Syslog

Test suite to check syslog

Test Syslog

Description

Change the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog global level info

Step 2: Set the following configuration in DUT0:

set system host-name New-hostname

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

daemon-info.*Changed host name to 'New-hostname'
Show output
2023-11-23 23:44:24.252117 auth-err , sshd[18942]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2023-11-23 23:44:44.653556 authpriv-err , login[18954]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2023-11-23 23:44:44.653781 authpriv-err , login[18954]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2023-11-23 23:44:49.040680 daemon-err , modulelauncher[18985]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2023-11-23 23:44:49.040735 daemon-err , modulelauncher[18985]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2023-11-23 23:44:49.046214 daemon-err , modulelauncher[18985]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2023-11-23 23:44:49.046271 daemon-err , modulelauncher[18985]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2023-11-23 23:44:49.555335 authpriv-err , sshd[19078]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2023-11-23 23:44:49.555527 authpriv-err , sshd[19078]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2023-11-23 23:44:49.978662 authpriv-err , login[19118]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2023-11-23 23:44:49.979025 authpriv-err , login[19118]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2023-11-23 23:44:51.638231 daemon-err , modulelauncher[19174]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2023-11-23 23:44:51.638296 daemon-err , modulelauncher[19174]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2023-11-23 23:44:51.642835 daemon-err , modulelauncher[19174]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2023-11-23 23:44:51.642886 daemon-err , modulelauncher[19174]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2023-11-23 23:44:51.648075 daemon-err , modulelauncher[19174]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2023-11-23 23:44:51.648127 daemon-err , modulelauncher[19174]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2023-11-23 23:44:51.653379 daemon-err , modulelauncher[19174]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2023-11-23 23:44:51.653429 daemon-err , modulelauncher[19174]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2023-11-23 23:44:52.057319 authpriv-err , sshd[19208]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2023-11-23 23:44:52.057515 authpriv-err , sshd[19208]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2023-11-23 23:45:12.469678 authpriv-err , login[19222]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2023-11-23 23:45:12.469830 authpriv-err , login[19222]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2023-11-23 23:45:18.315166 daemon-err , modulelauncher[19251]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2023-11-23 23:45:18.315219 daemon-err , modulelauncher[19251]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2023-11-23 23:45:18.320711 daemon-err , modulelauncher[19251]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2023-11-23 23:45:18.320786 daemon-err , modulelauncher[19251]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2023-11-23 23:45:18.327905 daemon-err , modulelauncher[19251]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2023-11-23 23:45:18.327986 daemon-err , modulelauncher[19251]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2023-11-23 23:45:18.334718 daemon-err , modulelauncher[19251]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2023-11-23 23:45:18.334786 daemon-err , modulelauncher[19251]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2023-11-23 23:45:18.845286 authpriv-err , sshd[19313]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2023-11-23 23:45:18.845435 authpriv-err , sshd[19313]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2023-11-23 23:45:19.346863 authpriv-err , login[19353]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2023-11-23 23:45:19.347050 authpriv-err , login[19353]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2023-11-23 23:45:21.291894 daemon-err , modulelauncher[19411]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2023-11-23 23:45:21.291954 daemon-err , modulelauncher[19411]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2023-11-23 23:45:21.296395 daemon-err , modulelauncher[19411]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2023-11-23 23:45:21.296447 daemon-err , modulelauncher[19411]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2023-11-23 23:45:21.303242 daemon-err , modulelauncher[19411]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2023-11-23 23:45:21.303314 daemon-err , modulelauncher[19411]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2023-11-23 23:45:21.310450 daemon-err , modulelauncher[19411]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2023-11-23 23:45:21.310532 daemon-err , modulelauncher[19411]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2023-11-23 23:45:21.801691 authpriv-err , sshd[19445]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2023-11-23 23:45:21.801886 authpriv-err , sshd[19445]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2023-11-23 23:45:42.183619 authpriv-err , login[19454]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2023-11-23 23:45:42.183835 authpriv-err , login[19454]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2023-11-23 23:45:49.626099 daemon-err , staticd[1039]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 254
2023-11-23 23:45:49.626191 daemon-err , staticd[1039]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 254
2023-11-23 23:46:03.170043 daemon-err , modulelauncher[20193]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0
2023-11-23 23:46:03.170105 daemon-err , modulelauncher[20193]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9
2023-11-23 23:46:03.174355 daemon-err , modulelauncher[20193]:  osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5
