Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2025-02-03 14:45:04.488893 daemon-err , ntpd[411337]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:45:05.322364 daemon-err , ntpd[411374]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-02-03 14:45:05.322574 daemon-err , ntpd[411374]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:45:06.168894 daemon-err , ntpd[411411]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-02-03 14:45:06.169175 daemon-err , ntpd[411411]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:45:06.941593 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=] finished with status 1
2025-02-03 14:45:06.941672 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:45:06.941717 daemon-err , cfgd[1636]:  \"U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=\" strong-password: score is too weak
2025-02-03 14:45:06.941759 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:45:06.943817 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=\" strong-password: score is too weak Commit validation failed
2025-02-03 14:45:07.706677 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=] finished with status 1
2025-02-03 14:45:07.706831 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:45:07.706907 daemon-err , cfgd[1636]:  \"U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=\" strong-password: score is too weak
2025-02-03 14:45:07.706982 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:45:07.709583 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=\" strong-password: score is too weak Commit validation failed
2025-02-03 14:45:08.638511 daemon-err , ntpd[411502]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-02-03 14:45:08.638608 daemon-err , ntpd[411502]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:45:09.452066 daemon-err , ntpd[411539]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-02-03 14:45:09.452298 daemon-err , ntpd[411539]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:45:10.272073 daemon-err , ntpd[411576]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-02-03 14:45:10.272111 daemon-err , ntpd[411576]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:45:10.943496 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=] finished with status 1
2025-02-03 14:45:10.943585 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:45:10.943624 daemon-err , cfgd[1636]:  \"U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=\" strong-password: score is too weak
2025-02-03 14:45:10.943657 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:45:10.945956 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=\" strong-password: score is too weak Commit validation failed
2025-02-03 14:45:11.675987 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=] finished with status 1
2025-02-03 14:45:11.676156 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:45:11.676238 daemon-err , cfgd[1636]:  \"U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=\" strong-password: score is too weak
2025-02-03 14:45:11.676313 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:45:11.678459 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=\" strong-password: score is too weak Commit validation failed
2025-02-03 14:45:12.413168 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbVbAv5HNxHNTgy9TMLwxWJI=] finished with status 1
2025-02-03 14:45:12.413361 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:45:12.413463 daemon-err , cfgd[1636]:  \"U2FsdGVkX1/5IXIUwAFKbVbAv5HNxHNTgy9TMLwxWJI=\" strong-password: score is too weak
2025-02-03 14:45:12.413553 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:45:12.416384 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbVbAv5HNxHNTgy9TMLwxWJI=\" strong-password: score is too weak Commit validation failed
2025-02-03 14:45:13.318295 daemon-err , ntpd[411692]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-02-03 14:45:13.318332 daemon-err , ntpd[411692]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:45:14.140372 daemon-err , ntpd[411729]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-02-03 14:45:14.140640 daemon-err , ntpd[411729]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:45:14.859076 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=] finished with status 1
2025-02-03 14:45:14.859147 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:45:14.859186 daemon-err , cfgd[1636]:  \"U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=\" strong-password: score is too weak
2025-02-03 14:45:14.859218 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:45:14.861405 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=\" strong-password: score is too weak Commit validation failed
2025-02-03 14:45:15.582733 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=] finished with status 1
2025-02-03 14:45:15.582799 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:45:15.582835 daemon-err , cfgd[1636]:  \"U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=\" strong-password: score is too weak
2025-02-03 14:45:15.582860 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:45:15.585077 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=\" strong-password: score is too weak Commit validation failed
