Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2024-10-07 10:17:45.000828 user-err , ERROR:  Dissociating VRF from service: cnm
2024-10-07 10:17:45.088082 daemon-err , ospfd[85741]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF OSPF2 in VRF 244
2024-10-07 10:17:45.088240 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF OSPF2 in VRF 244
2024-10-07 10:17:45.088265 daemon-err , ospfd[85741]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF OSPF2 in VRF 244
2024-10-07 10:17:45.088279 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF OSPF2 in VRF 244
2024-10-07 10:17:45.088293 daemon-err , ospfd[85741]:  [YNQCS-MR20J][EC 100663301] INTERFACE_VRF_UPDATE: Cannot find IF OSPF2 in VRF 244
2024-10-07 10:17:45.232019 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF OSPF1 in VRF 243
2024-10-07 10:17:45.232077 daemon-err , ospfd[85741]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF OSPF1 in VRF 243
2024-10-07 10:17:45.232100 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF OSPF1 in VRF 243
2024-10-07 10:17:45.232119 daemon-err , ospfd[85741]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF OSPF1 in VRF 243
2024-10-07 10:17:45.232138 daemon-err , ospfd[85741]:  [YNQCS-MR20J][EC 100663301] INTERFACE_VRF_UPDATE: Cannot find IF OSPF1 in VRF 243
2024-10-07 10:18:58.126844 daemon-err , bgpd[86898]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum0 in VRF 0
2024-10-07 10:19:08.282133 daemon-err , bgpd[87265]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum0 in VRF 0
2024-10-07 10:19:15.267185 daemon-err , bgpd[87692]:  [MVZKX-EG443][EC 33554452] bgp_process_packet: BGP OPEN receipt failed for peer: 10.215.200.50
2024-10-07 10:19:19.404017 daemon-err , bgpd[87692]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum0 in VRF 0
2024-10-07 10:19:28.305190 daemon-err , bgpd[88142]:  [MVZKX-EG443][EC 33554452] bgp_process_packet: BGP OPEN receipt failed for peer: 192.168.100.2
2024-10-07 10:19:39.735888 daemon-err , bgpd[88142]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum0 in VRF 0
2024-10-07 10:19:59.071338 daemon-err , bgpd[88575]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum0 in VRF 0
2024-10-07 10:20:14.438052 daemon-err , bgpd[89108]:  [RM0XP-C52DA][EC 33554466] 10.10.0.200 [FSM] Ignoring event BGP_Start in state Connect, prior events BGP_Start, BGP_Start, fd 26
2024-10-07 10:20:36.889200 daemon-err , bgpd[89711]:  [RM0XP-C52DA][EC 33554466] 20.20.0.200 [FSM] Ignoring event BGP_Start in state Connect, prior events BGP_Start, BGP_Start, fd 26
2024-10-07 10:21:09.871400 daemon-err , bgpd[91055]:  [MVZKX-EG443][EC 33554452] bgp_process_packet: BGP OPEN receipt failed for peer: 10.0.0.2
2024-10-07 10:21:20.021331 daemon-err , bgpd[91442]:  [MVZKX-EG443][EC 33554452] bgp_process_packet: BGP OPEN receipt failed for peer: 10.0.0.2
2024-10-07 10:21:45.446720 daemon-err , bgpd[92228]:  [MVZKX-EG443][EC 33554452] bgp_process_packet: BGP OPEN receipt failed for peer: 10.0.0.2
2024-10-07 10:21:47.758369 daemon-err , bgpd[92228]:  [MVZKX-EG443][EC 33554452] bgp_process_packet: BGP OPEN receipt failed for peer: 10.0.0.2
2024-10-07 10:21:57.881734 daemon-err , bgpd[92613]:  [MVZKX-EG443][EC 33554452] bgp_process_packet: BGP OPEN receipt failed for peer: 10.0.0.2
2024-10-07 10:22:11.605739 daemon-err , bgpd[93011]:  [MVZKX-EG443][EC 33554452] bgp_process_packet: BGP OPEN receipt failed for peer: 10.0.0.2
2024-10-07 10:22:25.573832 daemon-err , bgpd[93406]:  [MVZKX-EG443][EC 33554452] bgp_process_packet: BGP OPEN receipt failed for peer: 10.0.0.2
2024-10-07 10:22:34.816535 daemon-err , bgpd[93792]:  [MVZKX-EG443][EC 33554452] bgp_process_packet: BGP OPEN receipt failed for peer: 10.0.0.2
2024-10-07 10:22:38.070582 user-err , ERROR:  No value for list_name, action or value.
