From 9fe376ad44a080f3a4b47723830f17f7ecf52e39 Mon Sep 17 00:00:00 2001 From: hsaly Date: Tue, 30 Jun 2020 22:32:27 -0700 Subject: [PATCH 1/3] IP SLA Testplan --- TestPlans/routing/IPSLA/IP_SLA_Testplan.md | 414 +++++++++++++++++++++ TestPlans/routing/IPSLA/Topology1.png | Bin 0 -> 19539 bytes TestPlans/routing/IPSLA/Topology2.png | Bin 0 -> 16051 bytes 3 files changed, 414 insertions(+) create mode 100644 TestPlans/routing/IPSLA/IP_SLA_Testplan.md create mode 100644 TestPlans/routing/IPSLA/Topology1.png create mode 100644 TestPlans/routing/IPSLA/Topology2.png diff --git a/TestPlans/routing/IPSLA/IP_SLA_Testplan.md b/TestPlans/routing/IPSLA/IP_SLA_Testplan.md new file mode 100644 index 000000000000..6e31f65adf66 --- /dev/null +++ b/TestPlans/routing/IPSLA/IP_SLA_Testplan.md @@ -0,0 +1,414 @@ +# SQA Test Plan +# IP SLA +# SONiC 3.0.1 Project and Buzznik Plus Release +[TOC] +# Test Plan Revision History +| Rev | Date | Author | Change Description | +|:---:|:-----------:|:------------------:|-----------------------------| +| 0.1 | 06/22/2019 | Nagappa Chincholi | Initial version | + +# List of Reviewers +| Function | Name | +|:---:|:-----------:| +| | | + +# List of Approvers +| Function | Name | Date Approved| +|:---:|:-----------:|:------------------:| +| | | | + +# Definition/Abbreviation +| **Term** | **Meaning** | +| -------- | ------------------------------- | +| ICMP | Internet Control Message Protocol | +| SLA | Service Level Agreement | +| TCP | Transmission Control Protocol | +| PBR | Policy Based Routing | + + +# Feature Overview +Services (e.g. TCP optimizer, Firewall, etc.) in the network are provisioned with some level of redundancy. And routers are required to conditionally forward traffic towards those services based on availability of the services. ICMP and TCP SLA track features provide periodic reachability check for the tracked services and conditionally install or uninstall static route(s) toward the service based on the health and liveliness of the service being tracked. + +# 1 Test Focus Areas +## 1.1 Functional Testing + - All CLI and debug commands + - Scaling with max supported IP SLA of 50 ICMP-Echo target or 50 TCP-Connect target + - Test on default and user VRFs +## 1.2 Negative Testing + - Link flaps + - Reload/kill daemon + - Withdraw/advertise routes + - Clear bgp neighbors/clear ipv4/v6 route table/clear arp/clear mac + - Warm reboot + - Fast reboot + - Config save and reload + - Stress test + +## 1.3 Scale and Performance Testing + +# 2 Topologies +## 2.1 Topology 1 +#### +![IP SLA](Topology1.PNG "Figure 1: IP SLA") +## 2.2 Topology 2 + +![IP SLA](Topology2.PNG "Figure 2: IP SLA with MLAG") + +# 3 Test Case and Objectives +## 3.1 CLI +### 3.1.1 Verify cli command to configure ip sla for icmp-echo and sub options + +| **Test ID** | **FtOpSoRoIpSlaCli001** | +|--------|:----------------| +| **Test Name** | **Verify cli command to configure ip sla for icmp-echo and sub options.** | +| **Test Setup** | **Topology1** | +| **Type** | **CLI** | +| **Steps** | **1) Verify help strings are displayed while enabling ip sla mode in cli mode
2) Verify sub options source-address, source-interface, request-data-size are availble and verify running-config** | + +### 3.1.2 Verify cli command to configure ip sla for tcp-connect and sub options + +| **Test ID** | **FtOpSoRoIpSlaCli002** | +|--------|:----------------| +| **Test Name** | **Verify cli command to configure ip sla for tcp-connect and sub options.** | +| **Test Setup** | **Topology1** | +| **Type** | **CLI** | +| **Steps** | **1) Verify help strings are displayed for ip sla sub options
2) Verify sub options source-address, source-port are availble and verify running-config** | + +### 3.1.3 Verify cli command to configure ip sla options - frequency, threshold and timeout + +| **Test ID** | **FtOpSoRoIpSlaCli003** | +|--------|:----------------| +| **Test Name** | **Verify cli command to configure ip sla for tcp-connect and sub options.** | +| **Test Setup** | **Topology1** | +| **Type** | **CLI** | +| **Steps** | **1) Verify help strings are displayed.
2) Verify options frequency, threshold ad timeout are availble and verify running-config.
3) Verify boundary values.** | + +## 3.2 Functional +### 3.2.1 Track ICMP-Echo target + +| **Test ID** | **FtOpSoRoIpSlaFt001** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | **Verify ip sla to track icmp-echo target.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip sla to track icmp-echo target
2) Map ip sla to a static route
3) Verify ip sla state
4) Verify configured/default ip sla parameters using 'show ip sla #' command.
5) Verify static route is installed if the target is reachable
6) Send L3 data traffic and verify
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts. | + +### 3.2.2 Track TCP-Connect target + +| **Test ID** | **FtOpSoRoIpSlaFt002** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | **Verify ip sla to track tcp-connect target.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip sla to track tcp-connect target
2) Map ip sla to a static route
3) Verify ip sla state
4) Verify configured/default ip sla parameters using 'show ip sla #' command.
5) Verify static route is installed if the target is reachable
6) Send L3 data traffic and verify
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured/default threshold route is reinstalled.| + +### 3.2.3 Track TCP-Connect target + +| **Test ID** | **FtOpSoRoIpSlaFt003** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | **Verify ip sla to track tcp-connect target.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip sla to track tcp-connect target. Test for both ssh tcp port 22 and bgp port 179
2) Map ip sla to a static route
3) Verify ip sla state
4) Verify configured/default ip sla parameters using 'show ip sla #' command.
5) Verify static route is installed if the target is reachable
6) Send L3 data traffic and verify
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured/default threshold route is reinstalled. | + +### 3.2.4 Switch between SLAs + +| **Test ID** | **FtOpSoRoIpSlaFt004** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | **Switch between SLAs** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure icmp-echo and tcp-connect IP SLAs
2) Map ip sla icmp-echo to a static route
3) Verify ip sla state
4) Verify static route is installed if the target is reachable.
5) Unconfigure and reconfigure tcp-connect ip sla.
6) Verify static route is installed if the target is reachable
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured/default threshold route is reinstalled.| + +### 3.2.5 ICMP-Echo target in user vrf + +| **Test ID** | **FtOpSoRoIpSlaFt005** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | **Verify icmp-echo target in user vrf.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip sla to track icmp-echo target in user defined vrf
2) Map ip sla to a static route under a vrf
3) Verify ip sla state
4) Verify configured/default ip sla parameters using 'show ip sla #' command.
5) Verify static route is installed if the target is reachable
6) Send L3 data traffic and verify
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured/default threshold route is reinstalled. | + +### 3.2.6 TCP-Connect target in user vrf + +| **Test ID** | **FtOpSoRoIpSlaFt006** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | **Verify icmp-echo target in user vrf.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip sla to track tcp-connect target in user defined vrf
2) Map ip sla to a static route under a vrf
3) Verify ip sla state
4) Verify configured/default ip sla parameters using 'show ip sla #' command.
5) Verify static route is installed if the target is able to bring up tcp connection.
6) Send L3 data traffic and verify
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured/default threshold route is reinstalled. | + + +### 3.2.7 ICMP-Echo and tcp-connect target with different frequency and threshold values + +| **Test ID** | **FtOpSoRoIpSlaFt007** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** ICMP-Echo and tcp-connect target with different frequency and threshold values.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf
2) Map ip sla to a static route under a vrf
3) Verify ip sla state
4) configure max frequency and minimum threshold value.
5) Verify icmp and tcp connect are sent at configured frequency
6) When the target is not reachable.
7) Bring down the target and verify static route is uninstalled after configured threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured threshold route is reinstalled. | + +### 3.2.8 ICMP-Echo target with source interface + +| **Test ID** | **FtOpSoRoIpSlaFt008** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | **Verify icmp-echo target with source interface configured.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip slas to track icmp-echo target in default and user defined vrf
2) Map ip sla to a static route under a vrf
3) Verify ip sla state
4) Verify with different source interfaces - Vlan, Portchannel, physical port.
5) Verify static route is installed if the target is reachable
6) Send L3 data traffic and verify
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured/default threshold route is reinstalled. | + +### 3.2.9 ICMP-Echo and TCP-Connect target with source address + +| **Test ID** | **FtOpSoRoIpSlaFt009** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | **Verify icmp-echo target with source interface configured.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip slas to track icmp-echo and tcp-connect target in default and user defined vrf
2) Map ip sla to a static route under a vrf
3) Verify ip sla state
4) Configure a source address from which target is not reachable .
5) Verify static route is not installed
6) Reconfigured valid source address and verify static route is installed.
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured/default threshold route is reinstalled. | + +### 3.2.10 ICMP-Echo target with different request-data-size + +| **Test ID** | **FtOpSoRoIpSlaFt010** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | **Verify icmp-echo target with source interface configured.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip slas to track icmp-echo target in default and user defined vrf
2) Map ip sla to a static route under a vrf
3) Verify ip sla state
4) Configure a request-data-size as 28.
5) Verify static route is installed
6) Reconfigure max request-data-size and verify static route is installed.
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured/default threshold route is reinstalled. | + +### 3.2.11 ICMP-Echo and tcp-connect target with different ttl and tos values + +| **Test ID** | **FtOpSoRoIpSlaFt011** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** ICMP-Echo and tcp-connect target with different ttl and tos values.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf
2) Map ip sla to a static route under a vrf
3) Verify ip sla state
4) configure ttl and tos values.
5) Verify static route is installed
6) Reconfigure ttl and tos and verify configured values.
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured/default threshold route is reinstalled. | + +### 3.2.12 Verify IP SLA with target reachability via default IPv6 route + +| **Test ID** | **FtOpSoRoIpSlaFt012** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** ICMP-Echo and tcp-connect target with different ttl and tos values.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf
2) Map ip sla to a static route under a vrf
3) Enable target reachability via default ipv6 route
4) verify ip sla state.
5) Verify static route is installed
6) Reconfigure reachability via IPv6 link-local and verify static route is installed.
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured/default threshold route is reinstalled. | + +### 3.2.13 Verify IP SLA with target reachability via connected and static routes + +| **Test ID** | **FtOpSoRoIpSlaFt013** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** ICMP-Echo and tcp-connect target with different ttl and tos values.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf
2) Map ip sla to a static route under a vrf
3) Enable target reachability via connected route
4) verify ip sla state.
5) Verify static route is installed
6) Reconfigure reachability via static route and verify static route is installed.
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured/default threshold route is reinstalled. | + +### 3.2.14 Verify IP SLA with target reachability via bgp and ospf routes + +| **Test ID** | **FtOpSoRoIpSlaFt014** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** ICMP-Echo and tcp-connect target with different ttl and tos values.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf
2) Map ip sla to a static route under a vrf
3) Enable target reachability via bgp route
4) verify ip sla state.
5) Verify static route is installed
6) Reconfigure reachability via ospf route and verify static route is installed.
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured/default threshold route is reinstalled. | + +### 3.2.15 Verify IP SLA with target reachability via leaked routes + +| **Test ID** | **FtOpSoRoIpSlaFt015** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** ICMP-Echo and tcp-connect target with different ttl and tos values.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf
2) Map ip sla to a static route under a vrf
3) Enable target reachability via vrf leaked routes
4) verify ip sla state.
5) Verify static route is installed
/>6) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
7) Bring back the target and verify after configured/default threshold route is reinstalled. | + +### 3.2.16 Verify ip sla history + +| **Test ID** | **FtOpSoRoIpSlaFt016** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | **Verify ip sla history** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure icmp-echo and tcp-connect IP SLAs
2) Map ip slas to static routes
3) Verify ip sla states
4) Verify static routes installed if the targets are reachable.
5) Configure user vrf routes and map to slas .
6) Flap the routes.