2025-02-03 14:45:16.340051 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbVbAv5HNxHNTgy9TMLwxWJI=] finished with status 1
2025-02-03 14:45:16.340131 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:45:16.340179 daemon-err , cfgd[1636]:  \"U2FsdGVkX1/5IXIUwAFKbVbAv5HNxHNTgy9TMLwxWJI=\" strong-password: score is too weak
2025-02-03 14:45:16.340226 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:45:16.342164 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbVbAv5HNxHNTgy9TMLwxWJI=\" strong-password: score is too weak Commit validation failed
2025-02-03 14:45:17.100967 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbfHlP3OsdtsfxQ3tACRsdlA=] finished with status 1
2025-02-03 14:45:17.101184 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:45:17.101274 daemon-err , cfgd[1636]:  \"U2FsdGVkX1/5IXIUwAFKbfHlP3OsdtsfxQ3tACRsdlA=\" strong-password: score is too weak
2025-02-03 14:45:17.101394 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:45:17.103830 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbfHlP3OsdtsfxQ3tACRsdlA=\" strong-password: score is too weak Commit validation failed
2025-02-03 14:45:25.370410 daemon-err , ntpd[411993]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-02-03 14:45:25.370644 daemon-err , ntpd[411993]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:45:35.110602 daemon-err , ntpd[412188]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-02-03 14:45:35.110638 daemon-err , ntpd[412188]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:45:43.927058 daemon-err , cfgd[1636]:  [400402]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-02-03 14:45:44.496405 daemon-err , cfgd[1636]:  [400402]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-02-03 14:45:46.232010 daemon-err , ntpd[412434]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-02-03 14:45:46.232039 daemon-err , ntpd[412434]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:45:47.054143 daemon-err , ntpd[412471]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-02-03 14:45:47.054226 daemon-err , ntpd[412471]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:45:48.004899 daemon-err , ntpd[412508]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-02-03 14:45:48.004934 daemon-err , ntpd[412508]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:45:58.245496 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX199caChanZJOpRDJQ5w9Ja+X86oOAIYD9E=] finished with status 1
2025-02-03 14:45:58.245577 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:45:58.245619 daemon-err , cfgd[1636]:  \"U2FsdGVkX199caChanZJOpRDJQ5w9Ja+X86oOAIYD9E=\" strong-password: score is too weak
2025-02-03 14:45:58.245652 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:45:58.247432 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX199caChanZJOpRDJQ5w9Ja+X86oOAIYD9E=\" strong-password: score is too weak Commit validation failed
2025-02-03 14:45:59.018464 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX183ZCBBEBBvbL6+lul6/q6YdBdbG1xQCpA=] finished with status 1
2025-02-03 14:45:59.018560 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:45:59.018604 daemon-err , cfgd[1636]:  \"U2FsdGVkX183ZCBBEBBvbL6+lul6/q6YdBdbG1xQCpA=\" strong-password: score is too weak
2025-02-03 14:45:59.018642 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:45:59.021085 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX183ZCBBEBBvbL6+lul6/q6YdBdbG1xQCpA=\" strong-password: score is too weak Commit validation failed
2025-02-03 14:45:59.853076 daemon-err , ntpd[412889]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-02-03 14:45:59.853306 daemon-err , ntpd[412889]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:46:08.441643 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19IPJQVAFoT9O1ohZUUnUp3kvMxr1JfQnI=] finished with status 2
2025-02-03 14:46:08.441726 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:46:08.441776 daemon-err , cfgd[1636]:  \"U2FsdGVkX19IPJQVAFoT9O1ohZUUnUp3kvMxr1JfQnI=\" strong-password: not long enough
2025-02-03 14:46:08.441818 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:46:08.443565 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX19IPJQVAFoT9O1ohZUUnUp3kvMxr1JfQnI=\" strong-password: not long enough Commit validation failed
2025-02-03 14:46:09.414566 daemon-err , ntpd[413073]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-02-03 14:46:09.414615 daemon-err , ntpd[413073]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:46:16.122985 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/ynpuEmUWlkyyuTQCZbDyEGut5F+6Me9k=] finished with status 3
2025-02-03 14:46:16.123188 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:46:16.123318 daemon-err , cfgd[1636]:  \"U2FsdGVkX1/ynpuEmUWlkyyuTQCZbDyEGut5F+6Me9k=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2025-02-03 14:46:16.123419 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:46:16.125938 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/ynpuEmUWlkyyuTQCZbDyEGut5F+6Me9k=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed
2025-02-03 14:46:16.885007 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19YDpkXAW1JGoBCbgNeH1hGCJSAQMEtJEM=] finished with status 3
