Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2025-02-19 20:11:45.467059 daemon-err , zebra[336654]:  [YA619-S7J5M][EC 4043309075] Failed to uninstall Nexthop ID (1803) from the kernel
2025-02-19 20:11:45.697364 user-err , ERROR:  Dissociating VRF from service: cnm
2025-02-19 20:11:45.809322 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 519
2025-02-19 20:11:45.809409 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 519
2025-02-19 20:12:21.934451 user-err , ERROR:  Dissociating VRF from service: cnm
2025-02-19 20:12:22.022176 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 520
2025-02-19 20:12:22.022248 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 520
2025-02-19 20:12:55.923585 user-err , ERROR:  Dissociating VRF from service: cnm
2025-02-19 20:12:56.001985 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 521
2025-02-19 20:12:56.002064 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 521
2025-02-19 20:13:30.836004 user-err , ERROR:  Dissociating VRF from service: cnm
2025-02-19 20:13:30.941387 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 523
2025-02-19 20:13:30.941488 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 523
2025-02-19 20:13:31.049157 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 522
2025-02-19 20:13:31.049260 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 522
2025-02-19 20:14:06.706328 user-err , ERROR:  Dissociating VRF from service: cnm
2025-02-19 20:14:06.820831 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 525
2025-02-19 20:14:06.820923 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 525
2025-02-19 20:14:06.904630 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 524
2025-02-19 20:14:06.904711 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 524
2025-02-19 20:15:48.826784 daemon-err , zebra[336654]:  [HSYZM-HV7HF] Extended Error: Carrier for nexthop device is down
2025-02-19 20:15:48.826918 daemon-err , zebra[336654]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is down, type=RTM_NEWNEXTHOP(104), seq=4452, pid=3671368743
2025-02-19 20:15:48.826964 daemon-err , zebra[336654]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1928[if 529]) into the kernel
2025-02-19 20:16:56.788945 user-err , ERROR:  Dissociating VRF from service: cnm
2025-02-19 20:16:56.884685 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 532
2025-02-19 20:16:56.884756 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 532
2025-02-19 20:17:31.743740 user-err , ERROR:  Dissociating VRF from service: cnm
2025-02-19 20:17:31.827814 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 535
2025-02-19 20:17:31.827902 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 535
2025-02-19 20:18:05.909449 user-err , ERROR:  Dissociating VRF from service: cnm
2025-02-19 20:18:06.021375 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 538
2025-02-19 20:18:06.021446 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 538
2025-02-19 20:18:06.111194 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 539
2025-02-19 20:18:06.111477 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 539
2025-02-19 20:18:41.679251 user-err , ERROR:  Dissociating VRF from service: cnm
2025-02-19 20:18:41.783256 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 541
2025-02-19 20:18:41.783343 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 541
2025-02-19 20:18:41.887273 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 542
2025-02-19 20:18:41.887353 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 542
2025-02-19 20:22:34.788684 daemon-err , cfgd[1448]:  External python command [op.pki scep info CSR] finished with status 1
2025-02-19 20:22:55.028081 daemon-err , cfgd[1448]:  External python command [op.pki scep info CSR] finished with status 1
2025-02-19 20:22:57.289088 user-err , scep_controller:  Failed to get CA certificate for CSR 'CSR' libcurl request failed [28]: Operation timed out after 30001 milliseconds with 0 bytes received did not receive a valid SCEP response: HTTP 0
2025-02-19 20:23:22.841473 daemon-err , modulelauncher[469767]:  osdx.utils.xos cmd error: swanctl -q
2025-02-19 20:23:22.841545 daemon-err , modulelauncher[469767]:  Command 'swanctl -q' returned non-zero exit status 22.