2024-10-07 10:22:57.457823 daemon-err , bgpd[94558]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF eth1 in VRF 253
2024-10-07 10:22:57.457883 daemon-err , bgpd[94558]:  [YNQCS-MR20J][EC 100663301] INTERFACE_VRF_UPDATE: Cannot find IF eth1 in VRF 253
2024-10-07 10:22:57.489009 daemon-err , bgpd[94558]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF eth0 in VRF 252
2024-10-07 10:22:57.489055 daemon-err , bgpd[94558]:  [YNQCS-MR20J][EC 100663301] INTERFACE_VRF_UPDATE: Cannot find IF eth0 in VRF 252
2024-10-07 10:22:57.505411 user-err , ERROR:  Dissociating VRF from service: cnm
2024-10-07 10:22:57.608563 daemon-err , nhrpd[94241]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 252
2024-10-07 10:22:57.608607 daemon-err , nhrpd[94241]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 252
2024-10-07 10:22:57.608703 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 252
2024-10-07 10:22:57.608725 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 252
2024-10-07 10:22:57.608744 daemon-err , bgpd[94558]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 252
2024-10-07 10:22:57.608762 daemon-err , bgpd[94558]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 252
2024-10-07 10:22:57.608797 daemon-err , bgpd[94558]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 252
2024-10-07 10:22:57.608818 daemon-err , bgpd[94558]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 252
2024-10-07 10:22:57.608831 daemon-err , bgpd[94558]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 252
2024-10-07 10:22:57.608844 daemon-err , bgpd[94558]:  [YNQCS-MR20J][EC 100663301] INTERFACE_VRF_UPDATE: Cannot find IF VRF0 in VRF 252
2024-10-07 10:22:57.688406 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 253
2024-10-07 10:22:57.688466 daemon-err , nhrpd[94241]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 253
2024-10-07 10:22:57.688489 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 253
2024-10-07 10:22:57.688512 daemon-err , nhrpd[94241]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 253
2024-10-07 10:22:57.688532 daemon-err , bgpd[94558]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 253
2024-10-07 10:22:57.688656 daemon-err , bgpd[94558]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 253
2024-10-07 10:22:57.688684 daemon-err , bgpd[94558]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 253
2024-10-07 10:22:57.688703 daemon-err , bgpd[94558]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 253
2024-10-07 10:22:57.688724 daemon-err , bgpd[94558]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 253
2024-10-07 10:22:57.688743 daemon-err , bgpd[94558]:  [YNQCS-MR20J][EC 100663301] INTERFACE_VRF_UPDATE: Cannot find IF VRF1 in VRF 253
2024-10-07 10:23:15.284985 daemon-err , bgpd[95303]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF eth1 in VRF 257
2024-10-07 10:23:15.285061 daemon-err , bgpd[95303]:  [YNQCS-MR20J][EC 100663301] INTERFACE_VRF_UPDATE: Cannot find IF eth1 in VRF 257
2024-10-07 10:23:15.324018 daemon-err , bgpd[95303]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF eth0 in VRF 256
2024-10-07 10:23:15.324079 daemon-err , bgpd[95303]:  [YNQCS-MR20J][EC 100663301] INTERFACE_VRF_UPDATE: Cannot find IF eth0 in VRF 256
2024-10-07 10:23:15.345667 user-err , ERROR:  Dissociating VRF from service: cnm
2024-10-07 10:23:15.414237 daemon-err , bgpd[95303]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 256
2024-10-07 10:23:15.414456 daemon-err , nhrpd[94982]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 256
2024-10-07 10:23:15.414485 daemon-err , bgpd[95303]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 256
2024-10-07 10:23:15.414505 daemon-err , nhrpd[94982]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 256
2024-10-07 10:23:15.414526 daemon-err , bgpd[95303]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 256
2024-10-07 10:23:15.414627 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 256
2024-10-07 10:23:15.414655 daemon-err , bgpd[95303]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 256
2024-10-07 10:23:15.414675 daemon-err , bgpd[95303]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 256
2024-10-07 10:23:15.414695 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF0 in VRF 256
2024-10-07 10:23:15.414716 daemon-err , bgpd[95303]:  [YNQCS-MR20J][EC 100663301] INTERFACE_VRF_UPDATE: Cannot find IF VRF0 in VRF 256
2024-10-07 10:23:15.510289 daemon-err , bgpd[95303]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 257
2024-10-07 10:23:15.510341 daemon-err , bgpd[95303]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 257
2024-10-07 10:23:15.510357 daemon-err , bgpd[95303]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 257
2024-10-07 10:23:15.510372 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 257
2024-10-07 10:23:15.510388 daemon-err , bgpd[95303]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 257
2024-10-07 10:23:15.510401 daemon-err , bgpd[95303]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 257
2024-10-07 10:23:15.510426 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 257