2025-02-03 14:46:16.885240 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:46:16.885347 daemon-err , cfgd[1636]:  \"U2FsdGVkX19YDpkXAW1JGoBCbgNeH1hGCJSAQMEtJEM=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2025-02-03 14:46:16.885435 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:46:16.887977 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX19YDpkXAW1JGoBCbgNeH1hGCJSAQMEtJEM=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed
2025-02-03 14:46:17.670404 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+J/PzRuS9WCsc/N9UWGnPD/LaZit/x1Qs=] finished with status 3
2025-02-03 14:46:17.670558 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:46:17.670634 daemon-err , cfgd[1636]:  \"U2FsdGVkX1+J/PzRuS9WCsc/N9UWGnPD/LaZit/x1Qs=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2025-02-03 14:46:17.670701 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:46:17.672907 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+J/PzRuS9WCsc/N9UWGnPD/LaZit/x1Qs=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed
2025-02-03 14:46:18.385234 daemon-err , cfgd[1636]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/0nGz1wUCASGIEqY8xuN1bIaJMxwXDvUw=] finished with status 1
2025-02-03 14:46:18.385285 daemon-err , cfgd[1636]:  [ system ntp authentication-key 1 encrypted-key ]
2025-02-03 14:46:18.385335 daemon-err , cfgd[1636]:  \"U2FsdGVkX1/0nGz1wUCASGIEqY8xuN1bIaJMxwXDvUw=\" strong-password: score is too weak
2025-02-03 14:46:18.385375 daemon-err , cfgd[1636]:  Commit validation failed
2025-02-03 14:46:18.387668 daemon-err , cfgd[1636]:  [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/0nGz1wUCASGIEqY8xuN1bIaJMxwXDvUw=\" strong-password: score is too weak Commit validation failed
2025-02-03 14:46:19.345881 daemon-err , ntpd[413307]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-02-03 14:46:19.346104 daemon-err , ntpd[413307]:  AUTH: authreadkeys: added 1 keys
2025-02-03 14:46:19.870481 daemon-err , cfgd[1636]:  [400402]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-02-03 14:46:20.387843 daemon-err , cfgd[1636]:  [400402]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-02-03 14:46:20.968566 daemon-err , cfgd[1636]:  [400402]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-02-03 14:46:21.497118 daemon-err , cfgd[1636]:  [400402]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-02-03 14:47:24.706877 daemon-err , modulelauncher[425364]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-02-03 14:47:24.707032 daemon-err , modulelauncher[425364]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-02-03 14:47:24.724638 daemon-err , modulelauncher[425364]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-02-03 14:47:24.724798 daemon-err , modulelauncher[425364]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-02-03 14:47:39.712411 daemon-err , modulelauncher[425737]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-02-03 14:47:39.712564 daemon-err , modulelauncher[425737]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-02-03 14:47:39.725940 daemon-err , modulelauncher[425737]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-02-03 14:47:39.726086 daemon-err , modulelauncher[425737]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-02-03 14:47:55.167412 daemon-err , modulelauncher[426160]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-02-03 14:47:55.167523 daemon-err , modulelauncher[426160]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-02-03 14:47:55.180934 daemon-err , modulelauncher[426160]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-02-03 14:47:55.181011 daemon-err , modulelauncher[426160]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-02-03 14:48:11.428980 daemon-err , modulelauncher[426586]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-02-03 14:48:11.429185 daemon-err , modulelauncher[426586]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-02-03 14:48:11.445848 daemon-err , modulelauncher[426586]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-02-03 14:48:11.445972 daemon-err , modulelauncher[426586]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-02-03 14:48:28.787137 daemon-err , modulelauncher[427009]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-02-03 14:48:28.787214 daemon-err , modulelauncher[427009]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-02-03 14:48:28.799620 daemon-err , modulelauncher[427009]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-02-03 14:48:28.799690 daemon-err , modulelauncher[427009]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-02-03 14:48:43.756314 daemon-err , modulelauncher[427434]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-02-03 14:48:43.756457 daemon-err , modulelauncher[427434]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-02-03 14:48:43.770264 daemon-err , modulelauncher[427434]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-02-03 14:48:43.770465 daemon-err , modulelauncher[427434]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-02-03 14:49:37.784977 kern-err , kernel: [    9.081640] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2
2025-02-03 14:49:37.784977 kern-err , kernel: [    9.083169] Buffer I/O error on dev sdb1, logical block 0, lost sync page write
2025-02-03 14:49:37.784980 kern-err , kernel: [    9.169789] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2