2025-02-19 20:23:22.907049 daemon-err , cfgd[1448]:  External python command [op.pki scep info CSR] finished with status 1
2025-02-19 20:25:04.421063 daemon-err , zebra[336654]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: No such file or directory, type=RTM_DELNEXTHOP(105), seq=4897, pid=3671368743
2025-02-19 20:25:04.421307 daemon-err , zebra[336654]:  [YA619-S7J5M][EC 4043309075] Failed to uninstall Nexthop ID (2125) from the kernel
2025-02-19 20:25:11.605302 daemon-err , zebra[336654]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: No such file or directory, type=RTM_DELNEXTHOP(105), seq=4911, pid=3671368743
2025-02-19 20:25:11.605379 daemon-err , zebra[336654]:  [YA619-S7J5M][EC 4043309075] Failed to uninstall Nexthop ID (2129) from the kernel
2025-02-19 20:25:11.728950 user-err , ERROR:  Dissociating VRF from service: cnm
2025-02-19 20:25:11.818678 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 548
2025-02-19 20:25:11.818742 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 548
2025-02-19 20:26:38.328205 user-err , ERROR:  Dissociating VRF from service: cnm
2025-02-19 20:26:38.396443 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 549
2025-02-19 20:26:38.396509 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 549
2025-02-19 20:27:39.182367 daemon-err , zebra[336654]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: No such file or directory, type=RTM_DELNEXTHOP(105), seq=5017, pid=3671368743
2025-02-19 20:27:39.182459 daemon-err , zebra[336654]:  [YA619-S7J5M][EC 4043309075] Failed to uninstall Nexthop ID (2179) from the kernel
2025-02-19 20:27:47.696697 user-err , ERROR:  Dissociating VRF from service: cnm
2025-02-19 20:27:47.791980 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LOC in VRF 551
2025-02-19 20:27:47.792089 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LOC in VRF 551
2025-02-19 20:27:47.908017 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF AP in VRF 550
2025-02-19 20:27:47.908098 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF AP in VRF 550
2025-02-19 20:27:48.025247 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 552
2025-02-19 20:27:48.025318 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 552
2025-02-19 20:28:09.393549 user-err , ERROR:  Dissociating VRF from service: cnm
2025-02-19 20:28:09.465743 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LOC in VRF 555
2025-02-19 20:28:09.465798 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LOC in VRF 555
2025-02-19 20:28:09.573682 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF AP in VRF 554
2025-02-19 20:28:09.573789 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF AP in VRF 554
2025-02-19 20:28:09.669788 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 556
2025-02-19 20:28:09.669840 daemon-err , staticd[336659]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 556
2025-02-19 20:33:54.665389 authpriv-err , login[479238]:  pam_mail(login:session): pam_putenv: delete non-existent entry; MAIL
2025-02-19 20:37:53.223345 user-err , OSDxCLI:   Session idle timeout reached. Closing session
2025-02-19 20:38:22.968783 user-err , OSDxCLI:   Session idle timeout reached. Closing session
2025-02-19 20:38:51.146839 user-err , OSDxCLI:   Session idle timeout reached. Closing session
2025-02-19 20:39:50.860575 user-err , OSDxCLI:  Unable to open config file /etc/aaa/tacacs/acct-tacgroup1: No such file or directory
2025-02-19 20:39:59.147220 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-02-19 20:39:59.309642 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-02-19 20:40:15.204672 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-02-19 20:40:28.471369 daemon-err , cfgd[1448]:  [ interfaces ethernet eth0 alarm down ]
2025-02-19 20:40:28.471433 daemon-err , cfgd[1448]:  \"system alarm ALARM_TO_TEST\" does not exist
2025-02-19 20:40:28.471530 daemon-err , cfgd[1448]:  Commit validation failed
2025-02-19 20:40:28.473685 daemon-err , cfgd[1448]:  [483587]Command output: [ interfaces ethernet eth0 alarm down ] \"system alarm ALARM_TO_TEST\" does not exist Commit validation failed
2025-02-19 20:41:01.116487 daemon-err , cfgd[1448]:  [484200]Command output: File name reserved Value validation failed
2025-02-19 20:41:11.029711 daemon-notice , cfgd[1448]:  [484200]Completed change to active configuration
