Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2025-02-03 14:45:04.488893 daemon-err , ntpd[411337]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:45:05.322364 daemon-err , ntpd[411374]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-02-03 14:45:05.322574 daemon-err , ntpd[411374]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:45:06.168894 daemon-err , ntpd[411411]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-02-03 14:45:06.169175 daemon-err , ntpd[411411]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:45:06.941593 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=] finished with status 1 2025-02-03 14:45:06.941672 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:45:06.941717 daemon-err , cfgd[1636]: \"U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=\" strong-password: score is too weak 2025-02-03 14:45:06.941759 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:45:06.943817 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=\" strong-password: score is too weak Commit validation failed 2025-02-03 14:45:07.706677 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=] finished with status 1 2025-02-03 14:45:07.706831 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:45:07.706907 daemon-err , cfgd[1636]: \"U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=\" strong-password: score is too weak 2025-02-03 14:45:07.706982 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:45:07.709583 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=\" strong-password: score is too weak Commit validation failed 2025-02-03 14:45:08.638511 daemon-err , ntpd[411502]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-02-03 14:45:08.638608 daemon-err , ntpd[411502]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:45:09.452066 daemon-err , ntpd[411539]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-02-03 14:45:09.452298 daemon-err , ntpd[411539]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:45:10.272073 daemon-err , ntpd[411576]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-02-03 14:45:10.272111 daemon-err , ntpd[411576]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:45:10.943496 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=] finished with status 1 2025-02-03 14:45:10.943585 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:45:10.943624 daemon-err , cfgd[1636]: \"U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=\" strong-password: score is too weak 2025-02-03 14:45:10.943657 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:45:10.945956 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=\" strong-password: score is too weak Commit validation failed 2025-02-03 14:45:11.675987 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=] finished with status 1 2025-02-03 14:45:11.676156 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:45:11.676238 daemon-err , cfgd[1636]: \"U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=\" strong-password: score is too weak 2025-02-03 14:45:11.676313 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:45:11.678459 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=\" strong-password: score is too weak Commit validation failed 2025-02-03 14:45:12.413168 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbVbAv5HNxHNTgy9TMLwxWJI=] finished with status 1 2025-02-03 14:45:12.413361 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:45:12.413463 daemon-err , cfgd[1636]: \"U2FsdGVkX1/5IXIUwAFKbVbAv5HNxHNTgy9TMLwxWJI=\" strong-password: score is too weak 2025-02-03 14:45:12.413553 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:45:12.416384 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbVbAv5HNxHNTgy9TMLwxWJI=\" strong-password: score is too weak Commit validation failed 2025-02-03 14:45:13.318295 daemon-err , ntpd[411692]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-02-03 14:45:13.318332 daemon-err , ntpd[411692]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:45:14.140372 daemon-err , ntpd[411729]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-02-03 14:45:14.140640 daemon-err , ntpd[411729]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:45:14.859076 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=] finished with status 1 2025-02-03 14:45:14.859147 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:45:14.859186 daemon-err , cfgd[1636]: \"U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=\" strong-password: score is too weak 2025-02-03 14:45:14.859218 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:45:14.861405 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbaOt6bVdm1YhEbr8hXfLPEE=\" strong-password: score is too weak Commit validation failed 2025-02-03 14:45:15.582733 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=] finished with status 1 2025-02-03 14:45:15.582799 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:45:15.582835 daemon-err , cfgd[1636]: \"U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=\" strong-password: score is too weak 2025-02-03 14:45:15.582860 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:45:15.585077 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbYaVON3xPai/oYem4zrmLyw=\" strong-password: score is too weak Commit validation failed 2025-02-03 14:45:16.340051 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbVbAv5HNxHNTgy9TMLwxWJI=] finished with status 1 2025-02-03 14:45:16.340131 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:45:16.340179 daemon-err , cfgd[1636]: \"U2FsdGVkX1/5IXIUwAFKbVbAv5HNxHNTgy9TMLwxWJI=\" strong-password: score is too weak 2025-02-03 14:45:16.340226 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:45:16.342164 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbVbAv5HNxHNTgy9TMLwxWJI=\" strong-password: score is too weak Commit validation failed 2025-02-03 14:45:17.100967 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/5IXIUwAFKbfHlP3OsdtsfxQ3tACRsdlA=] finished with status 1 2025-02-03 14:45:17.101184 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:45:17.101274 daemon-err , cfgd[1636]: \"U2FsdGVkX1/5IXIUwAFKbfHlP3OsdtsfxQ3tACRsdlA=\" strong-password: score is too weak 2025-02-03 14:45:17.101394 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:45:17.103830 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/5IXIUwAFKbfHlP3OsdtsfxQ3tACRsdlA=\" strong-password: score is too weak Commit validation failed 2025-02-03 14:45:25.370410 daemon-err , ntpd[411993]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-02-03 14:45:25.370644 daemon-err , ntpd[411993]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:45:35.110602 daemon-err , ntpd[412188]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-02-03 14:45:35.110638 daemon-err , ntpd[412188]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:45:43.927058 daemon-err , cfgd[1636]: [400402]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-02-03 14:45:44.496405 daemon-err , cfgd[1636]: [400402]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-02-03 14:45:46.232010 daemon-err , ntpd[412434]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-02-03 14:45:46.232039 daemon-err , ntpd[412434]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:45:47.054143 daemon-err , ntpd[412471]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-02-03 14:45:47.054226 daemon-err , ntpd[412471]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:45:48.004899 daemon-err , ntpd[412508]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-02-03 14:45:48.004934 daemon-err , ntpd[412508]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:45:58.245496 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX199caChanZJOpRDJQ5w9Ja+X86oOAIYD9E=] finished with status 1 2025-02-03 14:45:58.245577 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:45:58.245619 daemon-err , cfgd[1636]: \"U2FsdGVkX199caChanZJOpRDJQ5w9Ja+X86oOAIYD9E=\" strong-password: score is too weak 2025-02-03 14:45:58.245652 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:45:58.247432 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX199caChanZJOpRDJQ5w9Ja+X86oOAIYD9E=\" strong-password: score is too weak Commit validation failed 2025-02-03 14:45:59.018464 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX183ZCBBEBBvbL6+lul6/q6YdBdbG1xQCpA=] finished with status 1 2025-02-03 14:45:59.018560 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:45:59.018604 daemon-err , cfgd[1636]: \"U2FsdGVkX183ZCBBEBBvbL6+lul6/q6YdBdbG1xQCpA=\" strong-password: score is too weak 2025-02-03 14:45:59.018642 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:45:59.021085 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX183ZCBBEBBvbL6+lul6/q6YdBdbG1xQCpA=\" strong-password: score is too weak Commit validation failed 2025-02-03 14:45:59.853076 daemon-err , ntpd[412889]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-02-03 14:45:59.853306 daemon-err , ntpd[412889]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:46:08.441643 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19IPJQVAFoT9O1ohZUUnUp3kvMxr1JfQnI=] finished with status 2 2025-02-03 14:46:08.441726 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:46:08.441776 daemon-err , cfgd[1636]: \"U2FsdGVkX19IPJQVAFoT9O1ohZUUnUp3kvMxr1JfQnI=\" strong-password: not long enough 2025-02-03 14:46:08.441818 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:46:08.443565 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX19IPJQVAFoT9O1ohZUUnUp3kvMxr1JfQnI=\" strong-password: not long enough Commit validation failed 2025-02-03 14:46:09.414566 daemon-err , ntpd[413073]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-02-03 14:46:09.414615 daemon-err , ntpd[413073]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:46:16.122985 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/ynpuEmUWlkyyuTQCZbDyEGut5F+6Me9k=] finished with status 3 2025-02-03 14:46:16.123188 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:46:16.123318 daemon-err , cfgd[1636]: \"U2FsdGVkX1/ynpuEmUWlkyyuTQCZbDyEGut5F+6Me9k=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2025-02-03 14:46:16.123419 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:46:16.125938 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/ynpuEmUWlkyyuTQCZbDyEGut5F+6Me9k=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed 2025-02-03 14:46:16.885007 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19YDpkXAW1JGoBCbgNeH1hGCJSAQMEtJEM=] finished with status 3 2025-02-03 14:46:16.885240 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:46:16.885347 daemon-err , cfgd[1636]: \"U2FsdGVkX19YDpkXAW1JGoBCbgNeH1hGCJSAQMEtJEM=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2025-02-03 14:46:16.885435 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:46:16.887977 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX19YDpkXAW1JGoBCbgNeH1hGCJSAQMEtJEM=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed 2025-02-03 14:46:17.670404 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+J/PzRuS9WCsc/N9UWGnPD/LaZit/x1Qs=] finished with status 3 2025-02-03 14:46:17.670558 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:46:17.670634 