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Verify ip sla history is updated.| + +### 3.2.17 Verify IP SLA with MLAG + +| **Test ID** | **FtOpSoRoIpSlaFt017** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** ICMP-Echo and tcp-connect target with different ttl and tos values.** | +| **Test Setup** | **Topology2** | +| **Type** | **Functional** | +| **Steps** | 1) Configure MLAG as per topology.
2)Configure ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf via mlag nodes.
2) Map ip sla to a static route under a vrf
3) Enable target reachability via default ipv6 route
4) verify ip sla state.
5) Verify static route is installed
6) Reconfigure reachability via IPv6 link-local and verify static route is installed.
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured/default threshold route is reinstalled. | + +### 3.2.18 Verify IP SLA with ACL Config for assigning CIR/PIR + +| **Test ID** | **FtOpSoRoIpSlaFt018** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** Verify IP SLA with ACL Config for assigning CIR/PIR.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf
2) Map ip sla to a static route under a vrf
3) Configure acls, classifier and policy with CIR 1000.
4) verify ip sla state.
5) Verify static route is installed
6) Send line rate data traffic.
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured/default threshold route is reinstalled.
| + +### 3.2.19 Verify IP SLA with PBR + +| **Test ID** | **FtOpSoRoIpSlaFt019** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** Verify IP SLA with PBR.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf
2) Map ip sla to a static route under a vrf
3) Configure PBR.
4) verify ip sla state.
5) Verify static route is installed
6) Send line rate data traffic.
7) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
8) Bring back the target and verify after configured/default threshold route is reinstalled.
| + +### 3.2.20 IP SLA to configure default routes + +| **Test ID** | **FtOpSoRoIpSlaFt020** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** Verify IP SLA to install default ipv4 and ipv6 routes** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf
2) Map ip slas to default static routes under a vrf
3) verify ip sla states.
4) verify ipv4 and ipv6 static routes are installed
5) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
6) Bring back the target and verify after configured/default threshold route is reinstalled. | + +### 3.2.21 Clear IP SLA statistics + +| **Test ID** | **FtOpSoRoIpSlaFt021** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** Clear IP SLA statistcs.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf
2) Map ip sla to a static route under a vrf
3) Verify ip sla counters and history.
4) verify ip sla state.
5) Verify static route is installed
6) Use clear ip sla commands to clear statistics and history.
7) Verify counters are reset to zero and history is erased. | + +### 3.2.22 Verify debug commands for IP SLA + +| **Test ID** | **FtOpSoRoIpSlaFt022** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** Verify debug commands for IP SLA.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf
2) Map ip sla to a static route under a vrf
3) Enable IP SLA debug commands "debug iptrack" and "debug iptrack sla #"
4) verify debug logs. | + +## 3.3 Scale + +### 3.3.1 Verify max ICMP-Echo IP SLA in same vrf + +| **Test ID** | **FtOpSoRoIpSlaScale001** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | **Verify max ICMP-Echo IP SLA in same vrf ** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure max 50 icmp-echo IP SLAs
2) Map ip slas to static routes
3) Verify ip sla states
4) Verify static routes installed if the targets are reachable.
5) Flap the routes.
6) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
7) Verify ip sla history is updated. | + +### 3.3.2 Verify max ICMP-Echo IP SLA in different vrfs + +| **Test ID** | **FtOpSoRoIpSlaScale002** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | **Verify max ICMP-Echo IP SLA in different vrfs** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure max 50 icmp-echo IP SLAs
2) Map ip slas to static routes
3) Verify ip sla states
4) Verify static routes installed if the targets are reachable.
5) Flap the routes.
6) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
7) Verify ip sla history is updated. | + +### 3.3.3 Verify max TCP-Connect IP SLA in same vrf + +| **Test ID** | **FtOpSoRoIpSlaScale003** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | **Verify max TCP-Connect IP SLA in same vrf ** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure max 50 tcp-connect with ssh,bgp IP SLAs
2) Map ip slas to static routes
3) Verify ip sla states
4) Verify static routes installed if the targets are reachable.
5) Flap the routes.
6) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
7) Verify ip sla history is updated.| + +### 3.3.4 Verify max TCP-Connect IP SLA in different vrfs + +| **Test ID** | **FtOpSoRoIpSlaScale004** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | **Verify max TCP-Connect IP SLA in different vrfs** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure max 50 tcp-connect IP SLAs
2) Map ip slas to static routes
3) Verify ip sla states
4) Verify static routes installed if the targets are reachable.
5) Flap the routes.
6) Bring down the target and verify static route is uninstalled after configured/default threshold number of unsuccessful attempts.
7) Verify ip sla history is updated.| + +## 3.4 Reboot/Reload/Upgrade Test Cases +#### 3.4.1 Warm reboot + +| **Test ID** | **FtOpSoRoIpSlaTrig001** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** Warm reboot with IP sla configs.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure max ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf
2) Map ip sla to a static route under a vrf
3) Enable target reachability via default ipv6 route
4) verify ip sla state.
5) Verify static route is installed
6) Send traffic over the static route .
7) Initiate warm reboot.
8) Verify there is no traffic drop | + +#### 3.4.2 Cold reboot +| **Test ID** | **FtOpSoRoIpSlaTrig002** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** Fast reboot with ip sla configs.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure max ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf
2) Map ip sla to a static route under a vrf
3) Enable target reachability via default ipv6 route
4) verify ip sla state.
5) Verify static route is installed
6) Send traffic over the static route .
7) Initiate warm reboot.
8) Verify there is no traffic drop | + +#### 3.4.3 Config reload + +| **Test ID** | **FtOpSoRoIpSlaTrig003** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** Config reload with ip sla configs.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure max ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf
2) Map ip sla to a default vrf and user vrf static route.
3)verify ip sla state
4) Save config and initiate config reload.
5) Verify ip sla state and static route is installed after bgp daemon is up.
6) Send traffic over the static route . | + +#### 3.4.4 Docker restart + +| **Test ID** | **FtOpSoRoIpSlaTrig004** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** BGP docker restart with IP SLA configs.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure max ip slas to track icmp-echo and tcp-connect targets in default and user defined vrf
2) Map ip sla to a default vrf and user vrf static route.
3)verify ip sla state
4) Initiate bgp docker restart.
5) Verify ip sla state and static route is installed after bgp daemon is up.
6) Send traffic over the static route . | + +## 3.5 Management + +#### 3.5.1 SNMP + +#### 3.5.2 gNMI + +#### 3.5.3 REST API +##### 3.5.3.1 POST operation + +| **Test ID** | **FtOpSoRoIpSlaRest001** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** REST API POST to configure IP SLA.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Use REST POST method to configure IP SLA for ICMP-Echo and TCP-Connect. | + +##### 3.5.3.2 PATCH operation + +| **Test ID** | **FtOpSoRoIpSlaRest002** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** REST API PATCH to configure IP SLA.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Use REST PATCH method to configure IP SLA paramters like frequency, threshold, source-address etc.. | + +##### 3.5.3.3 GET operation + +| **Test ID** | **FtOpSoRoIpSlaRest003** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** REST API GET to verify all configured IP SLA paramters.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Use REST GET method to verify all configured IP SLA paramters. | + +##### 3.5.3.4 DELETE operation + +| **Test ID** | **FtOpSoRoIpSlaRest004** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** REST API DELETE to unconfigure IP SLA.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Use REST DELETE method to unconfigure IP SLA for ICMP-Echo and TCP-Connect. | +## 3.6 Stress,Scale and Performance +#### 3.6.1 Stress test IP SLA with link flap +| **Test ID** | **FtOpSoRoIpSlaStress001** | +| -------------- | :----------------------------------------------------------- | +| **Test Name** | ** Stress test IP SLA with link flap.** | +| **Test Setup** | **Topology1** | +| **Type** | **Functional** | +| **Steps** | 1) Configure IP SLA ICMP-Echo and TCP-Connect.