2025-02-03 14:49:37.785027 kern-err , kernel: [    9.171316] Buffer I/O error on dev sdb1, logical block 0, lost sync page write
2025-02-03 14:49:37.785063 kern-err , kernel: [   11.836412] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2
2025-02-03 14:49:37.785063 kern-err , kernel: [   11.836416] Buffer I/O error on dev sdb1, logical block 0, lost sync page write
2025-02-03 14:49:42.044278 local0-notice , osdx-reboot:  bootup v4.2.1.3 2025-02-03 14:49:42 (reason: Panic)
2025-02-03 14:49:51.091213 user-crit , systemd-coredump[2204]:  Process 2141 (cnm-client) of user 0 dumped core.  Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64 Stack trace of thread 2141: #0  0x00007efedb9729dc pselect (libc.so.6 + 0xfe9dc) #1  0x00005594d68d92ff n/a (cnm-client + 0x532ff) #2  0x00005594d68db0f5 n/a (cnm-client + 0x550f5) #3  0x00005594d68b176b n/a (cnm-client + 0
x2b76b) #4  0x00007efedb89b24a n/a (libc.so.6 + 0x2724a) #5  0x00007efedb89b305 __libc_start_main (libc.so.6 + 0x27305) #6  0x00005594d68b8d81 n/a (cnm-client + 0x32d81) ELF object binary architecture: AMD x86-64
2025-02-03 14:50:05.595680 user-crit , systemd-coredump[2614]:  Process 2549 (cnm-client) of user 0 dumped core.  Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64 Stack trace of thread 2549: #0  0x00007f89df3339dc pselect (libc.so.6 + 0xfe9dc) #1  0x00005629e72b42ff n/a (cnm-client + 0x532ff) #2  0x00005629e72b60f5 n/a (cnm-client + 0x550f5) #3  0x00005629e728c76b n/a (cnm-client + 0
x2b76b) #4  0x00007f89df25c24a n/a (libc.so.6 + 0x2724a) #5  0x00007f89df25c305 __libc_start_main (libc.so.6 + 0x27305) #6  0x00005629e7293d81 n/a (cnm-client + 0x32d81) ELF object binary architecture: AMD x86-64
2025-02-03 14:50:11.095098 user-crit , systemd-coredump[2750]:  Process 2696 (cnm-client) of user 0 dumped core.  Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64 Stack trace of thread 2696: #0  0x00007fa2c2cc19dc pselect (libc.so.6 + 0xfe9dc) #1  0x0000563164fa92ff n/a (cnm-client + 0x532ff) #2  0x0000563164fab0f5 n/a (cnm-client + 0x550f5) #3  0x0000563164f8176b n/a (cnm-client + 0
x2b76b) #4  0x00007fa2c2bea24a n/a (libc.so.6 + 0x2724a) #5  0x00007fa2c2bea305 __libc_start_main (libc.so.6 + 0x27305) #6  0x0000563164f88d81 n/a (cnm-client + 0x32d81) ELF object binary architecture: AMD x86-64
2025-02-03 14:50:16.600670 user-crit , systemd-coredump[2888]:  Process 2832 (cnm-client) of user 0 dumped core.  Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64 Stack trace of thread 2832: #0  0x00007fcb74ffd9dc pselect (libc.so.6 + 0xfe9dc) #1  0x000055cf51cb32ff n/a (cnm-client + 0x532ff) #2  0x000055cf51cb50f5 n/a (cnm-client + 0x550f5) #3  0x000055cf51c8b76b n/a (cnm-client + 0
x2b76b) #4  0x00007fcb74f2624a n/a (libc.so.6 + 0x2724a) #5  0x00007fcb74f26305 __libc_start_main (libc.so.6 + 0x27305) #6  0x000055cf51c92d81 n/a (cnm-client + 0x32d81) ELF object binary architecture: AMD x86-64
2025-02-03 14:51:16.893665 kern-err , kernel: [    9.354597] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2
2025-02-03 14:51:16.893666 kern-err , kernel: [    9.355993] Buffer I/O error on dev sdb1, logical block 0, lost sync page write
2025-02-03 14:51:16.893676 kern-err , kernel: [    9.442434] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2
2025-02-03 14:51:16.893739 kern-err , kernel: [    9.443802] Buffer I/O error on dev sdb1, logical block 0, lost sync page write
2025-02-03 14:51:16.893813 kern-err , kernel: [   12.061475] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2
2025-02-03 14:51:16.893813 kern-err , kernel: [   12.061479] Buffer I/O error on dev sdb1, logical block 0, lost sync page write
2025-02-03 14:51:20.660215 local0-notice , osdx-reboot:  bootup v4.2.1.3 2025-02-03 14:51:20 (reason: Panic)
2025-02-03 14:51:29.001895 user-crit , systemd-coredump[2068]:  Process 2003 (cnm-client) of user 0 dumped core.  Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64 Stack trace of thread 2003: #0  0x00007f5fc431d9dc pselect (libc.so.6 + 0xfe9dc) #1  0x000055d09b1c62ff n/a (cnm-client + 0x532ff) #2  0x000055d09b1c80f5 n/a (cnm-client + 0x550f5) #3  0x000055d09b19e76b n/a (cnm-client + 0
x2b76b) #4  0x00007f5fc424624a n/a (libc.so.6 + 0x2724a) #5  0x00007f5fc4246305 __libc_start_main (libc.so.6 + 0x27305) #6  0x000055d09b1a5d81 n/a (cnm-client + 0x32d81) ELF object binary architecture: AMD x86-64
2025-02-03 14:51:34.654775 user-crit , systemd-coredump[2204]:  Process 2148 (cnm-client) of user 0 dumped core.  Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64 Stack trace of thread 2148: #0  0x00007f29d529f9dc pselect (libc.so.6 + 0xfe9dc) #1  0x0000560bd4d2e2ff n/a (cnm-client + 0x532ff) #2  0x0000560bd4d300f5 n/a (cnm-client + 0x550f5) #3  0x0000560bd4d0676b n/a (cnm-client + 0
x2b76b) #4  0x00007f29d51c824a n/a (libc.so.6 + 0x2724a) #5  0x00007f29d51c8305 __libc_start_main (libc.so.6 + 0x27305) #6  0x0000560bd4d0dd81 n/a (cnm-client + 0x32d81) ELF object binary architecture: AMD x86-64
2025-02-03 14:52:38.587169 kern-err , kernel: [    9.089101] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2
2025-02-03 14:52:38.587170 kern-err , kernel: [    9.090233] Buffer I/O error on dev sdb1, logical block 0, lost sync page write
2025-02-03 14:52:38.587176 kern-err , kernel: [    9.177949] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2