daemon-err , cfgd[1636]: \"U2FsdGVkX1+J/PzRuS9WCsc/N9UWGnPD/LaZit/x1Qs=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2025-02-03 14:46:17.670701 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:46:17.672907 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+J/PzRuS9WCsc/N9UWGnPD/LaZit/x1Qs=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed 2025-02-03 14:46:18.385234 daemon-err , cfgd[1636]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/0nGz1wUCASGIEqY8xuN1bIaJMxwXDvUw=] finished with status 1 2025-02-03 14:46:18.385285 daemon-err , cfgd[1636]: [ system ntp authentication-key 1 encrypted-key ] 2025-02-03 14:46:18.385335 daemon-err , cfgd[1636]: \"U2FsdGVkX1/0nGz1wUCASGIEqY8xuN1bIaJMxwXDvUw=\" strong-password: score is too weak 2025-02-03 14:46:18.385375 daemon-err , cfgd[1636]: Commit validation failed 2025-02-03 14:46:18.387668 daemon-err , cfgd[1636]: [400402]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/0nGz1wUCASGIEqY8xuN1bIaJMxwXDvUw=\" strong-password: score is too weak Commit validation failed 2025-02-03 14:46:19.345881 daemon-err , ntpd[413307]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-02-03 14:46:19.346104 daemon-err , ntpd[413307]: AUTH: authreadkeys: added 1 keys 2025-02-03 14:46:19.870481 daemon-err , cfgd[1636]: [400402]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-02-03 14:46:20.387843 daemon-err , cfgd[1636]: [400402]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-02-03 14:46:20.968566 daemon-err , cfgd[1636]: [400402]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-02-03 14:46:21.497118 daemon-err , cfgd[1636]: [400402]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-02-03 14:47:24.706877 daemon-err , modulelauncher[425364]: osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0 2025-02-03 14:47:24.707032 daemon-err , modulelauncher[425364]: Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1. 2025-02-03 14:47:24.724638 daemon-err , modulelauncher[425364]: osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0 2025-02-03 14:47:24.724798 daemon-err , modulelauncher[425364]: Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1. 2025-02-03 14:47:39.712411 daemon-err , modulelauncher[425737]: osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0 2025-02-03 14:47:39.712564 daemon-err , modulelauncher[425737]: Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1. 2025-02-03 14:47:39.725940 daemon-err , modulelauncher[425737]: osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0 2025-02-03 14:47:39.726086 daemon-err , modulelauncher[425737]: Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1. 2025-02-03 14:47:55.167412 daemon-err , modulelauncher[426160]: osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0 2025-02-03 14:47:55.167523 daemon-err , modulelauncher[426160]: Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1. 2025-02-03 14:47:55.180934 daemon-err , modulelauncher[426160]: osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0 2025-02-03 14:47:55.181011 daemon-err , modulelauncher[426160]: Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1. 2025-02-03 14:48:11.428980 daemon-err , modulelauncher[426586]: osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0 2025-02-03 14:48:11.429185 daemon-err , modulelauncher[426586]: Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1. 2025-02-03 14:48:11.445848 daemon-err , modulelauncher[426586]: osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0 2025-02-03 14:48:11.445972 daemon-err , modulelauncher[426586]: Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1. 2025-02-03 14:48:28.787137 daemon-err , modulelauncher[427009]: osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0 2025-02-03 14:48:28.787214 daemon-err , modulelauncher[427009]: Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1. 2025-02-03 14:48:28.799620 daemon-err , modulelauncher[427009]: osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0 2025-02-03 14:48:28.799690 daemon-err , modulelauncher[427009]: Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1. 2025-02-03 14:48:43.756314 daemon-err , modulelauncher[427434]: osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0 2025-02-03 14:48:43.756457 daemon-err , modulelauncher[427434]: Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1. 2025-02-03 14:48:43.770264 daemon-err , modulelauncher[427434]: osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0 2025-02-03 14:48:43.770465 daemon-err , modulelauncher[427434]: Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1. 2025-02-03 14:49:37.784977 kern-err , kernel: [ 9.081640] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 2025-02-03 14:49:37.784977 kern-err , kernel: [ 9.083169] Buffer I/O error on dev sdb1, logical block 0, lost sync page write 2025-02-03 14:49:37.784980 kern-err , kernel: [ 9.169789] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 2025-02-03 14:49:37.785027 kern-err , kernel: [ 9.171316] Buffer I/O error on dev sdb1, logical block 0, lost sync page write 2025-02-03 14:49:37.785063 kern-err , kernel: [ 11.836412] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 2025-02-03 14:49:37.785063 kern-err , kernel: [ 11.836416] Buffer I/O error on dev sdb1, logical block 0, lost sync page write 2025-02-03 14:49:42.044278 local0-notice , osdx-reboot: bootup v4.2.1.3 2025-02-03 14:49:42 (reason: Panic) 2025-02-03 14:49:51.091213 user-crit , systemd-coredump[2204]: Process 2141 (cnm-client) of user 0 dumped core. Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64 Stack trace of thread 2141: #0 0x00007efedb9729dc pselect (libc.so.6 + 0xfe9dc) #1 0x00005594d68d92ff n/a (cnm-client + 0x532ff) #2 0x00005594d68db0f5 n/a (cnm-client + 0x550f5) #3 0x00005594d68b176b n/a (cnm-client + 0 x2b76b) #4 0x00007efedb89b24a n/a (libc.so.6 + 0x2724a) #5 0x00007efedb89b305 __libc_start_main (libc.so.6 + 0x27305) #6 0x00005594d68b8d81 n/a (cnm-client + 0x32d81) ELF object binary architecture: AMD x86-64 2025-02-03 14:50:05.595680 user-crit , systemd-coredump[2614]: Process 2549 (cnm-client) of user 0 dumped core. Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64 Stack trace of thread 2549: #0 0x00007f89df3339dc pselect (libc.so.6 + 0xfe9dc) #1 0x00005629e72b42ff n/a (cnm-client + 0x532ff) #2 0x00005629e72b60f5 n/a (cnm-client + 0x550f5) #3 0x00005629e728c76b n/a (cnm-client + 0 x2b76b) #4 0x00007f89df25c24a n/a (libc.so.6 + 0x2724a) #5 0x00007f89df25c305 __libc_start_main (libc.so.6 + 0x27305) #6 0x00005629e7293d81 n/a (cnm-client + 0x32d81) ELF object binary architecture: AMD x86-64 2025-02-03 14:50:11.095098 user-crit , systemd-coredump[2750]: Process 2696 (cnm-client) of user 0 dumped core. Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64 Stack trace of thread 2696: #0 0x00007fa2c2cc19dc pselect (libc.so.6 + 0xfe9dc) #1 0x0000563164fa92ff n/a (cnm-client + 0x532ff) #2 0x0000563164fab0f5 n/a (cnm-client + 0x550f5) #3 0x0000563164f8176b n/a (cnm-client + 0 x2b76b) #4 0x00007fa2c2bea24a n/a (libc.so.6 + 0x2724a) #5 0x00007fa2c2bea305 __libc_start_main (libc.so.6 + 0x27305) #6 0x0000563164f88d81 n/a (cnm-client + 0x32d81) ELF object binary architecture: AMD x86-64 2025-02-03 14:50:16.600670 user-crit , systemd-coredump[2888]: Process 2832 (cnm-client) of user 0 dumped core. Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64 Stack trace of thread 2832: #0 0x00007fcb74ffd9dc pselect (libc.so.6 + 0xfe9dc) #1 0x000055cf51cb32ff n/a (cnm-client + 0x532ff) #2 0x000055cf51cb50f5 n/a (cnm-client + 0x550f5) #3 0x000055cf51c8b76b n/a (cnm-client + 0 x2b76b) #4 0x00007fcb74f2624a n/a (libc.so.6 + 0x2724a) #5 0x00007fcb74f26305 __libc_start_main (libc.so.6 + 0x27305) #6 0x000055cf51c92d81 n/a (cnm-client + 0x32d81) ELF object binary architecture: AMD x86-64 2025-02-03 14:51:16.893665 kern-err , kernel: [ 9.354597] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 2025-02-03 14:51:16.893666 kern-err , kernel: [ 9.355993] Buffer I/O error on dev sdb1, logical block 0, lost sync page write 2025-02-03 14:51:16.893676 kern-err , kernel: [ 9.442434] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 2025-02-03 14:51:16.893739 kern-err , kernel: [ 9.443802] Buffer I/O error on dev sdb1, logical block 0, lost sync page write 2025-02-03 14:51:16.893813 kern-err , kernel: [ 12.061475] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 2025-02-03 14:51:16.893813 kern-err , kernel: [ 12.061479] Buffer I/O error on dev sdb1, logical block 0, lost sync page write 2025-02-03 14:51:20.660215 local0-notice , osdx-reboot: bootup v4.2.1.3 2025-02-03 14:51:20 (reason: Panic) 2025-02-03 14:51:29.001895 user-crit , systemd-coredump[2068]: Process 2003 (cnm-client) of user 0 dumped core. Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64 Stack trace of thread 2003: #0 0x00007f5fc431d9dc pselect (libc.so.6 + 0xfe9dc) #1 0x000055d09b1c62ff n/a (cnm-client + 0x532ff) #2 0x000055d09b1c80f5 n/a (cnm-client + 0x550f5) #3 0x000055d09b19e76b n/a (cnm-client + 0 x2b76b) #4 0x00007f5fc424624a n/a (libc.so.6 + 0x2724a) #5 0x00007f5fc4246305 __libc_start_main (libc.so.6 + 0x27305) #6 0x000055d09b1a5d81 n/a (cnm-client + 0x32d81) ELF object binary architecture: AMD x86-64 2025-02-03 14:51:34.654775 user-crit , systemd-coredump[2204]: Process 2148 (cnm-client) of user 0 dumped core. Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64 Stack trace of thread 2148: #0 0x00007f29d529f9dc pselect (libc.so.6 + 0xfe9dc) #1 0x0000560bd4d2e2ff n/a (cnm-client + 0x532ff) #2 0x0000560bd4d300f5 n/a (cnm-client + 0x550f5) #3 0x0000560bd4d0676b n/a (cnm-client + 0 x2b76b) #4 0x00007f29d51c824a n/a (libc.so.6 + 0x2724a) #5 0x00007f29d51c8305 __libc_start_main (libc.so.6 + 0x27305) #6 0x0000560bd4d0dd81 n/a (cnm-client + 0x32d81) ELF object binary architecture: AMD x86-64 2025-02-03 14:52:38.587169 kern-err , kernel: [ 9.089101] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 2025-02-03 14:52:38.587170 kern-err , kernel: [ 9.090233] Buffer I/O error on dev sdb1, logical block 0, lost sync page write 2025-02-03 14:52:38.587176 kern-err , kernel: [ 9.177949] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 2025-02-03 14:52:38.587239 kern-err , kernel: [ 9.179035] Buffer I/O error on dev sdb1, logical block 0, lost sync page write 2025-02-03 14:52:38.587300 kern-err , kernel: [ 11.829251] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 2025-02-03 14:52:38.587300 kern-err , kernel: [ 11.829255] Buffer I/O error on dev sdb1, logical block 0, lost sync page write 2025-02-03 14:52:41.967289 local0-notice , osdx-reboot: bootup v4.2.1.3 2025-02-03 14:52:41 (reason: Panic) 2025-02-03 14:53:03.477708 user-crit , systemd-coredump[2373]: Process 2307 (cnm-client) of user 0 dumped core. Module libsystemd.so.0 from deb systemd-252.17-1~deb12u1.amd64 Stack trace of thread 2307: #0 0x00007fd9453ca9dc pselect (libc.so.6 + 0xfe9dc) #1 0x00005558759242ff n/a (cnm-client + 0x532ff) #2 0x00005558759260f5 n/a (cnm-client + 0x550f5) #3 0x00005558758fc76b n/a (cnm-client + 0 x2b76b) #4 0x00007fd9452f324a n/a (libc.so.6 + 0x2724a) #5 0x00007fd9452f3305 __libc_start_main (libc.so.6 + 0x27305) #6 0x0000555875903d81 n/a (cnm-client + 0x32d81) ELF object binary architecture: AMD x86-64 2025-02-03 14:53:54.802865 kern-err , kernel: [ 9.224284] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 2025-02-03 14:53:54.802866 kern-err , kernel: [ 9.225380] Buffer I/O error on dev sdb1, logical block 0, lost sync page write 2025-02-03 14:53:54.802868 kern-err , kernel: [ 9.312427] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 2025-02-03 14:53:54.802921 kern-err , kernel: [ 9.313594] Buffer I/O error on dev sdb1, logical block 0, lost sync page write 2025-02-03 14:53:54.802980 kern-err , kernel: [ 12.116450] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 2025-02-03 14:53:54.802981 kern-err , kernel: [ 12.116453] Buffer I/O error on dev sdb1, logical block 0, lost sync page write 2025-02-03 14:53:59.086550 local0-notice , osdx-reboot: bootup v4.2.1.3 2025-02-03 14:53:59 (reason: Panic) 2025-02-03 14:55:04.665604 kern-err , kernel: [ 9.206055] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 2025-02-03 14:55:04.665606 kern-err , kernel: [ 9.207189] Buffer I/O error on dev sdb1, logical block 0, lost sync page write 2025-02-03 14:55:04.665608 kern-err , kernel: [ 9.295229] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 2025-02-03 14:55:04.665673 kern-err , kernel: [ 9.296763] Buffer I/O error on dev sdb1, logical block 0, lost sync page write 2025-02-03 14:55:04.665711 kern-err , kernel: [ 12.249940] I/O error, dev sdb, sector 63 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 2025-02-03 14:55:04.665711 kern-err , kernel: [ 12.249943] Buffer I/O error on dev sdb1, logical block 0, lost sync page write 2025-02-03 14:55:08.234994 local0-notice , osdx-reboot: bootup v4.2.1.3 2025-02-03 14:55:08 (reason: Panic) 2025-02-03 14:55:13.977915 user-err , file_operation.py: osdx.utils.xos cmd error: cp /opt/vyatta/etc/config/coredump/202502031455_kernel_panic.tar.gz /tmp/volatile/202502031455_kernel_panic.tar.gz 2>/dev/null 2025-02-03 14:55:13.977970 user-err , file_operation.py: Command 'cp /opt/vyatta/etc/config/coredump/202502031455_kernel_panic.tar.gz /tmp/volatile/202502031455_kernel_panic.tar.gz 2>/dev/null' returned non-zero exit status 1. 2025-02-03 14:55:16.042272 user-err , file_operation.py: osdx.utils.xos cmd error: cp /opt/vyatta/etc/config/coredump/dmesg.202502031454 /tmp/volatile/dmesg.202502031454 2>/dev/null 2025-02-03 14:55:16.042320 user-err , file_operation.py: Command 'cp /opt/vyatta/etc/config/coredump/dmesg.202502031454 /tmp/volatile/dmesg.202502031454 2>/dev/null' returned non-zero exit status 1. 2025-02-03 14:55:30.834049 daemon-err , cfgd[1642]: [1931]Command output: File name reserved Value validation failed 2025-02-03 14:55:39.039702 daemon-info , systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-02-03 14:55:39.039983 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="1861" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-02-03 14:55:39.040782 daemon-info , systemd[1]: rsyslog.service: Deactivated successfully. 2025-02-03 14:55:39.040926 daemon-info , systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-02-03 14:55:39.062053 daemon-info , systemd[1]: Starting rsyslog.service - System Logging Service... 2025-02-03 14:55:39.064405 syslog-info , rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-02-03 14:55:39.064446 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="2600" x-info="https://www.rsyslog.com"] start 2025-02-03 14:55:39.064479 daemon-info , systemd[1]: Started rsyslog.service - System Logging Service. 2025-02-03 14:55:39.065393 daemon-notice , cfgd[1642]: [1931]Completed change to active configuration 2025-02-03 14:55:39.067897 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2025-02-03 14:55:39.096646 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2025-02-03 14:55:39.250715 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.Show output
2025-02-03 14:55:48.334785 daemon-info , systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-02-03 14:55:48.336197 daemon-info , systemd[1]: rsyslog.service: Deactivated successfully. 2025-02-03 14:55:48.336369 daemon-info , systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-02-03 14:55:48.361463 daemon-info , systemd[1]: Starting rsyslog.service - System Logging Service... 2025-02-03 14:55:48.364615 daemon-info , systemd[1]: Started rsyslog.service - System Logging Service. 2025-02-03 14:55:49.362033 daemon-info , systemd[1]: Created slice system-dhcpd.slice - Slice /system/dhcpd. 2025-02-03 14:55:49.377371 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
Started.*"DHCP Server Service instance main"\.Show output
2025-02-03 14:55:58.598060 daemon-info , systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-02-03 14:55:58.598692 daemon-info , systemd[1]: rsyslog.service: Deactivated successfully. 2025-02-03 14:55:58.598880 daemon-info , systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-02-03 14:55:58.628887 daemon-info , systemd[1]: Starting rsyslog.service - System Logging Service... 2025-02-03 14:55:58.631635 daemon-info , systemd[1]: Started rsyslog.service - System Logging Service. 