2) Flap route reachability tiggering static route install and unstall. Run the test for 24 hrs.
3) Verify memory and cpu utilizations before and after the test run. | + +# 4 Reference Links + + + diff --git a/TestPlans/routing/IPSLA/Topology1.png b/TestPlans/routing/IPSLA/Topology1.png new file mode 100644 index 0000000000000000000000000000000000000000..c24598acca1bfe66499ad9852463524397ff1d06 GIT binary patch literal 19539 zcmeHvc|6ql|M(lpmZZ<8tU~O5+7gBB5apPTja5l*IXkvg3YBvlL#4hEwvB8lD#hEFN)K$f2SXcyu4pg2%%jcRDf>D>?tV7_RV zL>`#>g*EM3>}$QBZC!>0xKLlgw3P^A<9vjQ&a?W;`0Knx+??R9V zQM2-hW~8-D+$zqA$kvUbNM*S{9I8Ki3x<6&4h#h?M-atRSz<_K-04>vMRyo?gqk4q zr{~8Js(1aLtK+E~l#7g)A`c=eV59K+YvNWl{}7~cKq%l&<{J^D$9UVx2;u0&VLc_p z)ntbcLf1Zb`j*MDl~V0+*5TKu(X%RU881EmZJK5Dk>ghRrq6vTIW2u;6 zGs=h*+J3_Qt2qC;nVd(moSB*FE8=OKgy+pGJdz#NKa#~uMpZc65JDMo)^attF%pyz zD-+_=cv9vg*?XSQU{_k4mMub5NFW2>agNkeW#T%bbIS!O}KYoN%YSChLL= zf_)l9K83&Au2fv*MMH6+FRLWjUj$FW@BW0Y*=H?TBaTw;f46@K?7!;@k>LJDUn)Fa z@lz1R3xlhqWv<*0c5GVr>A{jPhH^H4ETr5iI@o`9(iN}w$$)y3bJc%zl7m0JfaQ;DmG*|D z*18*ZrRB3P!gbTU1{Ka69sgE;{BhZbeN4+v1TJY&ySeJv#d$os5j2!3b=#dcfoBP8Fy&L*U6WK*XuM8(n=2|b-onUbgeq+fG z^PW1xJkR}#p|IP2OV$Y+R_U99V8^O$m9#E4^TOlY6_c#OnCg22!k%T67@D0L^K5R=03vS;&TWgBSK2mfH3A z6%kE^0=lwDB8a4EbVos@P0Deev&uVk5(y~Dd3`#S$)W$s$h4=jLiAnJVW6suG8|2u-_DqK+@9=8R?=d=vkBQzry9{x4@i>YcOKOip zN9!gq$3C`+9myM2++m5(Pm-02(?;b}nWy=&Lf?j|UwAvq`6wg9G3`OHcDi~3qp;gP zzYdg8t-o0;MQj^eh8VkCjHW8F06}*z?FCBX#`LSg2)EyF96-kT5il|;B)go-xGsc< zH){$7aO-3lu$DBXilIBSk5;!eR0wH5RlW$B>#Z1rwJv@nY^~=r7w3Dg5G1NuNr+y^ zXd4CjUF27WjZP#pFQKDq&EE*or~3y-U{ubJHounS;)#wH1S7*b>^V+BrPh7QG#2)h z)l86qeRSEZwZhbiTG>uevtOsyUTE|da!;if1Kh1uJ zl8Pb`t$;jmaPfxGE=JG%=+fCA(b3Av7%{}L(We!5-aM6r?HqFu*MjbRC$m9_x|98E z9H5Hw&&8l}tT)QHDnaPB1Fnec4sr-NZL~5m))nJW5<5<{@q0v5R8|%uI2Ri@cC^1o zjt|t7&e%3Jbad5IGyBA&fE~$9iKsdp6iv zfy}vX+yNUTx8JgF@}?Q!CNY_FA+=!6}r8@)a?Q5UqxmGEaBqxaqBYF^^C$@Z=5tX0ZqpBz+xukFRCIC4&iw0C*8`Y;~$_%5fxpiL4|tu$TE29BJG1P=-&X*E()S z(oU-p-}TcHh_;oB5RCdhomR(=E$n}<3gB{NJY*2BU)#s+n!GnRhRR}Vn|f7I3g>T< zU504yW{##Yv@QC_L-}!ccZhpo6liAaRX9rI@tRCWQ57($m8>12VqpiZ2|Apu5x z5{gZtg`$k%;-wQz78 zTU$?QxK#PM@#{70TPPPCe~J_fkQ{r}TTppY0j~@fHO^M476?V^@y#Gu0V^}|MX2WF zl?7>|&G+Q1#MdH}-KWO)ig9+}htct_tY;!rQ8N2EjK|B@I;|BMN*4A>J?V?92mr%Q zJ%04H5IwS;VcXW;o3;aJ6!^Nrk_cnBR{vd!m!*A;e#+7Yhet-9OBsw z(0p7u;+^%(dZ~YujXd z6vTSqms2tUF3A&{fGA~6D@7@XN*9NyyQ6H>IvKc_-qNS@8Ypse>`b8Ak$W!;@9UxH z_@%3g42O^NdNVB;83i$Dzg)th#XQiZCZMK~UvpW2h z#c`xEWkQbGZ$`N%k4x8Mi$tG!i|X@^pID;w2lzXzw8Nr^N6G~sbUHibIr6}esSH6F zLcN$Bg6az8R{YliqrDe?E8Hc8Xr}C7qeqgD9v9NQ+OEM19kR}ZI{-UdZw5&PoMeQ) zbbly@JTSAFL&fKEN&+Hh&RhnxKhw%<^J?U7hO;o(qjqqC2-4o${Ssx1-Q9!8c$zc^T}#!+vr(yu4l0=T}Bd<7$&b%HZ8KB>Pio=`v4S6HVO-Dzv2z?8_ z&Cjk!2pQN%GXC0WHPztgd!*S~Et_|?UH|%Wz*o!u&k1{R^w&DX_mT7-5K8b@Z;Krmt6dc%8=cl(HU0jvP=0cgE^p+Uw=dBVOQ~iU z>Dm@8l>aD7n>TXg?e7kdsu5Mrf?Q0Q;|`JG18N>TnXSo=DqcwJEUz?M{0;e)w`GDb zQdS=}w^uAc%`}5tEu^Vwx+Wle`X&%a&empnqbS8{y~cqK`k_++E~!oGsA#$R4i2Fv z2Xa5+YXjD83m2j!*;j%wK&VHv%P{*I1m7pWw$2SyPgX$ao8NX}mi6WBdu0!f5_yzI zTwN~=Vm7to_dicoCb{#7&r>DLdAR=cev4xLe|YpqG#}-T3Ve60TPopuFIWQ6ygxo7 z@V%$zt?z!t7kM@H#ZT@)EWK&h5=1j%$0t)}^lo%SCxP+|pOEm0E8!`%0Ps6+e*GSD zXf%^k!+XV?YuDQ|RwJ$}E_4XO`^bC}c&1^or8P;e0GK3#ggu(|!5o|1J?}p|a=t5W z+(J)NPKT|K0sH6)%t>f&9sRY$$-w_Z_6?N-fxW|0*&IltIXpYz^H>C-QgSW}!j{|E zg{Io>1rMUBw&})79ll3g751n0`)2EKeZId~iVWCj2_7lpw1syh&k-T%Coi-J9JxHD z)C+_CpP`fgP~#uj_jG3=l9lu(lsn6nzQ6#Uo)@-xK3 zV1mx9ZM&84#HL>5p`(&#BTzFeXBEQ2%n@>|>}@WjOx$cNS$XlZR0o`l>+Q5JZmQua z73IDNS5WljX)Z1P+&PcY(NR)t6n9UQq|Fts?Mz=;G~>&Fj6t#p7p3dQsd2EJ>4}OZ z%;0_gWml@h_%_r8wVhzdurMENoK?&C#_pKA9#U#^fxmhBT;V?8_GA_Wm(@ZB_A~TT zVJh2mvOBeOUJxqhm`}bu+0WRLRiTFC8oEQ`^2YW9sIU5qd4Mb-WN)j@iW&(;W93zZ zK4tlXpC@#7I+5esK~h$oInotU=k~>Yr(o{P45KHUP&L_QZOR$}P~wSRn{}QVFV#OS zfBBfoE6j?+E!L?;J|6OodbF(?W2*q(XP<|+Ac^Re8qZ-i%;^|evaIkw#_`+-)%q6Z ztA!D*#$25P&l4i;N)r+kiqqUy(d-$9b~xs2`#~MX`ORpX9U#TId3Ybye?e5qEusTX>n2e&SZHs^@?6uu(T{e9M3Kj zr}=LorB0*>io&JBmbviWUo3G|#cB3$H^s*F3x%1?n}O_nVm>{5lmCyOawM-XmB?u+ zB-yJHeqa&2yDyvRP$5@7uYsOYY7~zB#9OPsu6s`OVzbLft0cKc;w*Lb8${$FWgC`r zA)KGe?IbeIi$zmEk?M#RzZsd{$;qZj-Hv$a@1y*QT@obUuw*e!NStG$em@N*&8LF) zysfrrx46UHjL+LxLQ8i~wBDzu_BT}}M5$egjq#^UT$&hkP;jU-pP3MyV5;Sw_}+%G zMZnIqIzw5bGhqeIL(IW`Xo8qjY>C$bB}l{vKzg2Mk@>aA1!MEPZ6vL;WgE#;D%O9d z>B!7MOP2N*CO<3;E;jO+^UP1{^d3Xzna?kZE*P6jg{4q`F)R%tltAwLOWVCn>l_U# zPR>tHN+f#y=L3iMh1do2**a7L6TvX!+I+kcvBcerRNZJ0}Ci^pz_ESf?Zrt_n zzpc**gd!F{D)>|m%AwpNd!3sr<#JAWYPj?GSP>NJ|L!hvsZa`#Q7Iu*QZk6WCBb4f zqiAK1r}dxmxzSBZI$O$RKzS;qbI)gY99dHAuS-6^NLOdpmsBz_J#biVf|LFvTv>j< z5g&{y@_lpT>~9d-6iAV|fbuL+tM|*ot+! z1YO-0xih`73(Ga|uH_%)RKU`}-5VohVbgowfk*D42kK_s6LB*55VS%rU?K17>U(;d zSmQ4XLB8gdappq*4t>?3Gs{!Vu~G-L#6S|_qlA&1mH6m<98ZVLkXqj|`Ua_5*|pbK zZb=1j-!Fg*X-hOcbwa8N(o>2jtS=u+tyl;hmRn{^Sp# z=6r2YDB$EdeKF`}x-z=8d}sRI{)Izs=a57oAN(TeUay=Lk-Y%fs<(7B8N}If2){ff zaz0A}rLnR5eK}z)Yfq^2PRHr)Oy6-&ppEEz{6omWeHhIhzh}G@dW@Vw+tVN2;}pwK zo!TB6FC7Sy+dC(#c$+(Q;Di zdo+42Yk=Ja{x`1BM+?A{9v(0--a-gV}yD|#hUA*)@1=k#6&cQL^WVPaRk72wpH+< z{_d@->O995BbpEGhc-8U&o6<@8pl4+_d#=sn=M$jH3kUcSVMeJD)Wl$P5?0jz_QNv z2%$_vT$hr6gPg1HJ?Ak#OnWcrqK#dUI!%+-2vNU9YFeuhPX$yflV-)x6emLe9e*mz zs-*cyoy(u>Det$V*>L^F^Y$snwf9yX;|))K{WdHB7^oTajF-KW)4%Kq zcpTAzPAs7QwUy_l*T(yb=!~#sBpvHF^JHVKQzlgW#vdm@qd5i#!_e zf!kdD^tnM)z>RaeD3IJctegtE>e(;`@+4;)epz5*O8ue&n0P^*3!KNYwMI?{R2sjp ze9{9Yu6dHI(tZ4g8<50-v~vPAQ9O&0Z@%p;G-~Y9p$pL0Rnag7ka39fhH?&;vbBnP z18meJ#qc?g5l7fC6DCg7wc;Vi7?sovl_!836%k;Oz>dR__b+Jl{d;(4MFOT+FWoC5 zLB>35v-kp|`8bzmywv9GduV2$9x!~gpq*5pEKJO+{|>5GAX)s0;nkaq0BOvV*m7b93@^RV$%>|$j5011jHwNiD>9xatQic(jxDGWpg1U+z^MD&Jwd?6Y z8_F<4LW$o1wfd_~_Z47!1@;of`f;rT$4U2-80zvVKEp?#Nw8b1?+uia^Pk)l5W7_# zBqg6asxLenv;kVQ0r9m)^*V=?Kh6Rgg234RHypn5A!yV9rbSqOq z0hO~bo!nq|C5z#WWm~%4@Kh)$HaabblIa4Lre~~aPY=54>CF3#2m7nsGp@f-+hvWSjroKV!=E#TS$3<=$>fHpVyVco|j=WrR}MLn}wUIgGvpjIX7Zb ziBuGu}npr}S-zH30Htq>GXvEc_neIGC~$HSQpZS(rMxmpEGp{qv) zM{qNWc?N7ov(h+$k;Bq0y7A0+zOsh1g3~UVks0c9(|tW~1W)(CX~UUNU4ho01w1t$ zz2-6b$oUh@-@#r)g_D9q54@|+dqN$yLJ=);w@6r|m(`L+%3s@M@!%s&j22q+H zx>IN-d1yJ6Wd5xnr|u-zgYJcqVnMx8$?fy3HKJIR1Z+}{6vRN|$Q#gPIa6E-pSZOy zj}*LMH-)6r0-7vLJ9LnW55+}L*chvN8mho`1(Yhs2=3Pl`PbheA)dfXx!MdY03*!S2Lmze#Mj8?|{TK}g2&A59~< z|3rS}5>LWjhgO(h6U3CVTf73M>A00*uoc$i<-oMEBpE?X@Xh%8VYJ&#=u^X{g*SSl z1X-K7S#a9}tLidK1`OCc1*DR`$NE;I(+t`y$dlcI#}p_Tii{^) zLvzxC+e;TwIRqjed>GTJDfSc|G`X1^42A*%P=4q@jmh2%cA=;`5ChENnHmaMS0Y{z zumN*ogQ2Q@NAZegJrE9NDiQn{JwO?}$U>-v=vTjH@3a%=i4XH>2n1U6-;;Yjno*~m zYv1*T*wf>HBg}bCr7Dic(zvr-Jyi}>4@-|js;RHXEfqB9!QLRKATH=3{demcu*$Jx zj55Y6+Im94Rq?_=Xuws?r*mg05869#kG1Oc0Uv-2mGMgj&4%mOsm@S{*6p6`x$-sr zATt;3hfX==e`d41UikTlw3^@1!}^df7f zo>DA3m&jqNt>;cQJy6qFL>m)nFH>25uaQ%zp0I80fxnx4!LmkQN|IQXvs(md zZ}{c!rsNa79w+5ze(TkDHCQ*vYn2WOIw+3aYYY<Z$h_EK&15#g365%Uw1%R7ss8N>@v|G#+$PCijDjdso?(ZG1{I_w@BR} zsOXhMwsXYDQE7sTcc7>B6$OWpzOpKZT~O4CgEt>}=hPv9SkOI;%uvwa%q1+7wjD8W zV4cB31MO#a-NbA8)*V=^TKw)xNXAN?Oyi}lM2kCrgCZ0&g6yb41Sm(%6?ASH%hyw) zrdk{R4R*XPa0#ySXe?pT)Cg{JB#N+P3c*`^77CZbU^QKB&J5#373+Ptw64SCs<^66 zLk?)5rFG=!$da}L^nXhUE7mWDbT>v1CN%!%H!mrgtqY2p4%SW0_d%Q02X>$OL(y$h z;6bym9vqQ{5&$Mhe$D1ZZm%76?Yvl)X?|80C-5df`b~G8)hk8oE2yT>Du}{YFubN15+d7DQ6lD=#{n zC;?emjO%yZrPRiSUCxQxpI4qr?3`mi1>%WBc5iGWQ`(FRA}ReFMOBTzg}WhS(=m0+ zK@*qKQQV!QRq-)UAYmUSu`U^*vinFMx*1V3-Z#V^4698YGuKygy}2}SNszcXYdx^|K=IawMM6HAz#xtI~(dnfotbr#s@j`b}ia8y*Ga;){sUaLgy1OqiXT9LqF^ocSo(NOBHsQfF*fIZ{~?IFBnRpf0i);0Sl22l`a2JJTWUB(d?L{Nu!=7#?K<2k_Gnpn z0&R*isyNBwzYChF9vzL}H2eHdEz731cAuALYG_FSY|r>E-D%w}Q}VxzPI3A(0UB@MBv?n;)~8@OJhDv{xz$`SvL#bXM& z!O~p{$6oWhhF_@zZdYbAj%L>P7iIZC##$Rc14~v`v4!7_v`!q&0z~SwB!{^#Xy!%j z!ZS<-Gw(N7XJ#D;{zg-=%nrlY5w7Ya6Zd+gGWLS6cjS{V$;HHYZVP98-OVUlhKVkD zl$k!m9wB{CnM~=7CE9ZnY}5QIq@$F;R)3bacoz*Q-1{G9bru(2dP57BS7kU*+$Otj ztEHL3_5EW-5D>Ysc4yQCRntfAb`Gi%tc@-I<@{Oko$!DPoQaFeY|nC+OT5QRGGCg! z4gvyCOkF5yFi%WLJ*&<4G=XfrQId`&KhC2`**|Z9MqUeRxd6EFCsK| z?kpDR^0kXOxB_e;!HCt_3%QLi&s=U-dT@}e3Gh2T$#wB7xmH_=bR-3i0367(Fw$^L1Khq>&bdc5?vQC{V*E z^!AZnpPhT(%E2qM+Te*ucduhHI^S2cH+o9BIB!Y=spI?y-tnD;rw~wV zEd%b2_v#e2Y_&dxkHMAgyQVO^b<_naXHoFl>i9uc-eI^q@R2-+Sw{{r{y27r=4*eR zEWF~v{m5aZ$D_W;)OPIbk4`cvkNKc}_B`n7XkjX=R+zGw7{NK)kw~0+t z!Np<@%+0F3%JxP5op(E3B>0L8ocKJDHYiSJoY({fxMJY_FGlh%8`@+YZmfTYR@BVz zwnZ>m`z7Vk za^tMf%Tsf69lxn&Q0wZ#EeT#*^75p5Ov7h;IBJVjzkD!dcGB@E?_uhDhtrb}wP!h~ z3p!Zwn^u4Mf<~!hZVcodI!>`V)hF%`m2bYYMB*AiS{zb-0Y?Z49SmhO5)z=59uf4P zSJVphOWdmeA#MRxS3fY(IoU+w&i(ucj_}93V%$$7qaoZ|f0+A8$E`Y+z3amx@a7xJ zmp^!L9)ZW!<#8{c<~q&UWraXwrNY&3ikZunmd&R|A0%--J7geYwLcU1;cF4&| z@6&PSeV-zn+U_Asnw|WuDa~CeR(HzN%6?Aj)xnAv4DxGfH>p6i`U4ji9z^`@dglRU z`+-@N=?TlZscG5DC`xTHttvKLXU=!D6y2Z+FN9W0nu+Hku?U|BKb{y3p(!pgzo5>u zru<-4k322+djMD^`zN&GCE}5CsT+&jd8*#te;0Zco^@u@qUWrd{HIu*(n&D=#@Pl0 z{rLh9(vwf7U*}Et10UGLAiVFE1e(6E)