2025-02-03 14:52:38.587239 kern-err , kernel: [    9.179035] Buffer I/O error on dev sdb1, logical block 0, lost sync page write
2025-02-03 14:52:38.587300 kern-err , kernel: [   11.829251] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2
2025-02-03 14:52:38.587300 kern-err , kernel: [   11.829255] Buffer I/O error on dev sdb1, logical block 0, lost sync page write
2025-02-03 14:52:41.967289 local0-notice , osdx-reboot:  bootup v4.2.1.3 2025-02-03 14:52:41 (reason: Panic)
2025-02-03 14:53:03.477708 user-crit , systemd-coredump[2373]:  Process 2307 (cnm-client) of user 0 dumped core.  Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64 Stack trace of thread 2307: #0  0x00007fd9453ca9dc pselect (libc.so.6 + 0xfe9dc) #1  0x00005558759242ff n/a (cnm-client + 0x532ff) #2  0x00005558759260f5 n/a (cnm-client + 0x550f5) #3  0x00005558758fc76b n/a (cnm-client + 0
x2b76b) #4  0x00007fd9452f324a n/a (libc.so.6 + 0x2724a) #5  0x00007fd9452f3305 __libc_start_main (libc.so.6 + 0x27305) #6  0x0000555875903d81 n/a (cnm-client + 0x32d81) ELF object binary architecture: AMD x86-64
2025-02-03 14:53:54.802865 kern-err , kernel: [    9.224284] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2
2025-02-03 14:53:54.802866 kern-err , kernel: [    9.225380] Buffer I/O error on dev sdb1, logical block 0, lost sync page write
2025-02-03 14:53:54.802868 kern-err , kernel: [    9.312427] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2
2025-02-03 14:53:54.802921 kern-err , kernel: [    9.313594] Buffer I/O error on dev sdb1, logical block 0, lost sync page write
2025-02-03 14:53:54.802980 kern-err , kernel: [   12.116450] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2
2025-02-03 14:53:54.802981 kern-err , kernel: [   12.116453] Buffer I/O error on dev sdb1, logical block 0, lost sync page write
2025-02-03 14:53:59.086550 local0-notice , osdx-reboot:  bootup v4.2.1.3 2025-02-03 14:53:59 (reason: Panic)
2025-02-03 14:55:04.665604 kern-err , kernel: [    9.206055] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2
2025-02-03 14:55:04.665606 kern-err , kernel: [    9.207189] Buffer I/O error on dev sdb1, logical block 0, lost sync page write
2025-02-03 14:55:04.665608 kern-err , kernel: [    9.295229] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2
2025-02-03 14:55:04.665673 kern-err , kernel: [    9.296763] Buffer I/O error on dev sdb1, logical block 0, lost sync page write
2025-02-03 14:55:04.665711 kern-err , kernel: [   12.249940] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2
2025-02-03 14:55:04.665711 kern-err , kernel: [   12.249943] Buffer I/O error on dev sdb1, logical block 0, lost sync page write
2025-02-03 14:55:08.234994 local0-notice , osdx-reboot:  bootup v4.2.1.3 2025-02-03 14:55:08 (reason: Panic)
2025-02-03 14:55:13.977915 user-err , file_operation.py:  osdx.utils.xos cmd error: cp /opt/vyatta/etc/config/coredump/202502031455_kernel_panic.tar.gz /tmp/volatile/202502031455_kernel_panic.tar.gz 2>/dev/null
2025-02-03 14:55:13.977970 user-err , file_operation.py:  Command 'cp /opt/vyatta/etc/config/coredump/202502031455_kernel_panic.tar.gz /tmp/volatile/202502031455_kernel_panic.tar.gz 2>/dev/null' returned non-zero exit status 1.
2025-02-03 14:55:16.042272 user-err , file_operation.py:  osdx.utils.xos cmd error: cp /opt/vyatta/etc/config/coredump/dmesg.202502031454 /tmp/volatile/dmesg.202502031454 2>/dev/null
2025-02-03 14:55:16.042320 user-err , file_operation.py:  Command 'cp /opt/vyatta/etc/config/coredump/dmesg.202502031454 /tmp/volatile/dmesg.202502031454 2>/dev/null' returned non-zero exit status 1.
2025-02-03 14:55:30.834049 daemon-err , cfgd[1642]:  [1931]Command output: File name reserved Value validation failed
2025-02-03 14:55:39.039702 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-02-03 14:55:39.039983 syslog-info , rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="1861" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-02-03 14:55:39.040782 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2025-02-03 14:55:39.040926 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-02-03 14:55:39.062053 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-02-03 14:55:39.064405 syslog-info , rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-02-03 14:55:39.064446 syslog-info , rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="2600" x-info="https://www.rsyslog.com"] start
2025-02-03 14:55:39.064479 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2025-02-03 14:55:39.065393 daemon-notice , cfgd[1642]:  [1931]Completed change to active configuration
2025-02-03 14:55:39.067897 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-02-03 14:55:39.096646 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2025-02-03 14:55:39.250715 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2025-02-03 14:55:48.334785 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-02-03 14:55:48.336197 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2025-02-03 14:55:48.336369 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-02-03 14:55:48.361463 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-02-03 14:55:48.364615 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2025-02-03 14:55:49.362033 daemon-info , systemd[1]:  Created slice system-dhcpd.slice - Slice /system/dhcpd.