2024-10-07 10:23:15.510441 daemon-err , bgpd[95303]:  [YNQCS-MR20J][EC 100663301] INTERFACE_VRF_UPDATE: Cannot find IF VRF1 in VRF 257
2024-10-07 10:23:15.510457 daemon-err , nhrpd[94982]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 257
2024-10-07 10:23:15.510477 daemon-err , nhrpd[94982]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 257
2024-10-07 10:23:45.538511 daemon-err , bgpd[96454]:  [MVZKX-EG443][EC 33554452] bgp_process_packet: BGP OPEN receipt failed for peer: 20.20.0.200
2024-10-07 10:24:09.542076 daemon-err , bgpd[97272]:  [MVZKX-EG443][EC 33554452] bgp_process_packet: BGP OPEN receipt failed for peer: 10.215.200.101
2024-10-07 10:24:15.075261 daemon-err , bgpd[97272]:  [Q8NWG-NCME4][EC 33554461] parse nexthop update: instance not found for vrf_id 0
2024-10-07 10:24:15.075311 daemon-err , bgpd[97272]:  [Q8NWG-NCME4][EC 33554461] parse nexthop update: instance not found for vrf_id 0
2024-10-07 10:24:15.078796 user-err , ERROR:  Dissociating VRF from service: cnm
2024-10-07 10:24:15.162535 daemon-err , bgpd[97272]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 261
2024-10-07 10:24:15.162807 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 261
2024-10-07 10:24:15.162832 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 261
2024-10-07 10:24:15.162846 daemon-err , bgpd[97272]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 261
2024-10-07 10:24:15.162866 daemon-err , bgpd[97272]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 261
2024-10-07 10:24:15.162880 daemon-err , bgpd[97272]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 261
2024-10-07 10:24:15.162893 daemon-err , bgpd[97272]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 261
2024-10-07 10:24:15.162905 daemon-err , bgpd[97272]:  [YNQCS-MR20J][EC 100663301] INTERFACE_VRF_UPDATE: Cannot find IF VRF2 in VRF 261
2024-10-07 10:24:15.234602 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 260
2024-10-07 10:24:15.234651 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 260
2024-10-07 10:24:15.234667 daemon-err , bgpd[97272]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 260
2024-10-07 10:24:15.234682 daemon-err , bgpd[97272]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 260
2024-10-07 10:24:15.234695 daemon-err , bgpd[97272]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 260
2024-10-07 10:24:15.234712 daemon-err , bgpd[97272]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 260
2024-10-07 10:24:15.234726 daemon-err , bgpd[97272]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 260
2024-10-07 10:24:15.234746 daemon-err , bgpd[97272]:  [YNQCS-MR20J][EC 100663301] INTERFACE_VRF_UPDATE: Cannot find IF VRF1 in VRF 260
2024-10-07 10:24:30.572849 daemon-err , bgpd[97768]:  [Q8NWG-NCME4][EC 33554461] parse nexthop update: instance not found for vrf_id 0
2024-10-07 10:24:30.575246 user-err , ERROR:  Dissociating VRF from service: cnm
2024-10-07 10:24:30.654099 daemon-err , bgpd[97768]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 263
2024-10-07 10:24:30.654262 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 263
2024-10-07 10:24:30.654284 daemon-err , bgpd[97768]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 263
2024-10-07 10:24:30.654298 daemon-err , bgpd[97768]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 263
2024-10-07 10:24:30.654317 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 263
2024-10-07 10:24:30.654331 daemon-err , bgpd[97768]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 263
2024-10-07 10:24:30.654343 daemon-err , bgpd[97768]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF2 in VRF 263
2024-10-07 10:24:30.654356 daemon-err , bgpd[97768]:  [YNQCS-MR20J][EC 100663301] INTERFACE_VRF_UPDATE: Cannot find IF VRF2 in VRF 263
2024-10-07 10:24:30.762021 daemon-err , bgpd[97768]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 262
2024-10-07 10:24:30.762086 daemon-err , bgpd[97768]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 262
2024-10-07 10:24:30.762107 daemon-err , bgpd[97768]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 262
2024-10-07 10:24:30.762128 daemon-err , bgpd[97768]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 262
2024-10-07 10:24:30.762148 daemon-err , bgpd[97768]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 262
2024-10-07 10:24:30.762173 daemon-err , bgpd[97768]:  [YNQCS-MR20J][EC 100663301] INTERFACE_VRF_UPDATE: Cannot find IF VRF1 in VRF 262
2024-10-07 10:24:30.762194 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 262
2024-10-07 10:24:30.762216 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 262
2024-10-07 10:25:16.155257 daemon-err , pimd[99591]:  [VAKV3-NMY7B][EC 100663337] error processing configuration change: error [internal inconsistency] event [apply] operation [create] xpath [/frr-routing:routing/control-plane-protocols/control-plane-protocol[type='frr-pim:pimd'][name='pim'][vrf='RED']/frr-pim:pim/address-family[address-family='frr-routing:ipv4']/frr-pim-rp:rp/static-rp/rp-list[rp
-address='10.0.0.1']/group-list[.='224.0.0.0/4']] message: No Path to RP address specified: 10.0.0.1