@0qYW-C$BlLUl7bZYlu3aORh;wiUhxr zF#cr!BCEJ5p|EE%?>_?JoS!A@C9eKbnUS*n6C(UP0+P`AaHsa}&pLpg85A6 zvnOf)fsqFxp6`bd^;dd*sgz{64rdco=E!I5_QQ~-6!Xsxp>wxFYi+>vQ!cRVWYQlc zaavx!f5cxJys*?wN(ey$LcJZAOCC9SKBB!J^<_G`ylv<*g4@{lO569dRL*VcSBBq6 zp?bbs0L;ft3b%TTv-5KPNRrq5X6L}u)sl9rIq}yZgbyQt==)qgBEvTppm7Ex%vsyJ z-wy*oashxgxTkT>mWr0}0mc<=yCIgiWyb**cT?VzSR)d%?KZp_1jrQH@0Ezuua=F^ zD}dIjR1(K$m|gkTqafWd#|Y+nPq9Yf!MwDkxBnbO%XKZIYU*ON=R@ua{#6e_8-Y6d z!^7WKPD7S;P(~&yD+Dc4XCBjvVDNOlN*=^n&f3d9=r~hK764y#8x1 z{1mHSQjOwjYQriye5MDQR1k#zuX!3wbX4KWN6<)LgS)ky`L3@l9Ndzf(*}6F8VZeS z2%>!jBQf6?ezclzDBx2#9pfnf;sIY4P{OP)5O>`?3;CBDn6!Ww-~Ygu;jiX7z`NFc zL_+?R3nqOYq*rJ-_JQoH;ql)hfpdKK=KUM~oQDmb+#P^F=cysM7(V}Z{f^2%@czTE m|EAyl`QIq7UEJAXuB7uf+5VATdWxutG1!0jhqS%NuKXXf#Cp&G literal 0 HcmV?d00001 diff --git a/TestPlans/routing/IPSLA/Topology2.png b/TestPlans/routing/IPSLA/Topology2.png new file mode 100644 index 0000000000000000000000000000000000000000..c0e159909d52c7f98c4efa760cb899876dc62e11 GIT binary patch literal 16051 zcmeHu2UJwelkb3vSyZA(QV~&99F-gmpdunFc~F!ABn?3%!!YWnNJa^Qpdbd2A;&?Y z0y6}Gk0fD`0fr<)5Rf>8*L}zT?)U!tfA8&{vv1#?eS6R0F!$c>s;=&;>Z)JY_1Dq9 zuzicb78DA#{nEwr*HI`A3JS%}*u(*zB%U$q1OM2ZuU|NeN^cPS0dCgcJ#*y@3Y8VQ zb@|Q)aKG8{qLDKSB{l;8*dAgx2%=Cb7cZSZqw9Wa{JXNNz$Gf7&(GmlZ#hMhz(WZ4 zkJILO6Cvj;7sItleeOd@9KSwF@~6{@Og*oJ>M6? zq7b&tX&ds0VE*(!n3M)CD_4P2_6D&{e;7sLy*dTQk$Fk*?M@@XnLpQ&gy~1&lYyMH z{qR2u^`Bj!|GU$C4RbWDp`yOkCQoAe&5Q3U<%PA&+{VA;w!*2guo&d8sTL0~)keLz zZ335;FuIFE@)A#ffI0CEwosFPitU!>YAa9kH;4B+_Wk^Bbpxk$#IQTzeZ&o1pVbPt zXzc0IZ|5fe+-%M1(<^8pVw*1Czz$xkMH;p<06+A-XcHuq5Jc&=o|-hEZW6# zB{)p#N~hFCp&AmVcTz}unP2$J^ER_u;X$i2{OfAZvfkh0qL6IA@awF{aw5!M$Y~7X zF#dP$2}m^OqpL>|HI<0^i{4H=*Tbsq;SYq(6TBzKa zc&`J-1poj4t}_2*#8R~ou}bmE2c zH4z;7ukivJxNFUCXWMP^+6q-QJq;w&k|&*Ai(Zg~Lb(#Q1n?7&OCw5CUXpe1f9qXz zROq*IZSsb(;zIXr@)Fxdt8SkNSsXpmaLTmjv3|q&HnZYS>*2UiZMv9F{- zOY%7$mxBqovWh7k%5xTeZ zDYpD(vZ{CI?%WSkw)qN07jjesItLC5cTMWYBmTR$2Q+zQRml`8lALHABU|M^tvRPS zO1z4^b&Rh>iyF=PtyLXW3<3SRQV_FH+x`40b_U3s*QKtV_BrYiUkN%s6#FMbo!A!e zjXZl)wP4vhL-y%scVWMq^iLi^8|xT&=aQ1C(fEDpGa^&CPYP?Ar+Q@d@5;8mJsyCt z5sDRtIxW06qhNR1F<&WH4!Wi4>bz($GWwqvb~~l6p75_Sd*&tJV!&tIGS+xcD)yE5 zUaoQah;+W)FmL_H+y!)ONy%%YuNrV|>n@L>MJj1R7>O@UFIS?k2&W1l8*ncV^~h@r z;Ya$1rd^$FT`!<9TKzxX2+am}E_$|7kySU(dfJ&R@_lI9c3S^^J-%cIw%+pog`Do> zjYre)7kIz0e3yJ>mUB=U8QbtY-EOdR;G@saO7D`Domaz)^{g)k&zBjzkS=QSef=}O z@&+|Rb--3*zHV(f1ga=1Gg8j=$<%zDH1>rG`PxdKhfAl~G&iUC@|{rYZHmEGvt(i@ zOMRrB#?0x}w%G4d`S%_%tTcRA7JPE9{VEX5bx;^PZ+pVjhh=`gPq9e?zBHw8hB+ef zRN_pzOB;3SL??c^Gp~R3d^OV zdUjH@Pcx-&zGA*zEX`7w?;;rl8slgmd3J=aKa{Lm$wy=bEplOUt}Zjx81sBY$&GRz&HyUF*+A{%blo^WzEMLXXjvNn^eWON>#{9%c*kZUp3@rxSD*pSLOnOLfT?EGql z{@A;~N7N{jn=)GhdO8$#%Ux0K@v*T_McK-zRuz?OND<~VUBc*x;<`$k$K>kggWKdG z2UM-LpyFl4*BTxkb^;aJ2W--AZ6nV_myMd&g;E|ZERFBJpzx5{ijS@wsONndUQ;nG zJAoSa3(oLSIaY>$o7PrfGFRO)@c9$VuchpyG_>IZjC$q*Vt$+u25NTN<{GgiE=t5r z80+r1ckhMCvWyky(QO86#g-i&UWNK5Gbb*i#$E&?E3W486w9aM8(nGFs_f;J-<{Su zv_@`h>!e?yx7)e!60Yy6hht9Q@9%irO1+AX2~MObAA2SpyRu+rD?@m<$sE3R^s1p` zk(mXQZMI}TH)0MYrGVaNy*se#sO4My{i1rSp}g$DL$UP}(=;YppdK%hV?~{cU@gnk z%V!1r+X>Vf^1{vaCm}UbT9+9u_2!vr@vWEtewW*^`SuIpqJQ4#K#&?yzK;#rBjn;i z;BxTUhLg__!$`j@xQ_6AS2ZNr>j^?|iSknV16E+8CP^T3J!$Jh>K)N+$Tcu{BjfoEshvaDTR1 zzT|U@2U=oCsP`QVB$=Pc8r6Lujcyp-AK`0lvo*(-TNKmg=SgqC?j8)!3Fp8Xmp27$F{heEvqX6VNc4&o>@fE;iC06osemy# zX8Ta~6}1MW7c)9ssjNvU0-1qOc%oX&yOZMIJ$X8p#&Lm&aA6k&-!^MKVb{B#fo(5c z%eb+wlbWG8z#I&CY_#GE@0XG*OL#P1H&^T}!)+}2e7i0j3j^J|`gPF>E3M|bcCnF<)st{`RK zIIik%Yva+$(box3WqREK^*in7lP}ryM!5#df7FQmy|N}R<;dT6Rud98W2qKvYfSQw z*-6^c;*C-_hAAEKcLbMy{u+11sV$C&ndBF(6&;^^Xj|#0p(O3%Ax;K6VhFr7gv;pH zaUY(l4Glwf<$+yasGWz^WG;D(`@QzpNw88^sp>I{Q*Pf!|5dog$tdW%Dhvsn)DLkg z(0a(Oev)H+*b8=5+f|94czSs$Gs1}z~{)I|U zN}-SKV;k#O%a~>S>PBo41n+8x1wWlUTGajKMSbeVENtlx(2u|r11t4Dd_$TKvG|YU zkd!ve4c@a9+R+*)hK>zO8D7AqkEwj5Ib2S(&q_MOaLpJEy_zTvwmMR@KUxn_jyT|& zP)At#Uaug0C(ojg1eID-K`abtQ9smIwNF456Lc7FY)pT8N)|1@Ay$W!*uzmwKs(j# zdBbvJP+^a={J7v*Kz!m!8W&WEjtlTclehXj;+6A19{VbMjbLXh$*D|We5{o#DsAhN zo|r66<5uQlQ^QY!kPmY9+m1 zVOdjQ-pxi+;n4EDJ&#b$AkRmI<@!i@)(O7KW&-0Ut*37($YnTLUKb!ezKIPUK1*Oi zVQPrRqNkj;cR$Q}V%s&_v71c5?5;*N!__^icQDN3!H#ZYnF)R`63?A&5)ZRBiYfz1 z%QZXK#nf0QTqKJgx1eHc06g#xhYcH6B`|d{JC;|M28Oa#kNzI%*izuv{S%B*Ds6uM zLe#tm&Bvp!kVnoh>j|cF&TyuKJ;2hN{h}Yx$@2QNvXP^Vt@S?hj6W|8V5%pGd}9cV za3t8bo3oLX*f&F!w7d3XbN|f(r)n{o^22k%QtW$@raRbDsyj9~`U3qR2nB32|BWkj zKO8=dWc=0;=$fm(B{~@^TKY>Y>jXzcRp}G}77}b=mv!TT*9)S>c*%tQ{9eEqyub#7 z671uBU`KU{j^hZ(#cj*>1p8<*+%|hJ7O*tX#1E*Zn6!e zh)YL+j<8gpzR~O1)J_*n$T{ff9Th=you`<`AJ2W?ug%(Obd=z5_e>>uUxRRus5GP) z%!)y(c7gfZ684*O?;IQrJL^@!LBNdL&Q#PnRR(k;)WN2jYRJw^+73u2h}mUrf;@cy zLF7VEx+CQ&P)tG{TpCSne(0S@f}lOT5U5eDIkgtCTF>*|6UJ%!TcImBOqYxOp2Rmnb!E&CJ|5OeunW?QtHo|iX2yRH|72v-Q{j#ePbxr zNFL5S@OA$_5Ua^eI3a+9`ROTF<=U43T#xxQ{pvl=Vp`rfqvbr+Gd z7e!7vy;x`v8!tl1Mt~qfZ0rt^w=Gsxy{#7JGiR24v|p`5J%>7`cBy`t&cDsGsW$&j zO3C*lqXL*4Y~^WJ=vhu(-~8wqp>-J?D7n`_S5SVWPA9z~bi>1rX$65`Z6%c*ScO+Z zTC2xYWrdEfm2d?cOM33#gNl?6(w?kVk`bv?t!VQ=5e`78JhNSiV{KcgmzyVV?rNYx zp4BV|x(Aa%ZX!x2hHuDfySw95@Euo03k zMWsF0+BXzHzg)gu@V-gp)Vv(y%FhbzWuNH>7=qU?&%~4kt{*Aw)Ty7R{f&Gvfjgtn$Y?}6S3{t_D@slgkm{)Z(mIeWR={FC5K%10WdW@Z3^>U`= z-|>L3N*?|d(RZP7H27g-y9+t%U|#?*X%s1@C6stC86@n)TdEOPZV{Z8oF8U?RQ2|s z7+tn)>5wmD#ykB|aG+^62dxgzjVhrUhw7%XU24<0%Pbrw>b&ST^GDN~Jc9Z@8@w#x z*j+6l0T1 z5r*ZO@05kV4C+E0l@ykgJ?y_{PFLfm+e&gij4Su`c5bp6)+Ur-i>47IX zbhTFQWKRk74@S(p;d4~$O6*);+66rTa88f#i>a#7JTlof8h|-vrWJzWHyCjHLRF}!=sS$~B4okM{8>dx>gvDd;~8IKG@=7v|VNtv)Ea1W{WV1#T zQ}@m*$P>vbe%pE2Zhgi6*(E4>s@{H%qqxmBIGAtmY;u8b*^`)~yy(5N2W(9WiOo^? z3t2RWA=|P~*`B%c#m_ivVZ=j_lwTtqQEa7E`L!7laJR}Nix;>)#!?m-QEl7muTD9& zE1nyAv~V{ksA>)1O$*p%X&K&*;}(*Q;#Zk8!hB*6{%O*so|N3Db1j#-F+Te*Fr{3A zra@AJ>a}T5Ot00R@ud%sj$uT4Vk8E#YXzly$b3odha~(wzEU2IY)8mw!18 zzr)?qW#B#J+!OgkH_#{LAK9@vh()i(&T9^y19KAt=SD|8#}pHKAkzVJM6Rl|H+yxm zK#9%bR4_$je9`c+uXeE2ePL|$T4kPZziT%&$maVsrOvCnZr96AcXf=@E{3^zSHGVy z&Hwyf7tznCQz69c7Vn*DIERu+{ANWhHl027_^;wc;`YPnj_#}IrT8mZ?8PTnOFdGv z2Kl{;`c7gFb_eQDpc{jz5uwmG7&wug^zx${U$l4HsuQyYJ>Tv<;P7^1!j_lyBO#Vq z9ec>x^N*HGJeCC=*0Xhl6-D;>xfvKs%Y>ehbcpj}6gB+#HqOn=IfRJ>3S2*eUo=(9o3D=;!qpE3i*nP)X%^b^ZnZh% zGZv?rd5cHh6j~GoI7zK}{ak7d=y9Lju-EdLv$Mld%F?QYW%!{xLDxaBjOsNvkW1IJ zTy+=_`l3J^RUiIRgl0<)K(IPoyo-;F$Z}4Wv_Z~V=iW1lIq#auEQSeUS?rO%MCD3d!VNA5mA5KMqz_N-4+DVNzU_p z^NdaB$gHc9mL+;LT?LO_T9CfiesCZ?QCMTR&1SqkiL9Z;#B~@Ib-!-2LFu(sf7EL+ z&1oyVOq8O`<;k8+)y^5)zUw<~@~L~!6Lj=$WR_EQfRVmjDq6@?@QV0xLLpe+&WB3{ z#hoZT-ncS&%Ix)>W#_s>>G5mEh2`3v>s3>Uzp(q=zEXGR=O3FFxVDIy{RNttGdSgrJu^KG;f6iA(6g zcX=wtFoaA&2By2lAD>_BZ@$pjJNwO4@witM=Vbc5<*S7LJi2p_;_Q=Gj>%FTFkmlN z|2{!FLUp)XgVsYyyz*4C`;M6!|7N;KsqA#=axIRVuo}O2b-e8^+r-tCzRLr_*%jK7 zp7gE73elX2dbU-!X)ed4<{KSdRwM0~E%-l(A?B8g5i&UF#)ydgk&)@TjnHhp7OCh| zK46Xe5>VNF}^fi{}%^6 zjxnlEoFWzLhD?~&d2Jd5hbJI(?H(W0F-;jknKUIiZ#^${8LV{E1p{TUBRfCANTyySY+y_0*@gmz3Ne{PyEK z6hVW7r$WyVdDD7CcPI#!d++pBwfFTJCT}%DNdyWxh{oWVebF%}J{x!GYJ1eOam>D!!Ssu^G8Ig9!V&9YU*?v? z7~B@8m!68kuf?+rznaO6UMMIMESTY-{ROU!dSO~=J{{)ko%w$98NqBwt5jVg6(GUn-zhra?p;3942 z{6_!OQqFhkBN(&|r2iZxTTSK8J#-cFs{18Z)0dDwy$<;O!{2CRG=0X6LCV@o|W3!$~Tdm`iE4ZcHk{^bSX zveK2H_!jG86&oYhFb3yTUyJF~B35xUfM3=!wO?0QQH_V6*gP_fGv?U=Y8v66DuEN;Uq~wG;{K!Li!RW=N0$ zfe<1F#_(kabUIUMNwZ8($wZhZm5)Q`x?wjNGPH+Cip0|sFoSUP0(q1g+aC~9Cz!SJ zstX!E8nEDcDC~)9zd?3#Rpxk)r-f|CzCQIJyJjyXNKf#~?*u2r=at6dVu=NxBv=f4 ztM;wOeM##86%z1V1Bv%c zS3CZ?qT>H4 zF4t0u<9>|D3MvLrsD|DJGf1=zZeVd2k+d;c82C?;zgM6-i-E-A{i{=S8Aw&3sHDxh~S3UoE0WD!Yh={3>o!#KdR+nivG$17&Ub=1kn2~3z& zkBJ6BxT%{DzTOI6+gHd~A~gpHG%)}M-m8$W9QrZ>0S%@LRLgzfrqBakB=EEEfz=FZ z5Z@aMVcqc7@?(ok5d=mm*EBNaj}=>ATNz#Xev`Rc(;sNUeK=uW-P4b=`1)Wq z1L=ufv$5E^^gFbLevj?FtB9<+Q|cc8DCMZ^r_>l=UjCl{D$4yDW_6zp*)O(kb>|e4 zqK4)$q%`UrMchi{j*qV5imtv^e2};&p7h~nV-2dHcX6AjkUo&H<_MO*&aMa-{zUEB zAL#UY>}HAQ=uM)>`T?vIXZNrm^^P4ttpOn9he6A4XF)`$W;i>SI%Pj&qWH)~6MhhU zO2r$>azaa&QNZNZ1f0@7v@Qkl zpqmU8sKYw;aK7F8q7l1hVW889U88nDeT@`Hw9OF~U?m?#42FP3);rCQc=LfRAM4Q# z;3(7vqAw)NZ|9lxR5AdLkcR(k}oyAdA$zyZ0{R7yK; zCBLle0vZgT?FO)Th`&wmxAWNymiq(a2`VxJl|RqXBks&E?e8l(mKrbKM`XQ$yJPv3 z-8?+}h4+Y%!oKmo9dU0pvGwo4TzAeYmylOX%aj|Tvqf2F-wP5m=SmPi^T4?z=pd6E ze(r$rsJ#%vRrEl}H4mn^!Iez*_Dl!wUDd9vsgMYe(|8|avLQe`OsKH~qTFiFz|lnA zz!4o@_RhXJAJz25mFXNvACPcz`vaY@iTrw{mOE*=7(Q%17;^0rRow83E4zA^42Mxx zF4ODw7zcRM8wLD8ZwhO@YtIYP?W1pRs4X}A)phvJS4~COIUSU`-P3x>t{2hY;iAP~ z~@CdDoe-oW#biHH8$5Z$C8?h!>g2o{Yb!P1G7AfY1!7V7d-U4Zg}O=Aaq`P8|h zBTqjvjV2}84xa*tO2{#v`f**7HS>Td$TXPws@%xE#9q)zu15Mx$5Q)P(ds#qeg)Wz zBn6bkG1rGG5#>}Bt!D?HnZuqE0Ct5p5i!6d1jl&q*sXXrbn-Su1;D2R(10H4dQ?U8 z;NX2RCeG1%5P}9I> z%5$=TQ%&m5N6fEW2AV+EiKs(G8I1Y)ap1K97zCk5f8trN$B9rAqxBGr8UtI8+Lx4_ zKl$&fg5q3+3*%-<3qa<8b$1?N zNce6O`0#G+wD^=(&v%VyH0D_T)skbOdyrbKY5SSSPRMy49&YRt1Z2Wcen9Aie%1uY z#R1AZEPqw*1cXdZzKLiesv4X`s%~MrnI^Uxyr6FQq1={s-*3p2!G0#)~ zoMZ11{!pCV;cfM#k1I8)CyJugPcE@?d4j&_Lo&$OQ@^k?US)+xM5ODQsgGwFfKN>6 zlfF>}E(^ix1#1UYL|hcRiRZ{E#dXDUZYGL%<6x06!Am^kU~2W`ihOv!@TtSGNa5Ne zY}*IR0ufUc)$?9=O9U=twE6daENB^{*iDOu9kizzM$S)49Y=q7b&6F}rwr<0!yHee#v8+Gsk<;St7<2vLR}eVbWNKd7Cy?ojsdjMFyH5-SUe za2M(ISjV}vky#Fkkgt`C(%Ugx*^I`lpx)^ZQyn8!?z2tOS|V#bLcJIDWl9|muvTzZ zPa&ip|0*Y!o(F4bOkV31r?e$Dja1T4C~`EN9*(~7FG{?=WlD>1Cbp-jr!|2puStgY zv7*wx(ND%rdt