2025-02-03 14:55:49.377371 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2025-02-03 14:55:58.598060 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-02-03 14:55:58.598692 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2025-02-03 14:55:58.598880 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-02-03 14:55:58.628887 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-02-03 14:55:58.631635 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2025-02-03 14:55:59.696285 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.172 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.172/0.172/0.172/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-03T14:56:08.581309+00:00 10.215.168.64  2025-02-03T14:56:07.671652+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-02-03T14:56:08.581309+00:00 10.215.168.64  2025-02-03T14:56:07.671866+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="3240" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-02-03T14:56:08.581309+00:00 10.215.168.64  2025-02-03T14:56:07.678631+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2025-02-03T14:56:08.581309+00:00 10.215.168.64  2025-02-03T14:56:07.678807+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-02-03T14:56:08.581322+00:00 10.215.168.64  2025-02-03T14:56:07.695830+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-02-03T14:56:08.581355+00:00 10.215.168.64  2025-02-03T14:56:07.698614+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-02-03T14:56:08.581849+00:00 10.215.168.64  2025-02-03T14:56:07.698695+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="3379" x-info="https://www.rsyslog.com"] start
2025-02-03T14:56:08.581849+00:00 10.215.168.64  2025-02-03T14:56:07.698747+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2025-02-03T14:56:08.582771+00:00 10.215.168.64  2025-02-03T14:56:07.700020+00:00 daemon-notice osdx cfgd[1642]:  [1931]Completed change to active configuration
2025-02-03T14:56:08.626000+00:00 10.215.168.64  2025-02-03T14:56:07.743173+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-03T14:56:08.682710+00:00 10.215.168.64  2025-02-03T14:56:07.799896+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-03T14:56:08.873017+00:00 10.215.168.64  2025-02-03T14:56:07.990192+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-02-03T14:56:08.970009+00:00 10.215.168.64  2025-02-03T14:56:08.087172+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.168 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.168/0.168/0.168/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-03T14:56:09.493772+00:00 10.215.168.64  2025-02-03T14:56:08.610917+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-02-03T14:56:09.815625+00:00 10.215.168.64  2025-02-03T14:56:08.932799+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-02-03T14:56:09.850075+00:00 10.215.168.64  2025-02-03T14:56:08.967207+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-02-03T14:56:11.145001+00:00 10.215.168.64  2025-02-03T14:56:10.262093+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2025-02-03T14:56:11.693876+00:00 10.215.168.64  2025-02-03T14:56:10.810989+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-02-03T14:56:11.820308+00:00 10.215.168.64  2025-02-03T14:56:10.937410+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-02-03T14:56:11.944696+00:00 10.215.168.64  2025-02-03T14:56:11.061827+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-02-03T14:56:12.086508+00:00 10.215.168.64  2025-02-03T14:56:11.201018+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-02-03T14:56:17.842271+00:00 10.215.168.64  2025-02-03T14:56:17.081347+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-02-03T14:56:17.842271+00:00 10.215.168.64  2025-02-03T14:56:17.081509+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="3484" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-02-03T14:56:17.842271+00:00 10.215.168.64  2025-02-03T14:56:17.082114+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2025-02-03T14:56:17.842289+00:00 10.215.168.64  2025-02-03T14:56:17.082275+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-02-03T14:56:17.842311+00:00 10.215.168.64  2025-02-03T14:56:17.115682+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-02-03T14:56:17.843293+00:00 10.215.168.64  2025-02-03T14:56:17.118719+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-02-03T14:56:17.843293+00:00 10.215.168.64  2025-02-03T14:56:17.118781+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="3674" x-info="https://www.rsyslog.com"] start
2025-02-03T14:56:17.843306+00:00 10.215.168.64  2025-02-03T14:56:17.118828+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2025-02-03T14:56:17.843319+00:00 10.215.168.64  2025-02-03T14:56:17.120159+00:00 daemon-notice osdx cfgd[1642]:  [1931]Completed change to active configuration
2025-02-03T14:56:17.896425+00:00 10.215.168.64  2025-02-03T14:56:17.173265+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-03T14:56:17.924243+00:00 10.215.168.64  2025-02-03T14:56:17.201301+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-03T14:56:18.127553+00:00 10.215.168.64  2025-02-03T14:56:17.404540+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-02-03T14:56:18.213148+00:00 10.215.168.64  2025-02-03T14:56:17.490167+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.184 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.184/0.184/0.184/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-03T14:56:18.714937+00:00 10.215.168.64  2025-02-03T14:56:17.991966+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-02-03T14:56:19.001644+00:00 10.215.168.64  2025-02-03T14:56:18.278659+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-02-03T14:56:19.029186+00:00 10.215.168.64  