2024-10-07 10:25:41.382606 user-err , ERROR:  Dissociating VRF from service: cnm
2024-10-07 10:25:41.446281 daemon-err , zebra[1404]:  [WVJCK-PPMGD][EC 4043309093] netlink-cmd (NS 0) error: Invalid argument, type=RTM_SETLINK(19), seq=12, pid=2456211903
2024-10-07 10:25:41.446422 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 265
2024-10-07 10:25:41.446442 daemon-err , staticd[1409]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 265
2024-10-07 10:25:41.446457 daemon-err , pimd[99591]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 265
2024-10-07 10:25:41.446471 daemon-err , pimd[99591]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 265
2024-10-07 10:25:41.446489 daemon-err , pimd[99591]:  [YNQCS-MR20J][EC 100663301] INTERFACE_VRF_UPDATE: Cannot find IF RED in VRF 265
2024-10-07 10:25:41.694052 daemon-err , zebra[1404]:  [GE156-FS0MJ][EC 100663299] stream_read_try: read failed on fd 38: Connection reset by peer
2024-10-07 10:25:50.913163 daemon-err , zebra[1404]:  [GE156-FS0MJ][EC 100663299] stream_read_try: read failed on fd 38: Connection reset by peer
2024-10-07 10:25:50.913440 daemon-err , zebra[1404]:  [GE156-FS0MJ][EC 100663299] stream_read_try: read failed on fd 41: Connection reset by peer
2024-10-07 10:26:51.846306 daemon-err , pimd[100591]:  [VAKV3-NMY7B][EC 100663337] error processing configuration change: error [internal inconsistency] event [apply] operation [create] xpath [/frr-routing:routing/control-plane-protocols/control-plane-protocol[type='frr-pim:pimd'][name='pim'][vrf='default']/frr-pim:pim/address-family[address-family='frr-routing:ipv4']/frr-pim-rp:rp/static-rp/rp-li
st[rp-address='10.0.0.1']/group-list[.='224.0.0.0/4']] message: No Path to RP address specified: 10.0.0.1
2024-10-07 10:27:25.057166 daemon-err , zebra[1404]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: No such file or directory, type=RTM_DELNEXTHOP(105), seq=6704, pid=3740348270
2024-10-07 10:27:25.057225 daemon-err , zebra[1404]:  [YA619-S7J5M][EC 4043309075] Failed to uninstall Nexthop ID (2849) from the kernel
2024-10-07 10:27:25.413346 daemon-err , zebra[1404]:  [GE156-FS0MJ][EC 100663299] stream_read_try: read failed on fd 38: Connection reset by peer
2024-10-07 10:27:31.465622 daemon-err , bgpd[101029]:  [MVZKX-EG443][EC 33554452] bgp_process_packet: BGP OPEN receipt failed for peer: 192.168.100.20
2024-10-07 10:27:35.397229 daemon-err , bgpd[101029]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum2 in VRF 0
2024-10-07 10:27:35.445935 daemon-err , bgpd[101029]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum0 in VRF 0
2024-10-07 10:27:35.507704 daemon-err , bgpd[101029]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum1 in VRF 0
2024-10-07 10:27:43.455493 daemon-err , bgpd[101460]:  [MVZKX-EG443][EC 33554452] bgp_process_packet: BGP OPEN receipt failed for peer: 192.168.100.20
2024-10-07 10:27:47.440743 daemon-err , bgpd[101460]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum2 in VRF 0
2024-10-07 10:27:47.500792 daemon-err , bgpd[101460]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum0 in VRF 0
2024-10-07 10:27:47.553487 daemon-err , bgpd[101460]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum1 in VRF 0
2024-10-07 10:27:58.746628 daemon-err , bgpd[101893]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum2 in VRF 0
2024-10-07 10:27:58.800234 daemon-err , bgpd[101893]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum0 in VRF 0
2024-10-07 10:27:58.860281 daemon-err , bgpd[101893]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF dum1 in VRF 0
2024-10-07 10:28:05.087138 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2024-10-07 10:28:08.821304 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2024-10-07 10:28:17.137223 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2024-10-07 10:28:20.826716 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2024-10-07 10:28:28.254096 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2024-10-07 10:28:31.969548 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2024-10-07 10:28:41.367275 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2024-10-07 10:28:45.142983 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2024-10-07 10:28:51.536709 local0-notice , osdx-reboot:  shutdown v4.2.1.0 2024-10-07 09:23:58 - 2024-10-07 10:28:51 (up 1 hour, 4 minutes)
2024-10-07 10:28:51.557219 local0-notice , osdx-reboot:  bootup v4.2.1.0 2024-10-07 10:28:51 (reason: Power Failure)
2024-10-07 10:28:59.035881 local0-notice , osdx-reboot:  shutdown v4.2.1.0 2024-10-07 09:23:58 - 2024-10-07 10:28:59 (up 1 hour, 5 minutes)
2024-10-07 10:28:59.056776 local0-notice , osdx-reboot:  bootup v4.2.1.0 2024-10-07 10:28:59 (reason: Power Failure)
2024-10-07 10:29:01.332948 local0-notice , osdx-reboot:  shutdown v4.2.1.0 2024-10-07 09:23:58 - 2024-10-07 10:29:01 (up 1 hour, 5 minutes)
2024-10-07 10:29:01.352957 local0-notice , osdx-reboot:  bootup v4.2.1.0 2024-10-07 10:29:01 (reason: Power Failure)
2024-10-07 10:29:08.800307 local0-notice , osdx-reboot:  shutdown v4.2.1.0 2024-10-07 09:23:58 - 2024-10-07 10:29:08 (up 1 hour, 5 minutes)