h@?Pxm^^tRdJ}2ds+XwqN>hXX7u=)#S3e1W}jPBJ8O9*UgLP? zWA0LfjjM=lNg>a0eNhD^#s~ouAtCoURROfC{B z0+Tsnyf85eyrlIy8yiug^3bqkg*)8H_pT^a=zAZG|G;IR)a;Zxg`fWvj6F@0)gS)$ zbz_sw{RYLkKbwcvFDl`^6~{IGUNP)9Y@C00%Yjk>fQA(uwyJSK*1^eOWuJK9B_-ut zy31}atVf~L_qIhP)wR5XN4$Qk5+*VPJL^|N)Z5QUy4LWAOU{}nCU>@Fpl_UeLC!On za*SA|FR3Y`p8_(zrIPD|(RTA*b@_RW8vP=>l81M^4Jf@5vwl*~Xqg|JCi>GaYj`$? z2QR{Lm*YD1(E!a()81wvl4k4b>yR^7oM?`{bV+%1oF=I!9yk_#ex=&=KGh^rKh#ZR z^?Vi$lb^PFI6TcYCMaKP=x*S(^a9?4ioy-Yw1>NS1v7TF+ZfJ{z3_@l6^jkkKIC3m;C4#H!mNmr`Ga60jKjZNgR)1|| zt`wX#WZB@Cr&xJ1&G}o9G;^vfuG-}aHQ%;QSw$f8`|^bWk)ez|!>bDQc$_N!_I$?N zD5#kSm&Lvi9RGz|dja~GsVtz|tVA{~5LC@vJgoA1Ht?0|t>tgqamdnvGT^KNGEFvA z`r8;~IQHtjM*4+`>n|+56&z$lcB4ZV-FKGgA5g%s>(8`MauVmge_ox)+8pn)w&kDu z%iaqW`PKJ*+#nc7<(L?YJYJM0!a4jh$=QCZ3^;ta28z>GTAykRqn}V+m6hCxt&5_o z4T^GoIrc%X-yx0`7HaiWE8_pm$9e~QIUJ(TXs3+?8<;v~dTd*5pm8+Jg*dW77;|{} zIBrd-{xmZ_ja4craTrwJ{Zow_r7df*ce46sShLXMDhbCYmd=Z|rvs~u?i}4p4_>A< zeVv}af3G0`saHUyYYIxnI!Ot5y(a_%mqY#ah)3X0fBRNN&Dx#aCBkTSg5Y z3MpxFrjncRDKzsEMM#gB9MDYfvs3N$I;<6Bhos~C6dXf2)LvZedO}WEei72v z3k5*DD%~BY=;h`5UpTDdERdg*p2f1-RIZk|@<5 z$AdmswW*SmmKAs_d^zf9-QJ-3Rsqr}dK)drFACYK9rVXibK}i`hcmNO2%=~o5C}GI zwUJ61q`acUMc$SNxc?!yX5~N!Mtk8(tHOf&rLa#dBoMP)&D0Z^Pt3yA81j<2k&um0 zyPM*gtf~coB>T?ix|j*@R4pbWhpML(M^)llpf<^$?fI8wd_sRz_T7o4&^0HN|Ilj)8+Zk+)5D z9*gQ);+$DoY?%Cj!LNf>dx=eiSEC}TIHL^;LB4i3kkZMppsxLravN&%g}jKpMG-;! z%jP?A@t&B!ZK3rQ55QSnY~_UdOKPd>$Ij5sfqi)2#gMvJ??CN$i>27`1dp=*U-wU) zeY5WK9}BbCQ#+TrC+8+^8Hf5wt*i^#XBZkZ;E5}v6Fe~S?;L5T-)At&kZ z*FXAz=Nd-NSam~kn~l@xIVomWfl|MU14o|HsISE+s=1+7dcES zz&A0hhxc|$2D>kL@P4OC&QpC>CK9 zluM0WBN(SyUfd Date: Thu, 9 Jul 2020 00:32:25 -0700 Subject: [PATCH 2/3] Initial version of Source Intf and Vrf Support for Syslog Testplan --- .../Source Intf and Vrf Support for Syslog.md | 202 ++++++++++++++++++ ...Source Intf and Vrf Support for Syslog.png | Bin 0 -> 6207 bytes 2 files changed, 202 insertions(+) create mode 100644 TestPlans/system/Syslog_B+Enhancemnt/Source Intf and Vrf Support for Syslog.md create mode 100644 TestPlans/system/Syslog_B+Enhancemnt/Source Intf and Vrf Support for Syslog.png diff --git a/TestPlans/system/Syslog_B+Enhancemnt/Source Intf and Vrf Support for Syslog.md b/TestPlans/system/Syslog_B+Enhancemnt/Source Intf and Vrf Support for Syslog.md new file mode 100644 index 000000000000..1c88ff7bea82 --- /dev/null +++ b/TestPlans/system/Syslog_B+Enhancemnt/Source Intf and Vrf Support for Syslog.md @@ -0,0 +1,202 @@ +# SQA Test Plan +# Source Intf and Vrf Support for Syslog +# SONiC 3.1 Project and Buzznik+ Release +[TOC] + + + +# Test Plan Revision History +| Rev | Date | Author | Change Description | +|:---:|:-----------:|:------------------:|-----------------------------| +| 0.1 | 05/20/2020 | Manisha Joshi | Initial version | +| 0.2 | 07/07/2020 | Hafis Saly | Added gNMI/RestAPI test cases | + +# List of Reviewers +| Function | Name | +|:---:|:-----------:| +| | Suresh Babu | + +# List of Approvers +| Function | Name | Date Approved| +|:---:|:-----------:|:------------------:| +| | | | + +# Definition/Abbreviation +| **Term** | **Meaning** | +| -------- | ------------------------------- | +| | | + + + +# Feature Overview + +Configure switch using REST and KLISH cli to forward messages to remote syslog server. Also provide source-ip and VRF to be used while sending out syslog messages. Below is the ling for the High level design of the feature + + + +# 1 Test Focus Areas +This document provides test cases for the configuration and verification of remote syslog server using KLISH CLI + + +# 2 Topologies +## 2.1 Topology 1 + +![Dynamic](syslog.png "Topology 1") + +# 3 Test Case and Objectives +## 3.1 **CLI** +## 3.2 **Functional** +#### 3.2.1 Verify remote syslog server with physical interface as a source-interface + +| Test ID | FtOpSoRoSyslogFun001 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server with physical interface as a source-interface | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1)Configure an IPv4 address on a physical interface connected to the server 2) Configure the remote syslog server with host address as IPv4 address and physical interface as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after delete/re-add the server configuration and shut/no-shut of the interface. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | + +#### 3.2.2 Verify remote syslog server with vlan as a source-interface + +| Test ID | FtOpSoRoSyslogFun002 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server with vlan as a source-interface | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure an IPv4 address on a vlan interface connected to the server 2) Configure the remote syslog server with host address as IPv4 address and vlan as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after delete/re-add the server configuration and remove/add of the vlan. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | + +#### 3.2.3 Verify remote syslog server with portchannel as a source-interface + +| Test ID | FtOpSoRoSyslogFun003 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server with port channel as a source-interface | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure an IPv4 address on a portchannel connected to the server 2) Configure the remote syslog server with host address as IPv4 address and portchannel as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after delete/re-add the server configuration, remove/add member ports and add/delete portchannel. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | + +#### 3.2.4 Verify remote syslog server with loopback as a source-interface + +| Test ID | FtOpSoRoSyslogFun004 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server with loopback as a source-interface | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure an IPv4 address on a loopback connected to the server 2) Configure the remote syslog server with host address as IPv4 address and loopback as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after delete/re-add the server configuration and add/delete loopback. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | + +#### 3.2.5 Verify remote syslog server with physical interface as a source-interface over a user-defined VRF + +``` + +``` + +| Test ID | FtOpSoRoSyslogFun005 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server with physical interface as a source-interface over a user-defined VRF | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1)Configure an IPv4 address on a physical interface bound to a VRF 2) Configure the remote syslog server with host address as IPv4 address and physical interface as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after delete/re-add the server configuration, bind/unbind the interface and remove/add vrf. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | + +#### 3.2.6 Verify remote syslog server with vlan as a source-interface over a user-defined VRF + +| Test ID | FtOpSoRoSyslogFun006 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server with vlan as a source-interface over a user-defined VRF | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure an IPv4 address on a vlan bound to a vrf 2) Configure the remote syslog server with host address as IPv4 address and vlan as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after remove/add of the vrf and bind/unbind the vlan. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | + +#### 3.2.7 Verify remote syslog server with portchannel as a source-interface over a user-defined VRF + +| Test ID | FtOpSoRoSyslogFun07 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server with port channel as a source-interface as a source-interface over a user-defined VRF | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure an IPv4 address on a portchannel bound to a vrf 2) Configure the remote syslog server with host address as IPv4 address and portchannel as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after bind/unbind of portchannel. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | + +#### 3.2.8 Verify remote syslog server with loopback as a source-interface over user-defined VRF + +| Test ID | FtOpSoRoSyslogFun008 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server with loopback as a source-interface over user-defined VRF | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure an IPv4 address on a loopback bound to a VRF 2) Configure the remote syslog server with host address as IPv4 address and loopback as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after bind/unbind of the loopback. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | + +#### 3.2.9 Configure and verify syslog server after modifying the source-interface + +| Test ID | FtOpSoRoSyslogFun009 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server after modifying the source-interface | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure a remote syslog server using with physical interface. 2) Modify the source interface from a physical interface to a vlan followed by a portchannel and loopback | + +#### 3.2.10 Configure and verify syslog server without source-interface configuration + +| Test ID | FtOpSoRoSyslogFun0010 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server without source-interface configuration | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure a remote syslog server using logging server host ip command. 2) Verify the configuration using the show command 3) Modify the host address to a IPv6 address and reverify | + +#### 3.2.11 Configure and verify syslog server without source-interface configuration over a user-defined VRF + +| Test ID | FtOpSoRoSyslogFun0011 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server without source-interface configuration | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure a remote syslog server using logging server host ip command with the connected interface bound to a VRF. 2) Verify the configuration using the show command 3) Modify the host address to a IPv6 address and reverify 4)Modify the VRF interface and revierfy | + +## 3.3 Negative + +#### 3.3.12 Verify remote syslog server when IPv6 host address and IPv4 source-interface address + +| Test ID | FtOpSoRoSyslogFun012 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server when IPv6 host address and IPv4 source-interface address | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure a remote syslog server with IPv6 host address and IPv4 source-interface address. 2) Verify this will fail | + +#### 3.3.13 Verify remote syslog server when source-interface and vrf values do not match modifying the source-interface + +| Test ID | FtOpSoRoSyslogFun013 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify syslog server when source-interface and vrf values do not match modifying the source-interface | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure a remote syslog server using with physical interface as part of vrf-red and vrf as vrf-blue. 2) Verify this will fail | + +## 3.4 Reboot + +#### 3.4.1 Verify remote syslog server across a cold reboot + +| **Test ID** | **FtOpSoRoSyslogFun014** | +| ------------ | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server across a cold reboot | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure a remote syslog server and verify after a cold reboot | + +## 3.5 Stress,Scale and Performance + +## 3.6 Management + +### 3.6.1 SNMP +### 3.6.2 gNMI/RESTAPI + +#### Verify remote syslog server with physical interface on non default vrf as a source-interface using RESTAPI/gNMI + +| Test ID | FtOpSoRoSyslogFun001 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server with RESTAPI/gNMI OCYang call | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1)Configure an IPv4 address on a physical interface connected to the server 2) Configure the remote syslog server with host address as IPv4 address and physical interface as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after delete/re-add the server configuration and shut/no-shut of the interface. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | + + +# 4 Reference Links + +HLD link - ≠ \ No newline at end of file diff --git a/TestPlans/system/Syslog_B+Enhancemnt/Source Intf and Vrf Support for Syslog.png b/TestPlans/system/Syslog_B+Enhancemnt/Source Intf and Vrf Support for Syslog.png new file mode 100644 index 0000000000000000000000000000000000000000..cb14b5e92debe61da9be57050411b344ec934c79 GIT binary patch literal 6207 zcmdT|c{H0_yN{s*)lo}zpgQnr&00e_)IkS?7NJzC#+Ei{E2bLK9z{_@ODQU)hE_DH zWpgwX)v5_w&5ZexBd++rPb5o?SJ$ zv{UeqAOHZ^dF8Uc833?_JLLVkoeu!uiOD>=z@70tG`sXG0NHtDhCAWEtqarz019Gu zuTz=`tTiHSIlXZzx?*gVz3!ef=m77ZXR@c~S1S9cGzRPI7#%aQnAtqd zUR&>LEMD)a?e0=-J!tCPe^YXFeTH-i$ zxqF-*RX&C#E`}5l-Zo4H&5U);IW95sasL!UQ zvTY}}`hFsC0!4M=*kYH)4zgu`xW{igyM zqXK_74kRduM50irq9Le{>q-ga9rkeJ(bRnhq{2hFU&e(0lDcPe+}vSRZ;}=vD6C&E zoKbgaViMtgLk%1ey_nxY_8ZTkjdXPTTP%kU)C*j*e{v@&Yn1As6e%dN_mR5fY2!UR zO~VBxluGi+OC>-x6iJ%~8B+iDbvE<;++Igk1&UB4v+iA*B2U2Ek2^V{%()wU5jP3n z-0TnI9jYln|9jSK6Epmz4`u=zgkgU09IBOZ9GCg)Iyb1h`TRp_xNdzYhP!D&s2NG*~uh7*8Sj`}D6_%a%|m=WVJaz2|M?P4~*dSyc4cTD0hW&4>k= z4B|uhFHgW=IXVQygxnOPK8QDsV=CF?VL@s6JcqYN zEy#o(eX}s5dHtLk3S?6aM1U8CiRMu|P0J$e=2fm~8x#dl8JcBcI+vu`=z&!Xwl z!fJu&maO_+CSrpo!g6r>nXQ{;{CvX@dk9rZ4Y#Y=sy z_c~`V!&i2XRZ>Ne{|xs5`tH0F^%)rm8T}2f2=pUBX=H^BCAR`XBA)iRgTNj? zPy)si6?$=bq4~Rx=(lb7u2Xqt5vx|~t5weC3a@4ku6?ljaL2k7T5Pn10WYDl-XE5W zj6kN{q0^Lu4Mr%RRtM^N+6k1UMqBTvAx>QD;%DO};% z5BEBr0Qeni3$Jre`Fv$7lIwW1M8LpNfH-TOr+feZ!0OM_;jA=yo1g-TZr1+pqW4@h z?yNK%sWE*3&}rdepWHV0vbvjRc3Y&b%E3|s6kHL7!!4>`dJ#)1-m8zsUgUAhJGnYmr~9_N1Drk9}# z;bNY91yNonX?JncN0Tj(ueS0Q3&mw4a&PWx3r_YrtG3b%1>uEa&R;nzce*0^I5+1t zxF^)y%E#|RN5QLYpYCBEaQgyHh_+2|4^95=b>1>77&Tf!b;O+LUWn|N);&3upblf9 zpI*vvPX5G5DODH`phCfzO1~A4MQwwjE^dyFpepem`szo%<*dp5kFmMy34%R50qJZH z_4BZ{`I`+Y%~rqHqIn(`nQE7-+F>*3k6&+5W0Jv#jEbk}t-8PGIIc4qkROapiT{AB zT)vC9bUmK5BiDHqr4gRJ(QExSg(Xiw3N#4T7A9+OLtJ;&dXn!tHjvZA6Hq(8Esj<8 z5rMm|ekxhy02sJe4m~i=x2*lAKDDb#rq!*9QyiMmDN^7uP(s7;w4E2txy}2%lbJ@p zz;v=BU;UW?|LO{zF>b_`_D2cokQDY-b%3L?KS^}sKzm^3U+xGB!=^;PuPO5Q26f|x z8vgmxryicNO5ot^k~hkCuCSckXw**`t9Ak=mV6=J?(HaHLNsr>d-NC3TKGryD<#)C z)zBk{C*?1iCjqq3(-5k|*{5JAz!D3;E{LzcW{NE>I2bKxr{=Bti0h2h05s{b5xL1l zLl$jk`5^SwRVl&#$O?D!Bl2edkS__V>pkB8J|&kFx>P^-+s|lBJBRaJKVSox2%9d!EJBFRL86(hHzBeE%@v^=tVzjp)AKxPxcEm7h+ z0STiYv$)E=Jf7(`~=!SjT_sGqvZ4|La7N$o;UDBEys?vvZo)WgAuGIsz*W zxkaB+U`IE0x+rXPB+m*F049>}E8(-@?kbt6`^32V(A%fp{XkaW&#n85rL_UAeI76Z zIY@$RiNK=6f)OALTf4%mTk0MQ80_^-cMZ(z8F3J3uROA{Sy7tZ&s_gz>0c%Izs28< zq@z=j=(*k7eCV7ZZu?qAgP2r1~(YemUZcK(9MeV&>j5<)u~z+oE7-|A=moPt+;*-d=}OY1Xa0*6c@y$ zH){V@f?fOMeGDMItj2}J)a-in#|k&ISS%1)nAuFO`6*1V_orRfvne0K$FRGWrkCmNq@uZd^%^eR9kj6&<)Ut_kVTl=3B?`Li{Cv3mg z+Jl7bAavv9LobF-|02sVe(IWa#Q z@q|~Ph;%(b_OUioB}*1Yapub9AhoLzm7wHZyPi5mRu+&3D-)%2?jp|sFpm#KUp#-F z;hu>&euSk=mw97@67u|-cfTTkOjE6 zKrfuci_HzfL*kDCn&fE0RY$)qu35_mR;tkG$=RA+ry6Ys7+XfxXKVd<=MG0IiF#Lw zDZ=4hIaIpH!x~{Ocfnx5BprlU)OSkUJ*N!_Bl~=3_X-Fe(}NJK38>EPxZ;VmBnN1_ zZLa~k>1gjqH@u9kAW2k_o!NZrQCwi*2R1lQKLLrTerKh;5U~1k6GWW_)8PuE7*R++ zXzjcXzd~bX5|U-{szg2vxN@s_rMMhwWyQo+4CCQLS)0eBDTqj^ccz=#0C(5Ao;pEwj>u}Ls`lBKf=9pm%SNmyX=DAbi|#m)F-5%jex(bayq_H@53s0}v{43XYmBj8jM z`*3j1$v5C)Dl$wRmv1b&87E|Wu_HNtQQOPxD!}9zU$u(^X~$;bTyYR?hD}NT;aENv z@(ubY=7!0F<%3t3>8v<*WB-W`+T>`@xo#I)%cXb+i(spv`5)RMdgEecSopUpdETJj zkCuqw-5g8AyZ2p>B_MT6*LtUXLM6CNkOD|6Zqw4)JW5;<<5ofcqg-9s`rpmSGkn!d zmZA2gKd2n2hvYGFNhpGLG07~n*%sC!FkI^n9-P|J(E4C*)e*VqzHjNq& zvXDy6q?Cvh%eM^^GP7m=YpYPDcs8hbmX*6IjF5(67yQH#xz#jW5vSpdz>-s2*Pd)q zeO{-nH{bA-VBxk}fiHXuk&Ql!vYl_nZ=Nz%2Yg;_?OR#>yk=6<;Hv@jfqKnRD`U z%1o>59Y-(BLOv zWI;-k+-|IDfqkVI-AOaEwqF3V<2a8pAI*2~$&NPno+t<>wFG|~89%uYBAZoQ6wvJZ zTNr@#+b8)jEpNq_|;Rx0^h?4IDPF$TVDZA;zalgqI78qK=1&V^J( z)4NR{Zgkp)@gJm@RmvPm<5dWCDhaemY7GtTve8DqiYlzWzg7LZmewg9gCCgtLbeWM zED2y zqSo#QrugYXij)FMqDN)sabtyMA43=?B9BI5D1wO?Pd&l5=)`T~gF(1=V?z(_RQWtm zdezergu7Nedx!D9$B5fl4G&&hiD4@St;}D&sq$kfMLD?RQgvs{Csd`@tF-6MtH>as z`9prW4R;zk1zL6XUTyp)JfhB#xCzosb<~an zyhOTnvCHH?SD#V2(5ilyw_VJ`)R3CA76nnCFJ$RQ&jeQj)l*n$0zQ@VVE1=rDDg_;J#}#28s29J9Vg*?q zxm`*4*&1zu1xOX=$gQBQT0s{f%UYgzVtoHDIJC{YUXsTfl<<(ybsBwHO{y@=)WzFp9&aUs$x79zM2%X^v$*}-AiufY7V%;4Sb~e^ z^1ehV;7-)CVaS@7$7Pt`QeVD=^QQv$%$CKMXhVAykp^u{qjZDc${Q|hae&v4nW3&K z)$6#NoE(`Ga=Aps19>?1mOu^B;hoaV9`ljPQLE(2kKSaj1oG@rk~h|WV9vDl)$V+8 zCaAI;5qY~RCX%4{^8nC?5A@%)ytuItG9y+`_|^FvT$toyt7-P ztVgf=G~Y&~Tc(ucn~e?KZdpuKtDYrYP4&LJRo#5wF_pOj#VWDRfhuHVueUGKHcheW z*!NY_C$o05zMw*2A=+() Date: Wed, 15 Jul 2020 14:45:21 -0700 Subject: [PATCH 3/3] Taken care of the Review comments --- .../Source Intf and Vrf Support for Syslog.md | 148 ++++++++++++------ 1 file changed, 97 insertions(+), 51 deletions(-) diff --git a/TestPlans/system/Syslog_B+Enhancemnt/Source Intf and Vrf Support for Syslog.md b/TestPlans/system/Syslog_B+Enhancemnt/Source Intf and Vrf Support for Syslog.md index 1c88ff7bea82..da677da89c33 100644 --- a/TestPlans/system/Syslog_B+Enhancemnt/Source Intf and Vrf Support for Syslog.md +++ b/TestPlans/system/Syslog_B+Enhancemnt/Source Intf and Vrf Support for Syslog.md @@ -9,12 +9,13 @@ | Rev | Date | Author | Change Description | |:---:|:-----------:|:------------------:|-----------------------------| | 0.1 | 05/20/2020 | Manisha Joshi | Initial version | -| 0.2 | 07/07/2020 | Hafis Saly | Added gNMI/RestAPI test cases | +| 0.2 | 07/12/2020 | Hafis Saly | Added review comments| +| 0.3 | 07/15/2020 | Manisha Joshi | Addressed all the review comments | # List of Reviewers | Function | Name | |:---:|:-----------:| -| | Suresh Babu | +| Remote syslog with source-interface and vrf support | Suresh Babu | # List of Approvers | Function | Name | Date Approved| @@ -35,7 +36,7 @@ Configure switch using REST and KLISH cli to forward messages to remote syslog s # 1 Test Focus Areas -This document provides test cases for the configuration and verification of remote syslog server using KLISH CLI +This document provides test cases for the configuration and verification of remote syslog server using KLISH CLI and REST/OCYANG Method # 2 Topologies @@ -46,139 +47,193 @@ This document provides test cases for the configuration and verification of remo # 3 Test Case and Objectives ## 3.1 **CLI** ## 3.2 **Functional** -#### 3.2.1 Verify remote syslog server with physical interface as a source-interface +#### 3.2.1 Verify remote syslog server over management interface | Test ID | FtOpSoRoSyslogFun001 | | ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server over management interface | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure the remote syslog server with host address as management interface. 2) Verify using show logging servers command. 3) Re-verify the messages are sent after delete/re-add the server configuration and shut/no-shut of the management interface. | + +#### 3.2.2 Verify remote syslog server with physical interface as a source-interface + +| Test ID | FtOpSoRoSyslogFun002 | +| ---------- | ------------------------------------------------------------ | | Test Name | Verify remote syslog server with physical interface as a source-interface | | Test Setup | Topology1 | | Type | Functional | | Steps | 1)Configure an IPv4 address on a physical interface connected to the server 2) Configure the remote syslog server with host address as IPv4 address and physical interface as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after delete/re-add the server configuration and shut/no-shut of the interface. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | -#### 3.2.2 Verify remote syslog server with vlan as a source-interface +#### 3.2.3 Verify remote syslog server with vlan as a source-interface -| Test ID | FtOpSoRoSyslogFun002 | +| Test ID | FtOpSoRoSyslogFun003 | | ---------- | ------------------------------------------------------------ | | Test Name | Verify remote syslog server with vlan as a source-interface | | Test Setup | Topology1 | | Type | Functional | | Steps | 1) Configure an IPv4 address on a vlan interface connected to the server 2) Configure the remote syslog server with host address as IPv4 address and vlan as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after delete/re-add the server configuration and remove/add of the vlan. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | -#### 3.2.3 Verify remote syslog server with portchannel as a source-interface +#### 3.2.4 Verify remote syslog server with portchannel as a source-interface -| Test ID | FtOpSoRoSyslogFun003 | +| Test ID | FtOpSoRoSyslogFun004 | | ---------- | ------------------------------------------------------------ | | Test Name | Verify remote syslog server with port channel as a source-interface | | Test Setup | Topology1 | | Type | Functional | | Steps | 1) Configure an IPv4 address on a portchannel connected to the server 2) Configure the remote syslog server with host address as IPv4 address and portchannel as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after delete/re-add the server configuration, remove/add member ports and add/delete portchannel. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | -#### 3.2.4 Verify remote syslog server with loopback as a source-interface +#### 3.2.5 Verify remote syslog server with loopback as a source-interface -| Test ID | FtOpSoRoSyslogFun004 | +| Test ID | FtOpSoRoSyslogFun005 | | ---------- | ------------------------------------------------------------ | | Test Name | Verify remote syslog server with loopback as a source-interface | | Test Setup | Topology1 | | Type | Functional | -| Steps | 1) Configure an IPv4 address on a loopback connected to the server 2) Configure the remote syslog server with host address as IPv4 address and loopback as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after delete/re-add the server configuration and add/delete loopback. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | +| Steps | 1) Configure an IPv4 address on a loopback connected to the server 2) Configure the remote syslog server with host address as IPv4 address and loopback as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after delete/re-add the server configuration and add/delete loopback. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address 8) Modify the configuration to use ethernet/vlan interface as the source interface and repeat steps 4-4 | -#### 3.2.5 Verify remote syslog server with physical interface as a source-interface over a user-defined VRF +#### 3.2.6 Verify remote syslog server with physical interface as a source-interface over a user-defined VRF -``` - -``` - -| Test ID | FtOpSoRoSyslogFun005 | +| Test ID | FtOpSoRoSyslogFun006 | | ---------- | ------------------------------------------------------------ | | Test Name | Verify remote syslog server with physical interface as a source-interface over a user-defined VRF | | Test Setup | Topology1 | | Type | Functional | -| Steps | 1)Configure an IPv4 address on a physical interface bound to a VRF 2) Configure the remote syslog server with host address as IPv4 address and physical interface as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after delete/re-add the server configuration, bind/unbind the interface and remove/add vrf. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | +| Steps | 1)Configure an IPv4 address on a physical interface bound to a VRF 2) Configure the remote syslog server with host address as IPv4 address and physical interface as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after delete/re-add the server configuration, bind/unbind the interface and remove/add vrf. 5) Modify the address to another IPv4 address, non default syslog port and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | -#### 3.2.6 Verify remote syslog server with vlan as a source-interface over a user-defined VRF +#### 3.2.7 Verify remote syslog server with vlan as a source-interface over a user-defined VRF -| Test ID | FtOpSoRoSyslogFun006 | +| Test ID | FtOpSoRoSyslogFun007 | | ---------- | ------------------------------------------------------------ | | Test Name | Verify remote syslog server with vlan as a source-interface over a user-defined VRF | | Test Setup | Topology1 | | Type | Functional | | Steps | 1) Configure an IPv4 address on a vlan bound to a vrf 2) Configure the remote syslog server with host address as IPv4 address and vlan as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after remove/add of the vrf and bind/unbind the vlan. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | -#### 3.2.7 Verify remote syslog server with portchannel as a source-interface over a user-defined VRF +#### 3.2.8 Verify remote syslog server with portchannel as a source-interface over a user-defined VRF -| Test ID | FtOpSoRoSyslogFun07 | +| Test ID | FtOpSoRoSyslogFun008 | | ---------- | ------------------------------------------------------------ | | Test Name | Verify remote syslog server with port channel as a source-interface as a source-interface over a user-defined VRF | | Test Setup | Topology1 | | Type | Functional | -| Steps | 1) Configure an IPv4 address on a portchannel bound to a vrf 2) Configure the remote syslog server with host address as IPv4 address and portchannel as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after bind/unbind of portchannel. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | +| Steps | 1) Configure an IPv4 address on a portchannel bound to a vrf 2) Configure the remote syslog server with host address as IPv4 address and portchannel as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after bind/unbind of portchannel. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Verify Deletion of VRF is not allowed 8) Reverify the steps with ipv6 address | -#### 3.2.8 Verify remote syslog server with loopback as a source-interface over user-defined VRF +#### 3.2.9 Verify remote syslog server with loopback as a source-interface over user-defined VRF -| Test ID | FtOpSoRoSyslogFun008 | +| Test ID | FtOpSoRoSyslogFun009 | | ---------- | ------------------------------------------------------------ | | Test Name | Verify remote syslog server with loopback as a source-interface over user-defined VRF | | Test Setup | Topology1 | | Type | Functional | | Steps | 1) Configure an IPv4 address on a loopback bound to a VRF 2) Configure the remote syslog server with host address as IPv4 address and loopback as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after bind/unbind of the loopback. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | -#### 3.2.9 Configure and verify syslog server after modifying the source-interface +#### 3.2.10 Configure and verify syslog server after modifying the source-interface -| Test ID | FtOpSoRoSyslogFun009 | +| Test ID | FtOpSoRoSyslogFun010 | | ---------- | ------------------------------------------------------------ | | Test Name | Verify remote syslog server after modifying the source-interface | | Test Setup | Topology1 | | Type | Functional | | Steps | 1) Configure a remote syslog server using with physical interface. 2) Modify the source interface from a physical interface to a vlan followed by a portchannel and loopback | -#### 3.2.10 Configure and verify syslog server without source-interface configuration +#### 3.2.11 Configure and verify syslog server with non default remote port configuration -| Test ID | FtOpSoRoSyslogFun0010 | +| Test ID | FtOpSoRoSyslogFun0011 | | ---------- | ------------------------------------------------------------ | | Test Name | Verify remote syslog server without source-interface configuration | | Test Setup | Topology1 | | Type | Functional | -| Steps | 1) Configure a remote syslog server using logging server host ip command. 2) Verify the configuration using the show command 3) Modify the host address to a IPv6 address and reverify | +| Steps | 1) Configure a remote syslog server using a non default remote-port using logging server host ip command. 2) Verify the configuration using the show command | -#### 3.2.11 Configure and verify syslog server without source-interface configuration over a user-defined VRF +#### 3.2.12 Configure and verify syslog server without source-interface configuration over a user-defined VRF -| Test ID | FtOpSoRoSyslogFun0011 | +| Test ID | FtOpSoRoSyslogFun0012 | | ---------- | ------------------------------------------------------------ | | Test Name | Verify remote syslog server without source-interface configuration | | Test Setup | Topology1 | | Type | Functional | | Steps | 1) Configure a remote syslog server using logging server host ip command with the connected interface bound to a VRF. 2) Verify the configuration using the show command 3) Modify the host address to a IPv6 address and reverify 4)Modify the VRF interface and revierfy | +#### 3.2.13 Configure and verify syslog server over a management VRF + +| Test ID | FtOpSoRoSyslogFun0013 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server over a management VRF | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure a remote syslog server using logging server host ip command with the management interface bound to management VRF. 2) Verify the configuration using the show command 3) Modify the host address to a IPv6 address and reverify | + +#### 3.2.14 Configure and verify syslog server over management interface with DHCP enabled + +| Test ID | FtOpSoRoSyslogFun0014 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server over a management VRF with DHCP enabled | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure a remote syslog server using logging server host ip command with the management interface where the IP is from a DHCP server. 2) Verify the configuration using the show command 3) Modify the host address to a IPv6 address and reverify | + +## + ## 3.3 Negative -#### 3.3.12 Verify remote syslog server when IPv6 host address and IPv4 source-interface address +#### 3.3.15 Verify remote syslog server with IPv6 host address and IPv4 source-interface address -| Test ID | FtOpSoRoSyslogFun012 | +| Test ID | FtOpSoRoSyslogFun015 | | ---------- | ------------------------------------------------------------ | -| Test Name | Verify remote syslog server when IPv6 host address and IPv4 source-interface address | +| Test Name | Verify remote syslog server with IPv6 host address and IPv4 source-interface address | | Test Setup | Topology1 | | Type | Functional | | Steps | 1) Configure a remote syslog server with IPv6 host address and IPv4 source-interface address. 2) Verify this will fail | -#### 3.3.13 Verify remote syslog server when source-interface and vrf values do not match modifying the source-interface +#### 3.3.16 Verify remote syslog server with mismatched source-interface and vrf values + +| Test ID | FtOpSoRoSyslogFun016 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server with mismatched source-interface and vrf values | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure a remote syslog server using with physical interface as part of Vrf-red and Vrf-blue in the remote server combination. 2) Verify this will fail | + +#### 3.3.17 Verify remote syslog server without IP in source-interface + +| Test ID | FtOpSoRoSyslogFun017 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Verify remote syslog server without IP in source interface | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure a remote syslog server without IP source-interface. 2) Verify this will fail 3) Try adding a non-existing vlan/portchannel as source-interface and verify it will fail | + +#### 3.3.18 Delete a vrf when remote syslog server is configured with it -| Test ID | FtOpSoRoSyslogFun013 | +| Test ID | FtOpSoRoSyslogFun018 | | ---------- | ------------------------------------------------------------ | -| Test Name | Verify syslog server when source-interface and vrf values do not match modifying the source-interface | +| Test Name | Delete a vrf when remote syslog server is configured with it | | Test Setup | Topology1 | | Type | Functional | -| Steps | 1) Configure a remote syslog server using with physical interface as part of vrf-red and vrf as vrf-blue. 2) Verify this will fail | +| Steps | 1) Configure a remote syslog server using with physical interface as part of Vrf-red and Vrf-Red in the remote server combination. 2) Unbind the physical interface/delete the Vrf and verify. 3)This should fail | + +#### 3.3.19 Delete a source-interface when remote syslog server is configured with it + +| Test ID | FtOpSoRoSyslogFun019 | +| ---------- | ------------------------------------------------------------ | +| Test Name | Delete a source-interface when remote syslog server is configured with it | +| Test Setup | Topology1 | +| Type | Functional | +| Steps | 1) Configure a remote syslog server using with vlan/portchannel as source-interface. 2) Delete the vlan and verify. 3) Delete the portchannel and verify 4) This should fail | + +## ## 3.4 Reboot -#### 3.4.1 Verify remote syslog server across a cold reboot +#### 3.4.1 Verify multiple remote syslog server across a cold reboot -| **Test ID** | **FtOpSoRoSyslogFun014** | +| **Test ID** | **FtOpSoRoSyslogFun020** | | ------------ | ------------------------------------------------------------ | | Test Name | Verify remote syslog server across a cold reboot | | Test Setup | Topology1 | | Type | Functional | -| Steps | 1) Configure a remote syslog server and verify after a cold reboot | +| Steps | 1) Configure multiple syslog servers with multiple configurations like with/without source-interface, with/without VRF 2) Verify the show running config and verify the functionality 3) Verify after a cold reboot that the configs are saved | ## 3.5 Stress,Scale and Performance @@ -187,15 +242,6 @@ This document provides test cases for the configuration and verification of remo ### 3.6.1 SNMP ### 3.6.2 gNMI/RESTAPI -#### Verify remote syslog server with physical interface on non default vrf as a source-interface using RESTAPI/gNMI - -| Test ID | FtOpSoRoSyslogFun001 | -| ---------- | ------------------------------------------------------------ | -| Test Name | Verify remote syslog server with RESTAPI/gNMI OCYang call | -| Test Setup | Topology1 | -| Type | Functional | -| Steps | 1)Configure an IPv4 address on a physical interface connected to the server 2) Configure the remote syslog server with host address as IPv4 address and physical interface as source interface. 3) Verify using show logging servers command. 4) Re-verify the messages are sent after delete/re-add the server configuration and shut/no-shut of the interface. 5) Modify the address to another IPv4 address and verify the server picks up the address 6) Capture the packets using tcpdump and verify 7) Reverify the steps with ipv6 address | - # 4 Reference Links