2025-02-03 14:55:59.696285 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.172 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.172/0.172/0.172/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-02-03T14:56:08.581309+00:00 10.215.168.64 2025-02-03T14:56:07.671652+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-02-03T14:56:08.581309+00:00 10.215.168.64 2025-02-03T14:56:07.671866+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="3240" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-02-03T14:56:08.581309+00:00 10.215.168.64 2025-02-03T14:56:07.678631+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2025-02-03T14:56:08.581309+00:00 10.215.168.64 2025-02-03T14:56:07.678807+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-02-03T14:56:08.581322+00:00 10.215.168.64 2025-02-03T14:56:07.695830+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2025-02-03T14:56:08.581355+00:00 10.215.168.64 2025-02-03T14:56:07.698614+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-02-03T14:56:08.581849+00:00 10.215.168.64 2025-02-03T14:56:07.698695+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="3379" x-info="https://www.rsyslog.com"] start 2025-02-03T14:56:08.581849+00:00 10.215.168.64 2025-02-03T14:56:07.698747+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2025-02-03T14:56:08.582771+00:00 10.215.168.64 2025-02-03T14:56:07.700020+00:00 daemon-notice osdx cfgd[1642]: [1931]Completed change to active configuration 2025-02-03T14:56:08.626000+00:00 10.215.168.64 2025-02-03T14:56:07.743173+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-02-03T14:56:08.682710+00:00 10.215.168.64 2025-02-03T14:56:07.799896+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-02-03T14:56:08.873017+00:00 10.215.168.64 2025-02-03T14:56:07.990192+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-02-03T14:56:08.970009+00:00 10.215.168.64 2025-02-03T14:56:08.087172+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.168 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.168/0.168/0.168/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-02-03T14:56:09.493772+00:00 10.215.168.64 2025-02-03T14:56:08.610917+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-02-03T14:56:09.815625+00:00 10.215.168.64 2025-02-03T14:56:08.932799+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-02-03T14:56:09.850075+00:00 10.215.168.64 2025-02-03T14:56:08.967207+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-02-03T14:56:11.145001+00:00 10.215.168.64 2025-02-03T14:56:10.262093+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2025-02-03T14:56:11.693876+00:00 10.215.168.64 2025-02-03T14:56:10.810989+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-02-03T14:56:11.820308+00:00 10.215.168.64 2025-02-03T14:56:10.937410+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-02-03T14:56:11.944696+00:00 10.215.168.64 2025-02-03T14:56:11.061827+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-02-03T14:56:12.086508+00:00 10.215.168.64 2025-02-03T14:56:11.201018+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-02-03T14:56:17.842271+00:00 10.215.168.64 2025-02-03T14:56:17.081347+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-02-03T14:56:17.842271+00:00 10.215.168.64 2025-02-03T14:56:17.081509+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="3484" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-02-03T14:56:17.842271+00:00 10.215.168.64 2025-02-03T14:56:17.082114+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2025-02-03T14:56:17.842289+00:00 10.215.168.64 2025-02-03T14:56:17.082275+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-02-03T14:56:17.842311+00:00 10.215.168.64 2025-02-03T14:56:17.115682+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2025-02-03T14:56:17.843293+00:00 10.215.168.64 2025-02-03T14:56:17.118719+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-02-03T14:56:17.843293+00:00 10.215.168.64 2025-02-03T14:56:17.118781+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="3674" x-info="https://www.rsyslog.com"] start 2025-02-03T14:56:17.843306+00:00 10.215.168.64 2025-02-03T14:56:17.118828+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2025-02-03T14:56:17.843319+00:00 10.215.168.64 2025-02-03T14:56:17.120159+00:00 daemon-notice osdx cfgd[1642]: [1931]Completed change to active configuration 2025-02-03T14:56:17.896425+00:00 10.215.168.64 2025-02-03T14:56:17.173265+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-02-03T14:56:17.924243+00:00 10.215.168.64 2025-02-03T14:56:17.201301+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-02-03T14:56:18.127553+00:00 10.215.168.64 2025-02-03T14:56:17.404540+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-02-03T14:56:18.213148+00:00 10.215.168.64 2025-02-03T14:56:17.490167+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-interface eth0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.184 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.184/0.184/0.184/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-02-03T14:56:18.714937+00:00 10.215.168.64 2025-02-03T14:56:17.991966+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-02-03T14:56:19.001644+00:00 10.215.168.64 2025-02-03T14:56:18.278659+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-02-03T14:56:19.029186+00:00 10.215.168.64 2025-02-03T14:56:18.306182+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-02-03T14:56:20.261813+00:00 10.215.168.64 2025-02-03T14:56:19.538698+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2025-02-03T14:56:20.796192+00:00 10.215.168.64 2025-02-03T14:56:20.073179+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-02-03T14:56:20.896244+00:00 10.215.168.64 2025-02-03T14:56:20.173210+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-02-03T14:56:21.043119+00:00 10.215.168.64 2025-02-03T14:56:20.320122+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-02-03T14:56:21.178808+00:00 10.215.168.64 2025-02-03T14:56:20.455796+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-02-03T14:56:27.222002+00:00 10.215.168.64 2025-02-03T14:56:26.903046+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-02-03T14:56:27.222133+00:00 