2024-10-07 10:29:08.819361 local0-notice , osdx-reboot:  bootup v4.2.1.0 2024-10-07 10:29:08 (reason: Power Failure)
2024-10-07 10:29:17.565266 local0-notice , osdx-reboot:  shutdown v4.2.1.0 2024-10-07 09:23:58 - 2024-10-07 10:29:17 (up 1 hour, 5 minutes)
2024-10-07 10:29:17.582778 local0-notice , osdx-reboot:  bootup v4.2.1.0 2024-10-07 10:29:17 (reason: Power Failure)
2024-10-07 10:29:19.814231 local0-notice , osdx-reboot:  shutdown v4.2.1.0 2024-10-07 09:23:58 - 2024-10-07 10:29:19 (up 1 hour, 5 minutes)
2024-10-07 10:29:19.837661 local0-notice , osdx-reboot:  bootup v4.2.1.0 2024-10-07 10:29:19 (reason: Power Failure)
2024-10-07 10:29:30.384482 daemon-err , modulelauncher[115640]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2024-10-07 10:29:30.384548 daemon-err , modulelauncher[115640]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2024-10-07 10:29:30.392814 daemon-err , modulelauncher[115640]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2024-10-07 10:29:30.392878 daemon-err , modulelauncher[115640]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2024-10-07 10:29:42.171174 daemon-err , modulelauncher[116037]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2024-10-07 10:29:42.171207 daemon-err , modulelauncher[116037]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2024-10-07 10:29:42.179051 daemon-err , modulelauncher[116037]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2024-10-07 10:29:42.179081 daemon-err , modulelauncher[116037]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2024-10-07 10:29:53.243664 daemon-err , modulelauncher[116434]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2024-10-07 10:29:53.243709 daemon-err , modulelauncher[116434]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2024-10-07 10:29:53.252321 daemon-err , modulelauncher[116434]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2024-10-07 10:29:53.252375 daemon-err , modulelauncher[116434]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2024-10-07 10:30:04.394321 daemon-err , modulelauncher[116838]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2024-10-07 10:30:04.394379 daemon-err , modulelauncher[116838]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2024-10-07 10:30:04.402392 daemon-err , modulelauncher[116838]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2024-10-07 10:30:04.402440 daemon-err , modulelauncher[116838]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2024-10-07 10:30:15.018104 daemon-err , modulelauncher[117202]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2024-10-07 10:30:15.018142 daemon-err , modulelauncher[117202]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2024-10-07 10:30:15.027681 daemon-err , modulelauncher[117202]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2024-10-07 10:30:15.027721 daemon-err , modulelauncher[117202]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2024-10-07 10:30:25.768279 daemon-err , modulelauncher[117555]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2024-10-07 10:30:25.768395 daemon-err , modulelauncher[117555]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2024-10-07 10:30:25.776513 daemon-err , modulelauncher[117555]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2024-10-07 10:30:25.776578 daemon-err , modulelauncher[117555]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2024-10-07 10:30:33.386389 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-10-07 10:30:33.386570 syslog-info , rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="38232" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-10-07 10:30:33.387326 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2024-10-07 10:30:33.387430 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-10-07 10:30:33.425571 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-10-07 10:30:33.428784 syslog-info , rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-10-07 10:30:33.428825 syslog-info , rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="117840" x-info="https://www.rsyslog.com"] start
2024-10-07 10:30:33.428846 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2024-10-07 10:30:33.429294 daemon-notice , cfgd[1439]:  [115108]Completed change to active configuration
2024-10-07 10:30:33.431559 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2024-10-07 10:30:33.465091 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2024-10-07 10:30:33.582081 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2024-10-07 10:30:39.549813 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-10-07 10:30:39.550317 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2024-10-07 10:30:39.550462 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-10-07 10:30:39.566840 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-10-07 10:30:39.568647 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2024-10-07 10:30:40.186831 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2024-10-07 10:30:45.759840 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-10-07 