:20.707197+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="351153" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-10-09T10:16:21.416563+00:00 10.215.168.64 2024-10-09T10:16:20.707711+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-10-09T10:16:21.416563+00:00 10.215.168.64 2024-10-09T10:16:20.707842+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-10-09T10:16:21.416563+00:00 10.215.168.64 2024-10-09T10:16:20.722455+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-10-09T10:16:21.416563+00:00 10.215.168.64 2024-10-09T10:16:20.733561+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-10-09T10:16:21.416563+00:00 10.215.168.64 2024-10-09T10:16:20.733609+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="351331" x-info="https://www.rsyslog.com"] start 2024-10-09T10:16:21.416563+00:00 10.215.168.64 2024-10-09T10:16:20.733643+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-10-09T10:16:21.416563+00:00 10.215.168.64 2024-10-09T10:16:20.734129+00:00 daemon-notice osdx cfgd[1434]: [347105]Completed change to active configuration 2024-10-09T10:16:21.416563+00:00 10.215.168.64 2024-10-09T10:16:20.784589+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-10-09T10:16:21.416563+00:00 10.215.168.64 2024-10-09T10:16:20.819840+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-10-09T10:16:21.416563+00:00 10.215.168.64 2024-10-09T10:16:21.028717+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-10-09T10:16:21.416563+00:00 10.215.168.64 2024-10-09T10:16:21.286851+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2024-10-09T10:16:21.416563+00:00 10.215.168.64 2024-10-09T10:16:21.286957+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2024-10-09T10:16:22.582656+00:00 10.215.168.64 2024-10-09T10:16:22.465445+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Local Address Single TLS
Description
Add a secured remote host to send syslog messages and show the host name from a fiven local-address
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.355 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.355/0.355/0.355/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2024-10-09T10:16:31.677708+00:00 33.33.33.33 2024-10-09T10:16:30.913578+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2024-10-09T10:16:31.677708+00:00 33.33.33.33 2024-10-09T10:16:30.913964+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="351429" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-10-09T10:16:31.677708+00:00 33.33.33.33 2024-10-09T10:16:30.914511+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2024-10-09T10:16:31.677708+00:00 33.33.33.33 2024-10-09T10:16:30.914648+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2024-10-09T10:16:31.677708+00:00 33.33.33.33 2024-10-09T10:16:30.938093+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2024-10-09T10:16:31.677708+00:00 33.33.33.33 2024-10-09T10:16:30.940650+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2024-10-09T10:16:31.718977+00:00 33.33.33.33 2024-10-09T10:16:30.940704+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2024-10-09T10:16:31.718977+00:00 33.33.33.33 2024-10-09T10:16:30.940761+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="351584" x-info="https://www.rsyslog.com"] start 2024-10-09T10:16:31.718977+00:00 33.33.33.33 2024-10-09T10:16:30.942064+00:00 daemon-notice osdx cfgd[1434]: [347105]Completed change to active configuration 2024-10-09T10:16:31.718977+00:00 33.33.33.33 2024-10-09T10:16:30.980886+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2024-10-09T10:16:31.718977+00:00 33.33.33.33 2024-10-09T10:16:31.006303+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2024-10-09T10:16:31.718977+00:00 33.33.33.33 2024-10-09T10:16:31.190315+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2024-10-09T10:16:31.718977+00:00 33.33.33.33 2024-10-09T10:16:31.224475+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2024-10-09T10:16:31.718977+00:00 33.33.33.33 2024-10-09T10:16:31.224538+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2024-10-09T10:16:31.862353+00:00 33.33.33.33 2024-10-09T10:16:31.428696+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.