10.215.168.64 2025-02-03T14:56:26.903216+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="3779" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-02-03T14:56:27.222238+00:00 10.215.168.64 2025-02-03T14:56:26.904264+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2025-02-03T14:56:27.222238+00:00 10.215.168.64 2025-02-03T14:56:26.904447+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-02-03T14:56:27.222238+00:00 10.215.168.64 2025-02-03T14:56:26.927164+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2025-02-03T14:56:27.222319+00:00 10.215.168.64 2025-02-03T14:56:26.930443+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-02-03T14:56:27.222319+00:00 10.215.168.64 2025-02-03T14:56:26.930542+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="3974" x-info="https://www.rsyslog.com"] start 2025-02-03T14:56:27.222319+00:00 10.215.168.64 2025-02-03T14:56:26.930595+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2025-02-03T14:56:27.223946+00:00 10.215.168.64 2025-02-03T14:56:26.932291+00:00 daemon-notice osdx cfgd[1642]: [1931]Completed change to active configuration 2025-02-03T14:56:27.266217+00:00 10.215.168.64 2025-02-03T14:56:26.973327+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-02-03T14:56:27.322073+00:00 10.215.168.64 2025-02-03T14:56:27.030367+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-02-03T14:56:27.554124+00:00 10.215.168.64 2025-02-03T14:56:27.262544+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-02-03T14:56:27.649101+00:00 10.215.168.64 2025-02-03T14:56:27.357327+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and UDP
Description
Add a remote host to send syslog messages through a specific local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.171 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.171/0.171/0.171/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-02-03T14:56:36.162714+00:00 33.33.33.33 2025-02-03T14:56:35.836675+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-02-03T14:56:36.162714+00:00 33.33.33.33 2025-02-03T14:56:35.837067+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="4079" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-02-03T14:56:36.162714+00:00 33.33.33.33 2025-02-03T14:56:35.837729+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2025-02-03T14:56:36.162731+00:00 33.33.33.33 2025-02-03T14:56:35.837878+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-02-03T14:56:36.162731+00:00 33.33.33.33 2025-02-03T14:56:35.875095+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2025-02-03T14:56:36.162731+00:00 33.33.33.33 2025-02-03T14:56:35.878307+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-02-03T14:56:36.162757+00:00 33.33.33.33 2025-02-03T14:56:35.878406+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="4237" x-info="https://www.rsyslog.com"] start 2025-02-03T14:56:36.162763+00:00 33.33.33.33 2025-02-03T14:56:35.878454+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2025-02-03T14:56:36.162774+00:00 33.33.33.33 2025-02-03T14:56:35.878969+00:00 daemon-notice osdx cfgd[1642]: [1931]Completed change to active configuration 2025-02-03T14:56:36.209360+00:00 33.33.33.33 2025-02-03T14:56:35.925654+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-02-03T14:56:36.236793+00:00 33.33.33.33 2025-02-03T14:56:35.953122+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-02-03T14:56:36.432790+00:00 33.33.33.33 2025-02-03T14:56:36.149120+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-02-03T14:56:36.527404+00:00 33.33.33.33 2025-02-03T14:56:36.243714+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and VRF
Description
Add a remote host to send syslog messages through a VRF and a local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.235 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.235/0.235/0.235/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-02-03T14:56:37.024342+00:00 33.33.33.33 2025-02-03T14:56:36.740624+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-02-03T14:56:37.307768+00:00 33.33.33.33 2025-02-03T14:56:37.024105+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-02-03T14:56:37.334564+00:00 33.33.33.33 2025-02-03T14:56:37.050907+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-02-03T14:56:38.533247+00:00 33.33.33.33 2025-02-03T14:56:38.249508+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2025-02-03T14:56:39.038888+00:00 33.33.33.33 2025-02-03T14:56:38.755159+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-02-03T14:56:39.140720+00:00 33.33.33.33 2025-02-03T14:56:38.856982+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-02-03T14:56:39.282526+00:00 33.33.33.33 2025-02-03T14:56:38.998773+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-02-03T14:56:39.399173+00:00 33.33.33.33 2025-02-03T14:56:39.112542+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-02-03T14:56:45.730385+00:00 33.33.33.33 2025-02-03T14:56:45.379219+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-02-03T14:56:45.730385+00:00 33.33.33.33 2025-02-03T14:56:45.379506+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="4342" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-02-03T14:56:45.730403+00:00 33.33.33.33 2025-02-03T14:56:45.380194+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2025-02-03T14:56:45.730403+00:00 33.33.33.33 2025-02-03T14:56:45.380413+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-02-03T14:56:45.730478+00:00 33.33.33.33 2025-02-03T14:56:45.394741+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2025-02-03T14:56:45.730478+00:00 33.33.33.33 