10:30:45.760616 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2024-10-07 10:30:45.760669 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-10-07 10:30:45.774771 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-10-07 10:30:45.777207 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2024-10-07 10:30:46.430568 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.136 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.136/0.136/0.136/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-10-07T10:30:52.424956+00:00 10.215.168.64  2024-10-07T10:30:51.730172+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-10-07T10:30:52.424956+00:00 10.215.168.64  2024-10-07T10:30:51.730294+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="118428" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-10-07T10:30:52.424956+00:00 10.215.168.64  2024-10-07T10:30:51.730808+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-10-07T10:30:52.424956+00:00 10.215.168.64  2024-10-07T10:30:51.730918+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-10-07T10:30:52.424956+00:00 10.215.168.64  2024-10-07T10:30:51.757711+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-10-07T10:30:52.424956+00:00 10.215.168.64  2024-10-07T10:30:51.760030+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-10-07T10:30:52.424956+00:00 10.215.168.64  2024-10-07T10:30:51.760062+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="118554" x-info="https://www.rsyslog.com"] start
2024-10-07T10:30:52.424956+00:00 10.215.168.64  2024-10-07T10:30:51.760085+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-10-07T10:30:52.424956+00:00 10.215.168.64  2024-10-07T10:30:51.760775+00:00 daemon-notice osdx cfgd[1439]:  [115108]Completed change to active configuration
2024-10-07T10:30:52.427028+00:00 10.215.168.64  2024-10-07T10:30:51.762972+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-10-07T10:30:52.442211+00:00 10.215.168.64  2024-10-07T10:30:51.778148+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-10-07T10:30:52.592333+00:00 10.215.168.64  2024-10-07T10:30:51.928256+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-10-07T10:30:52.657511+00:00 10.215.168.64  2024-10-07T10:30:51.993394+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.128 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.128/0.128/0.128/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-10-07T10:30:53.053295+00:00 10.215.168.64  2024-10-07T10:30:52.389111+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-10-07T10:30:53.238358+00:00 10.215.168.64  2024-10-07T10:30:52.574129+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-10-07T10:30:53.253967+00:00 10.215.168.64  2024-10-07T10:30:52.589800+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-10-07T10:30:54.128673+00:00 10.215.168.64  2024-10-07T10:30:53.464445+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-10-07T10:30:54.490621+00:00 10.215.168.64  2024-10-07T10:30:53.826402+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-10-07T10:30:54.547121+00:00 10.215.168.64  2024-10-07T10:30:53.882895+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-10-07T10:30:54.658402+00:00 10.215.168.64  2024-10-07T10:30:53.994202+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-10-07T10:30:54.745311+00:00 10.215.168.64  2024-10-07T10:30:54.081078+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2024-10-07T10:30:58.444306+00:00 10.215.168.64  2024-10-07T10:30:58.024061+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-10-07T10:30:58.444306+00:00 10.215.168.64  2024-10-07T10:30:58.024241+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="118647" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-10-07T10:30:58.444306+00:00 10.215.168.64  2024-10-07T10:30:58.024709+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-10-07T10:30:58.444306+00:00 10.215.168.64  2024-10-07T10:30:58.024796+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-10-07T10:30:58.444306+00:00 10.215.168.64  2024-10-07T10:30:58.037345+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-10-07T10:30:58.444306+00:00 10.215.168.64  2024-10-07T10:30:58.039563+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-10-07T10:30:58.444306+00:00 10.215.168.64  2024-10-07T10:30:58.039592+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="118801" x-info="https://www.rsyslog.com"] start
2024-10-07T10:30:58.444306+00:00 10.215.168.64  2024-10-07T10:30:58.039613+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-10-07T10:30:58.444306+00:00 10.215.168.64  2024-10-07T10:30:58.039743+00:00 daemon-notice osdx cfgd[1439]:  [115108]Completed change to active configuration
2024-10-07T10:30:58.446003+00:00 10.215.168.64  2024-10-07T10:30:58.041618+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-10-07T10:30:58.462072+00:00 10.215.168.64  2024-10-07T10:30:58.057647+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-10-07T10:30:58.681196+00:00 10.215.168.64  2024-10-07T10:30:58.276772+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1  vrf VRF0    count 1 size 56 timeout 1'.