2025-02-19 20:41:11.036252 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-02-19 20:41:11.113988 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19 20:41:11.309301 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2025-02-19 20:41:23.351276 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2025-02-19 20:41:34.414440 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.236 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.236/0.236/0.236/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-19T20:41:46.238491+00:00 10.215.168.64  2025-02-19T20:41:45.557062+00:00 daemon-notice osdx cfgd[1448]:  [484200]Completed change to active configuration
2025-02-19T20:41:46.310559+00:00 10.215.168.64  2025-02-19T20:41:45.629552+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-19T20:41:46.420985+00:00 10.215.168.64  2025-02-19T20:41:45.737231+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19T20:41:46.728798+00:00 10.215.168.64  2025-02-19T20:41:46.047987+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-02-19T20:41:46.902369+00:00 10.215.168.64  2025-02-19T20:41:46.221471+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.350 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.350/0.350/0.350/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-19T20:41:47.586742+00:00 10.215.168.64  2025-02-19T20:41:46.906168+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-02-19T20:41:48.149910+00:00 10.215.168.64  2025-02-19T20:41:47.469302+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-02-19T20:41:48.181072+00:00 10.215.168.64  2025-02-19T20:41:47.500378+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-02-19T20:41:50.101286+00:00 10.215.168.64  2025-02-19T20:41:49.420551+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2025-02-19T20:41:50.816891+00:00 10.215.168.64  2025-02-19T20:41:50.136154+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-02-19T20:41:50.950061+00:00 10.215.168.64  2025-02-19T20:41:50.269451+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-02-19T20:41:51.131755+00:00 10.215.168.64  2025-02-19T20:41:50.443736+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-02-19T20:41:51.292008+00:00 10.215.168.64  2025-02-19T20:41:50.605849+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-02-19T20:41:59.164642+00:00 10.215.168.64  2025-02-19T20:41:58.349094+00:00 daemon-notice osdx cfgd[1448]:  [484200]Completed change to active configuration
2025-02-19T20:41:59.224167+00:00 10.215.168.64  2025-02-19T20:41:58.408692+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-19T20:41:59.278146+00:00 10.215.168.64  2025-02-19T20:41:58.459156+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19T20:41:59.829603+00:00 10.215.168.64  2025-02-19T20:41:59.013566+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-02-19T20:41:59.969065+00:00 10.215.168.64  2025-02-19T20:41:59.153162+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.211 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.211/0.211/0.211/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-19T20:42:00.635168+00:00 10.215.168.64  2025-02-19T20:41:59.819827+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-02-19T20:42:00.952631+00:00 10.215.168.64  2025-02-19T20:42:00.137285+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-02-19T20:42:01.026324+00:00 10.215.168.64  2025-02-19T20:42:00.205415+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-02-19T20:42:03.055562+00:00 10.215.168.64  2025-02-19T20:42:02.240188+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2025-02-19T20:42:03.778867+00:00 10.215.168.64  2025-02-19T20:42:02.963123+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-02-19T20:42:03.936919+00:00 10.215.168.64  2025-02-19T20:42:03.120883+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-02-19T20:42:04.133045+00:00 10.215.168.64  2025-02-19T20:42:03.307923+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-02-19T20:42:04.263379+00:00 10.215.168.64  2025-02-19T20:42:03.448070+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-02-19T20:42:12.048401+00:00 10.215.168.64  2025-02-19T20:42:11.723900+00:00 daemon-notice osdx cfgd[1448]:  [484200]Completed change to active configuration
2025-02-19T20:42:12.092764+00:00 10.215.168.64  2025-02-19T20:42:11.767912+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-19T20:42:12.124376+00:00 10.215.168.64  2025-02-19T20:42:11.800099+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19T20:42:12.345421+00:00 10.215.168.64  2025-02-19T20:42:12.020767+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-02-19T20:42:12.469051+00:00 10.215.168.64  2025-02-19T20:42:12.144922+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.233 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.233/0.233/0.233/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-19T20:42:23.713050+00:00 33.33.33.33  2025-02-19T20:42:22.963948+00:00 daemon-notice osdx cfgd[1448]:  [484200]Completed change to active configuration