2025-02-03T14:56:18.306182+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-02-03T14:56:20.261813+00:00 10.215.168.64  2025-02-03T14:56:19.538698+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2025-02-03T14:56:20.796192+00:00 10.215.168.64  2025-02-03T14:56:20.073179+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-02-03T14:56:20.896244+00:00 10.215.168.64  2025-02-03T14:56:20.173210+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-02-03T14:56:21.043119+00:00 10.215.168.64  2025-02-03T14:56:20.320122+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-02-03T14:56:21.178808+00:00 10.215.168.64  2025-02-03T14:56:20.455796+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-02-03T14:56:27.222002+00:00 10.215.168.64  2025-02-03T14:56:26.903046+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-02-03T14:56:27.222133+00:00 10.215.168.64  2025-02-03T14:56:26.903216+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="3779" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-02-03T14:56:27.222238+00:00 10.215.168.64  2025-02-03T14:56:26.904264+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2025-02-03T14:56:27.222238+00:00 10.215.168.64  2025-02-03T14:56:26.904447+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-02-03T14:56:27.222238+00:00 10.215.168.64  2025-02-03T14:56:26.927164+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-02-03T14:56:27.222319+00:00 10.215.168.64  2025-02-03T14:56:26.930443+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-02-03T14:56:27.222319+00:00 10.215.168.64  2025-02-03T14:56:26.930542+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="3974" x-info="https://www.rsyslog.com"] start
2025-02-03T14:56:27.222319+00:00 10.215.168.64  2025-02-03T14:56:26.930595+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2025-02-03T14:56:27.223946+00:00 10.215.168.64  2025-02-03T14:56:26.932291+00:00 daemon-notice osdx cfgd[1642]:  [1931]Completed change to active configuration
2025-02-03T14:56:27.266217+00:00 10.215.168.64  2025-02-03T14:56:26.973327+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-03T14:56:27.322073+00:00 10.215.168.64  2025-02-03T14:56:27.030367+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-03T14:56:27.554124+00:00 10.215.168.64  2025-02-03T14:56:27.262544+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-02-03T14:56:27.649101+00:00 10.215.168.64  2025-02-03T14:56:27.357327+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.171 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.171/0.171/0.171/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-03T14:56:36.162714+00:00 33.33.33.33  2025-02-03T14:56:35.836675+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-02-03T14:56:36.162714+00:00 33.33.33.33  2025-02-03T14:56:35.837067+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="4079" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-02-03T14:56:36.162714+00:00 33.33.33.33  2025-02-03T14:56:35.837729+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2025-02-03T14:56:36.162731+00:00 33.33.33.33  2025-02-03T14:56:35.837878+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-02-03T14:56:36.162731+00:00 33.33.33.33  2025-02-03T14:56:35.875095+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-02-03T14:56:36.162731+00:00 33.33.33.33  2025-02-03T14:56:35.878307+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-02-03T14:56:36.162757+00:00 33.33.33.33  2025-02-03T14:56:35.878406+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="4237" x-info="https://www.rsyslog.com"] start
2025-02-03T14:56:36.162763+00:00 33.33.33.33  2025-02-03T14:56:35.878454+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2025-02-03T14:56:36.162774+00:00 33.33.33.33  2025-02-03T14:56:35.878969+00:00 daemon-notice osdx cfgd[1642]:  [1931]Completed change to active configuration
2025-02-03T14:56:36.209360+00:00 33.33.33.33  2025-02-03T14:56:35.925654+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-03T14:56:36.236793+00:00 33.33.33.33  2025-02-03T14:56:35.953122+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-03T14:56:36.432790+00:00 33.33.33.33  2025-02-03T14:56:36.149120+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-02-03T14:56:36.527404+00:00 33.33.33.33  2025-02-03T14:56:36.243714+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.235 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.235/0.235/0.235/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-03T14:56:37.024342+00:00 33.33.33.33  2025-02-03T14:56:36.740624+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-02-03T14:56:37.307768+00:00 33.33.33.33  2025-02-03T14:56:37.024105+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-02-03T14:56:37.334564+00:00 33.33.33.33  2025-02-03T14:56:37.050907+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-02-03T14:56:38.533247+00:00 33.33.33.33  2025-02-03T14:56:38.249508+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2025-02-03T14:56:39.038888+00:00 33.33.33.33  2025-02-03T14:56:38.755159+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-02-03T14:56:39.140720+00:00 33.33.33.33  2025-02-03T14:56:38.856982+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-02-03T14:56:39.282526+00:00 33.33.33.33  2025-02-03T14:56:38.998773+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-02-03T14:56:39.399173+00:00 33.33.33.33  2025-02-03T14:56:39.112542+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-02-03T14:56:45.730385+00:00 33.33.33.33  2025-02-03T14:56:45.379219+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-02-03T14:56:45.730385+00:00 33.33.33.33  2025-02-03T14:56:45.379506+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="4342" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-02-03T14:56:45.730403+00:00 33.33.33.33  2025-02-03T14:56:45.380194+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2025-02-03T14:56:45.730403+00:00 33.33.33.33  2025-02-03T14:56:45.380413+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-02-03T14:56:45.730478+00:00 33.33.33.33  2025-02-03T14:56:45.394741+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-02-03T14:56:45.730478+00:00 33.33.33.33  2025-02-03T14:56:45.397972+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-02-03T14:56:45.730478+00:00 33.33.33.33  2025-02-03T14:56:45.398022+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="4559" x-info="https://www.rsyslog.com"] start