2024-10-07T10:30:58.738129+00:00 10.215.168.64  2024-10-07T10:30:58.333686+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.135 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.135/0.135/0.135/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-10-07T10:30:59.143437+00:00 10.215.168.64  2024-10-07T10:30:58.738925+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-10-07T10:30:59.398286+00:00 10.215.168.64  2024-10-07T10:30:58.993771+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-10-07T10:30:59.412939+00:00 10.215.168.64  2024-10-07T10:30:59.008481+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-10-07T10:31:00.151294+00:00 10.215.168.64  2024-10-07T10:30:59.746732+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-10-07T10:31:00.523403+00:00 10.215.168.64  2024-10-07T10:31:00.118897+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-10-07T10:31:00.577015+00:00 10.215.168.64  2024-10-07T10:31:00.172453+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-10-07T10:31:00.689738+00:00 10.215.168.64  2024-10-07T10:31:00.285207+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-10-07T10:31:00.753973+00:00 10.215.168.64  2024-10-07T10:31:00.349441+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2024-10-07T10:31:04.244447+00:00 10.215.168.64  2024-10-07T10:31:03.688435+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-10-07T10:31:04.244447+00:00 10.215.168.64  2024-10-07T10:31:03.688575+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="118894" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-10-07T10:31:04.244447+00:00 10.215.168.64  2024-10-07T10:31:03.689075+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-10-07T10:31:04.244447+00:00 10.215.168.64  2024-10-07T10:31:03.689174+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-10-07T10:31:04.244447+00:00 10.215.168.64  2024-10-07T10:31:03.730024+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-10-07T10:31:04.244447+00:00 10.215.168.64  2024-10-07T10:31:03.731824+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-10-07T10:31:04.244447+00:00 10.215.168.64  2024-10-07T10:31:03.731879+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-10-07T10:31:04.244447+00:00 10.215.168.64  2024-10-07T10:31:03.731916+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="119055" x-info="https://www.rsyslog.com"] start
2024-10-07T10:31:04.244723+00:00 10.215.168.64  2024-10-07T10:31:03.732764+00:00 daemon-notice osdx cfgd[1439]:  [115108]Completed change to active configuration
2024-10-07T10:31:04.247575+00:00 10.215.168.64  2024-10-07T10:31:03.735609+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-10-07T10:31:04.284750+00:00 10.215.168.64  2024-10-07T10:31:03.772695+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-10-07T10:31:04.416321+00:00 10.215.168.64  2024-10-07T10:31:03.904347+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-10-07T10:31:04.470775+00:00 10.215.168.64  2024-10-07T10:31:03.958734+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.195 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.195/0.195/0.195/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-10-07T10:31:09.747582+00:00 33.33.33.33  2024-10-07T10:31:08.792877+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-10-07T10:31:09.747582+00:00 33.33.33.33  2024-10-07T10:31:08.793036+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="119148" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-10-07T10:31:09.747582+00:00 33.33.33.33  2024-10-07T10:31:08.793648+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-10-07T10:31:09.747582+00:00 33.33.33.33  2024-10-07T10:31:08.793738+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-10-07T10:31:09.747582+00:00 33.33.33.33  2024-10-07T10:31:08.813653+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-10-07T10:31:09.747582+00:00 33.33.33.33  2024-10-07T10:31:08.817125+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-10-07T10:31:09.747582+00:00 33.33.33.33  2024-10-07T10:31:08.817177+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="119285" x-info="https://www.rsyslog.com"] start
2024-10-07T10:31:09.747582+00:00 33.33.33.33  2024-10-07T10:31:08.817211+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-10-07T10:31:09.747582+00:00 33.33.33.33  2024-10-07T10:31:08.818616+00:00 daemon-notice osdx cfgd[1439]:  [115108]Completed change to active configuration
2024-10-07T10:31:09.751112+00:00 33.33.33.33  2024-10-07T10:31:08.822334+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-10-07T10:31:09.770837+00:00 33.33.33.33  2024-10-07T10:31:08.842051+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-10-07T10:31:09.917495+00:00 33.33.33.33  2024-10-07T10:31:08.988729+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-10-07T10:31:09.975804+00:00 33.33.33.33  2024-10-07T10:31:09.046956+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.133 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.133/0.133/0.133/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-10-07T10:31:10.355545+00:00 33.33.33.33  2024-10-07T10:31:09.426685+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-10-07T10:31:10.527176+00:00 33.33.33.33  2024-10-07T10:31:09.598385+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-10-07T10:31:10.541184+00:00 33.33.33.33  2024-10-07T10:31:09.612343+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-10-07T10:31:11.403016+00:00 33.33.33.33  2024-10-07T10:31:10.474064+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-10-07T10:31:11.733039+00:00 33.33.33.33  2024-10-07T10:31:10.804138+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-10-07T10:31:11.791337+00:00 33.33.33.33  2024-10-07T10:31:10.862501+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-10-07T10:31:11.900600+00:00 33.33.33.33  2024-10-07T10:31:10.971733+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-10-07T10:31:11.966689+00:00 33.33.33.33  2024-10-07T10:31:11.037770+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2024-10-07T10:31:15.877546+00:00 33.33.33.33  2024-10-07T10:31:15.149265+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-10-07T10:31:15.877546+00:00 33.33.33.33  2024-10-07T10:31:15.149378+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="119378" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-10-07T10:31:15.877546+00:00 33.33.33.33  2024-10-07T10:31:15.149898+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-10-07T10:31:15.877601+00:00 33.33.33.33  2024-10-07T10:31:15.149994+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-10-07T10:31:15.877601+00:00 33.33.33.33  2024-10-07T10:31:15.173349+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-10-07T10:31:15.877601+00:00 33.33.33.33  2024-10-07T10:31:15.175689+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-10-07T10:31:15.877609+00:00 33.33.33.33  2024-10-07T10:31:15.175741+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-10-07T10:31:15.877609+00:00 33.33.33.33  2024-10-07T10:31:15.175781+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="119548" x-info="https://www.rsyslog.com"] start
2024-10-07T10:31:15.877609+00:00 33.33.33.33  2024-10-07T10:31:15.176287+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2024-10-07T10:31:15.877614+00:00 33.33.33.33  2024-10-07T10:31:15.176523+00:00 daemon-notice osdx cfgd[1439]:  [115108]Completed change to active configuration
2024-10-07T10:31:15.879809+00:00 33.33.33.33  2024-10-07T10:31:15.178659+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-10-07T10:31:15.905385+00:00 33.33.33.33  2024-10-07T10:31:15.204189+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-10-07T10:31:16.164654+00:00 33.33.33.33  2024-10-07T10:31:15.463469+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1  vrf VRF0    count 1 size 56 timeout 1'.