2025-02-03T14:56:45.397972+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-02-03T14:56:45.730478+00:00 33.33.33.33 2025-02-03T14:56:45.398022+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="4559" x-info="https://www.rsyslog.com"] start 2025-02-03T14:56:45.730478+00:00 33.33.33.33 2025-02-03T14:56:45.398097+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2025-02-03T14:56:45.731971+00:00 33.33.33.33 2025-02-03T14:56:45.398612+00:00 syslog-warning osdx rsyslogd: bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ] 2025-02-03T14:56:45.731982+00:00 33.33.33.33 2025-02-03T14:56:45.399930+00:00 daemon-notice osdx cfgd[1642]: [1931]Completed change to active configuration 2025-02-03T14:56:45.769438+00:00 33.33.33.33 2025-02-03T14:56:45.437272+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-02-03T14:56:45.812886+00:00 33.33.33.33 2025-02-03T14:56:45.480794+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-02-03T14:56:46.004756+00:00 33.33.33.33 2025-02-03T14:56:45.672687+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-02-03T14:56:46.116487+00:00 33.33.33.33 2025-02-03T14:56:45.784383+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.331 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.331/0.331/0.331/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-02-03T14:56:56.136047+00:00 10.215.168.64 2025-02-03T14:56:55.097872+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-02-03T14:56:56.136190+00:00 10.215.168.64 2025-02-03T14:56:55.098313+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="4664" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-02-03T14:56:56.136190+00:00 10.215.168.64 2025-02-03T14:56:55.099062+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2025-02-03T14:56:56.136190+00:00 10.215.168.64 2025-02-03T14:56:55.099234+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-02-03T14:56:56.136190+00:00 10.215.168.64 2025-02-03T14:56:55.116342+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2025-02-03T14:56:56.136190+00:00 10.215.168.64 2025-02-03T14:56:55.123907+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-02-03T14:56:56.136190+00:00 10.215.168.64 2025-02-03T14:56:55.123974+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2025-02-03T14:56:56.136190+00:00 10.215.168.64 2025-02-03T14:56:55.124171+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="4872" x-info="https://www.rsyslog.com"] start 2025-02-03T14:56:56.136190+00:00 10.215.168.64 2025-02-03T14:56:55.126420+00:00 daemon-notice osdx cfgd[1642]: [1931]Completed change to active configuration 2025-02-03T14:56:56.136190+00:00 10.215.168.64 2025-02-03T14:56:55.181554+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-02-03T14:56:56.136190+00:00 10.215.168.64 2025-02-03T14:56:55.244537+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-02-03T14:56:56.136190+00:00 10.215.168.64 2025-02-03T14:56:55.503073+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-02-03T14:56:56.136190+00:00 10.215.168.64 2025-02-03T14:56:55.785020+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-02-03T14:56:56.136190+00:00 10.215.168.64 2025-02-03T14:56:55.785155+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-02-03T14:56:57.290706+00:00 10.215.168.64 2025-02-03T14:56:56.960076+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Local Address Single TLS
Description
Add a secured remote host to send syslog messages and show the host name from a fiven local-address
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.177 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.177/0.177/0.177/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-02-03T14:57:06.293861+00:00 33.33.33.33 2025-02-03T14:57:05.189463+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-02-03T14:57:06.294061+00:00 33.33.33.33 2025-02-03T14:57:05.189786+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="4977" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-02-03T14:57:06.294061+00:00 33.33.33.33 2025-02-03T14:57:05.190442+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2025-02-03T14:57:06.294061+00:00 33.33.33.33 2025-02-03T14:57:05.190574+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-02-03T14:57:06.294061+00:00 33.33.33.33 2025-02-03T14:57:05.241955+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2025-02-03T14:57:06.294061+00:00 33.33.33.33 2025-02-03T14:57:05.245441+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-02-03T14:57:06.294061+00:00 33.33.33.33 2025-02-03T14:57:05.245489+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="5139" x-info="https://www.rsyslog.com"] start 2025-02-03T14:57:06.294061+00:00 33.33.33.33 2025-02-03T14:57:05.245521+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2025-02-03T14:57:06.294061+00:00 33.33.33.33 2025-02-03T14:57:05.246994+00:00 daemon-notice osdx cfgd[1642]: [1931]Completed change to active configuration 2025-02-03T14:57:06.294061+00:00 33.33.33.33 2025-02-03T14:57:05.297982+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-02-03T14:57:06.294061+00:00 33.33.33.33 2025-02-03T14:57:05.326795+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-02-03T14:57:06.294061+00:00 33.33.33.33 2025-02-03T14:57:05.423161+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-02-03T14:57:06.294061+00:00 33.33.33.33 2025-02-03T14:57:05.423326+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-02-03T14:57:06.438887+00:00 33.33.33.33 2025-02-03T14:57:05.581688+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-02-03T14:57:06.706154+00:00 33.33.33.33 2025-02-03T14:57:05.849027+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.