2025-02-19T20:42:23.778825+00:00 33.33.33.33  2025-02-19T20:42:23.033164+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-19T20:42:23.828981+00:00 33.33.33.33  2025-02-19T20:42:23.082932+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19T20:42:24.156870+00:00 33.33.33.33  2025-02-19T20:42:23.413753+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-02-19T20:42:24.306980+00:00 33.33.33.33  2025-02-19T20:42:23.563701+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.201 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.201/0.201/0.201/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-19T20:42:25.117082+00:00 33.33.33.33  2025-02-19T20:42:24.348162+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-02-19T20:42:25.533171+00:00 33.33.33.33  2025-02-19T20:42:24.787559+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-02-19T20:42:25.564509+00:00 33.33.33.33  2025-02-19T20:42:24.821325+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-02-19T20:42:27.187711+00:00 33.33.33.33  2025-02-19T20:42:26.444373+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2025-02-19T20:42:27.848317+00:00 33.33.33.33  2025-02-19T20:42:27.105190+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-02-19T20:42:27.972990+00:00 33.33.33.33  2025-02-19T20:42:27.229917+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-02-19T20:42:28.106622+00:00 33.33.33.33  2025-02-19T20:42:27.363539+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-02-19T20:42:28.253134+00:00 33.33.33.33  2025-02-19T20:42:27.507977+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-02-19T20:42:35.550501+00:00 33.33.33.33  2025-02-19T20:42:35.339282+00:00 daemon-notice osdx cfgd[1448]:  [484200]Completed change to active configuration
2025-02-19T20:42:35.550501+00:00 33.33.33.33  2025-02-19T20:42:35.339601+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2025-02-19T20:42:35.601516+00:00 33.33.33.33  2025-02-19T20:42:35.390701+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-19T20:42:35.639752+00:00 33.33.33.33  2025-02-19T20:42:35.429037+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19T20:42:36.187789+00:00 33.33.33.33  2025-02-19T20:42:35.976881+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-02-19T20:42:36.286436+00:00 33.33.33.33  2025-02-19T20:42:36.075423+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.507 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.507/0.507/0.507/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-19T20:42:48.000144+00:00 10.215.168.64  2025-02-19T20:42:46.840226+00:00 daemon-notice osdx cfgd[1448]:  [484200]Completed change to active configuration
2025-02-19T20:42:48.045217+00:00 10.215.168.64  2025-02-19T20:42:46.890200+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-19T20:42:48.045217+00:00 10.215.168.64  2025-02-19T20:42:46.964625+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19T20:42:48.045217+00:00 10.215.168.64  2025-02-19T20:42:47.179950+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-02-19T20:42:48.045217+00:00 10.215.168.64  2025-02-19T20:42:47.237231+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-02-19T20:42:48.045217+00:00 10.215.168.64  2025-02-19T20:42:47.237326+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-02-19T20:42:48.250242+00:00 10.215.168.64  2025-02-19T20:42:47.506269+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=1.49 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 1.494/1.494/1.494/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-19T20:43:03.015795+00:00 33.33.33.33  2025-02-19T20:43:00.295324+00:00 daemon-notice osdx cfgd[1448]:  [484200]Completed change to active configuration
2025-02-19T20:43:03.060156+00:00 33.33.33.33  2025-02-19T20:43:00.391227+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-19T20:43:03.060156+00:00 33.33.33.33  2025-02-19T20:43:00.520021+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19T20:43:03.060156+00:00 33.33.33.33  2025-02-19T20:43:00.929564+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-02-19T20:43:03.060156+00:00 33.33.33.33  2025-02-19T20:43:02.297292+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-02-19T20:43:03.060156+00:00 33.33.33.33  2025-02-19T20:43:02.297404+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-02-19T20:43:03.243119+00:00 33.33.33.33  2025-02-19T20:43:02.563636+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.