2024-10-07T10:31:16.223914+00:00 33.33.33.33  2024-10-07T10:31:15.522678+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.187 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.187/0.187/0.187/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-10-07T10:31:22.246973+00:00 10.215.168.64  2024-10-07T10:31:21.928755+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-10-07T10:31:22.247004+00:00 10.215.168.64  2024-10-07T10:31:21.928869+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="119642" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-10-07T10:31:22.247004+00:00 10.215.168.64  2024-10-07T10:31:21.929363+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-10-07T10:31:22.247004+00:00 10.215.168.64  2024-10-07T10:31:21.929453+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-10-07T10:31:22.247004+00:00 10.215.168.64  2024-10-07T10:31:21.977273+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-10-07T10:31:22.247004+00:00 10.215.168.64  2024-10-07T10:31:21.985397+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-10-07T10:31:22.247004+00:00 10.215.168.64  2024-10-07T10:31:21.985429+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="119806" x-info="https://www.rsyslog.com"] start
2024-10-07T10:31:22.247004+00:00 10.215.168.64  2024-10-07T10:31:21.985449+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-10-07T10:31:22.247004+00:00 10.215.168.64  2024-10-07T10:31:21.985797+00:00 daemon-notice osdx cfgd[1439]:  [115108]Completed change to active configuration
2024-10-07T10:31:22.247004+00:00 10.215.168.64  2024-10-07T10:31:21.987986+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-10-07T10:31:22.247004+00:00 10.215.168.64  2024-10-07T10:31:22.003450+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-10-07T10:31:22.247004+00:00 10.215.168.64  2024-10-07T10:31:22.138074+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-10-07T10:31:22.247004+00:00 10.215.168.64  2024-10-07T10:31:22.165266+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2024-10-07T10:31:22.247004+00:00 10.215.168.64  2024-10-07T10:31:22.165321+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2024-10-07T10:31:23.485132+00:00 10.215.168.64  2024-10-07T10:31:23.411523+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.208 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.208/0.208/0.208/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-10-07T10:31:29.638891+00:00 33.33.33.33  2024-10-07T10:31:29.010881+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-10-07T10:31:29.638891+00:00 33.33.33.33  2024-10-07T10:31:29.010984+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="119908" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-10-07T10:31:29.638891+00:00 33.33.33.33  2024-10-07T10:31:29.011331+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-10-07T10:31:29.638891+00:00 33.33.33.33  2024-10-07T10:31:29.011426+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-10-07T10:31:29.638891+00:00 33.33.33.33  2024-10-07T10:31:29.036162+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-10-07T10:31:29.679511+00:00 33.33.33.33  2024-10-07T10:31:29.039020+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-10-07T10:31:29.679511+00:00 33.33.33.33  2024-10-07T10:31:29.039066+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="120049" x-info="https://www.rsyslog.com"] start
2024-10-07T10:31:29.679511+00:00 33.33.33.33  2024-10-07T10:31:29.039098+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-10-07T10:31:29.679511+00:00 33.33.33.33  2024-10-07T10:31:29.040117+00:00 daemon-notice osdx cfgd[1439]:  [115108]Completed change to active configuration
2024-10-07T10:31:29.679511+00:00 33.33.33.33  2024-10-07T10:31:29.043887+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-10-07T10:31:29.679511+00:00 33.33.33.33  2024-10-07T10:31:29.066295+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-10-07T10:31:29.679511+00:00 33.33.33.33  2024-10-07T10:31:29.204942+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-10-07T10:31:29.679511+00:00 33.33.33.33  2024-10-07T10:31:29.247949+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2024-10-07T10:31:29.679511+00:00 33.33.33.33  2024-10-07T10:31:29.248016+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2024-10-07T10:31:30.868991+00:00 33.33.33.33  2024-10-07T10:31:30.486274+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.