2025-02-03T14:56:45.730478+00:00 33.33.33.33  2025-02-03T14:56:45.398097+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2025-02-03T14:56:45.731971+00:00 33.33.33.33  2025-02-03T14:56:45.398612+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2025-02-03T14:56:45.731982+00:00 33.33.33.33  2025-02-03T14:56:45.399930+00:00 daemon-notice osdx cfgd[1642]:  [1931]Completed change to active configuration
2025-02-03T14:56:45.769438+00:00 33.33.33.33  2025-02-03T14:56:45.437272+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-03T14:56:45.812886+00:00 33.33.33.33  2025-02-03T14:56:45.480794+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-03T14:56:46.004756+00:00 33.33.33.33  2025-02-03T14:56:45.672687+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-02-03T14:56:46.116487+00:00 33.33.33.33  2025-02-03T14:56:45.784383+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.331 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.331/0.331/0.331/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-03T14:56:56.136047+00:00 10.215.168.64  2025-02-03T14:56:55.097872+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-02-03T14:56:56.136190+00:00 10.215.168.64  2025-02-03T14:56:55.098313+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="4664" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-02-03T14:56:56.136190+00:00 10.215.168.64  2025-02-03T14:56:55.099062+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2025-02-03T14:56:56.136190+00:00 10.215.168.64  2025-02-03T14:56:55.099234+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-02-03T14:56:56.136190+00:00 10.215.168.64  2025-02-03T14:56:55.116342+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-02-03T14:56:56.136190+00:00 10.215.168.64  2025-02-03T14:56:55.123907+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-02-03T14:56:56.136190+00:00 10.215.168.64  2025-02-03T14:56:55.123974+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2025-02-03T14:56:56.136190+00:00 10.215.168.64  2025-02-03T14:56:55.124171+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="4872" x-info="https://www.rsyslog.com"] start
2025-02-03T14:56:56.136190+00:00 10.215.168.64  2025-02-03T14:56:55.126420+00:00 daemon-notice osdx cfgd[1642]:  [1931]Completed change to active configuration
2025-02-03T14:56:56.136190+00:00 10.215.168.64  2025-02-03T14:56:55.181554+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-03T14:56:56.136190+00:00 10.215.168.64  2025-02-03T14:56:55.244537+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-03T14:56:56.136190+00:00 10.215.168.64  2025-02-03T14:56:55.503073+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-02-03T14:56:56.136190+00:00 10.215.168.64  2025-02-03T14:56:55.785020+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-02-03T14:56:56.136190+00:00 10.215.168.64  2025-02-03T14:56:55.785155+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-02-03T14:56:57.290706+00:00 10.215.168.64  2025-02-03T14:56:56.960076+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.177 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.177/0.177/0.177/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-03T14:57:06.293861+00:00 33.33.33.33  2025-02-03T14:57:05.189463+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-02-03T14:57:06.294061+00:00 33.33.33.33  2025-02-03T14:57:05.189786+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="4977" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-02-03T14:57:06.294061+00:00 33.33.33.33  2025-02-03T14:57:05.190442+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2025-02-03T14:57:06.294061+00:00 33.33.33.33  2025-02-03T14:57:05.190574+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-02-03T14:57:06.294061+00:00 33.33.33.33  2025-02-03T14:57:05.241955+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-02-03T14:57:06.294061+00:00 33.33.33.33  2025-02-03T14:57:05.245441+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-02-03T14:57:06.294061+00:00 33.33.33.33  2025-02-03T14:57:05.245489+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="5139" x-info="https://www.rsyslog.com"] start
2025-02-03T14:57:06.294061+00:00 33.33.33.33  2025-02-03T14:57:05.245521+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2025-02-03T14:57:06.294061+00:00 33.33.33.33  2025-02-03T14:57:05.246994+00:00 daemon-notice osdx cfgd[1642]:  [1931]Completed change to active configuration
2025-02-03T14:57:06.294061+00:00 33.33.33.33  2025-02-03T14:57:05.297982+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-03T14:57:06.294061+00:00 33.33.33.33  2025-02-03T14:57:05.326795+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-03T14:57:06.294061+00:00 33.33.33.33  2025-02-03T14:57:05.423161+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-02-03T14:57:06.294061+00:00 33.33.33.33  2025-02-03T14:57:05.423326+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-02-03T14:57:06.438887+00:00 33.33.33.33  2025-02-03T14:57:05.581688+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-02-03T14:57:06.706154+00:00 33.33.33.33  2025-02-03T14:57:05.849027+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.