2023-11-23 23:46:03.174406 daemon-err , modulelauncher[20193]:  Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9
2023-11-23 23:46:03.181157 daemon-err , modulelauncher[20193]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15
2023-11-23 23:46:03.181213 daemon-err , modulelauncher[20193]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9
2023-11-23 23:46:11.028794 daemon-err , modulelauncher[20537]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0
2023-11-23 23:46:11.028844 daemon-err , modulelauncher[20537]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9
2023-11-23 23:46:11.033252 daemon-err , modulelauncher[20537]:  osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5
2023-11-23 23:46:11.033298 daemon-err , modulelauncher[20537]:  Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9
2023-11-23 23:46:11.040124 daemon-err , modulelauncher[20537]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15
2023-11-23 23:46:11.040179 daemon-err , modulelauncher[20537]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9
2023-11-23 23:46:12.439531 daemon-err , modulelauncher[20682]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0
2023-11-23 23:46:12.439582 daemon-err , modulelauncher[20682]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9
2023-11-23 23:46:12.444157 daemon-err , modulelauncher[20682]:  osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5
2023-11-23 23:46:12.444207 daemon-err , modulelauncher[20682]:  Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9
2023-11-23 23:46:12.449826 daemon-err , modulelauncher[20682]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15
2023-11-23 23:46:12.449882 daemon-err , modulelauncher[20682]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9
2023-11-23 23:47:03.409714 daemon-err , modulelauncher[22225]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2023-11-23 23:47:03.409783 daemon-err , modulelauncher[22225]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2023-11-23 23:47:03.417229 daemon-err , modulelauncher[22225]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2023-11-23 23:47:03.417281 daemon-err , modulelauncher[22225]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2023-11-23 23:47:12.169659 daemon-err , modulelauncher[22561]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2023-11-23 23:47:12.169707 daemon-err , modulelauncher[22561]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2023-11-23 23:47:12.176581 daemon-err , modulelauncher[22561]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2023-11-23 23:47:12.176633 daemon-err , modulelauncher[22561]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2023-11-23 23:47:13.707170 daemon-err , modulelauncher[22699]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2023-11-23 23:47:13.707233 daemon-err , modulelauncher[22699]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2023-11-23 23:47:13.715830 daemon-err , modulelauncher[22699]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2023-11-23 23:47:13.715904 daemon-err , modulelauncher[22699]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2023-11-23 23:49:13.668541 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2023-11-23 23:49:15.913589 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2023-11-23 23:49:26.883949 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2023-11-23 23:49:27.503575 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2023-11-23 23:49:37.321380 daemon-err , modulelauncher[28199]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0
2023-11-23 23:49:37.321429 daemon-err , modulelauncher[28199]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9
2023-11-23 23:49:37.326254 daemon-err , modulelauncher[28199]:  osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5
2023-11-23 23:49:37.326308 daemon-err , modulelauncher[28199]:  Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9
2023-11-23 23:49:37.332287 daemon-err , modulelauncher[28199]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15
2023-11-23 23:49:37.332337 daemon-err , modulelauncher[28199]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9
2023-11-23 23:49:38.187013 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2023-11-23 23:49:38.926360 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2023-11-23 23:50:43.661957 daemon-err , cfgd[1092]:  External python command [cfg.auto_scripts process ADVISOR1 SCRIPT_1 true] finished with status 1
2023-11-23 23:51:25.714388 user-err , ERROR:  `system script SCRIPT_1` validation error
2023-11-23 23:51:25.714602 user-err , ERROR:  "Configuration path: [potato] is not valid"
2023-11-23 23:51:25.716260 daemon-err , cfgd[1092]:  [28348]Command output:#012Value validation failed#012
2023-11-23 23:51:26.143134 user-err , ERROR:  `system script SCRIPT_1` validation error
2023-11-23 23:51:26.143315 user-err , ERROR:  system potato: Invalid operational command.
2023-11-23 23:51:26.144906 daemon-err , cfgd[1092]:  [28348]Command output:#012Value validation failed#012
2023-11-23 23:51:33.531856 daemon-err , cfgd[1092]:  [ service dhcp-server ]
2023-11-23 23:51:33.531965 daemon-err , cfgd[1092]:  \"shared-network\" configuration is required
2023-11-23 23:51:33.532043 daemon-err , cfgd[1092]:  Commit validation failed
2023-11-23 23:51:33.534389 daemon-err , cfgd[1092]:  [31694]Command output:#012[ service dhcp-server ]#012\"shared-network\" configuration is required#012Commit validation failed#012
2023-11-23 23:51:33.541810 daemon-err , cfgd[1092]:  External python command [cfg.auto_scripts execute_script SCRIPT_1] finished with status 1
2023-11-23 23:51:45.031191 syslog-info , rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10890" x-info="https://www.rsyslog.com"] exiting on signal 15.
2023-11-23 23:51:45.032347 daemon-info , systemd[1]:  Stopping System Logging Service...
2023-11-23 23:51:45.033094 daemon-info , systemd[1]:  rsyslog.service: Succeeded.
2023-11-23 23:51:45.033573 daemon-info , systemd[1]:  Stopped System Logging Service.
2023-11-23 23:51:45.035705 daemon-info , systemd[1]:  Starting System Logging Service...
2023-11-23 23:51:45.041166 daemon-info , systemd[1]:  Started System Logging Service.
2023-11-23 23:51:45.043783 daemon-notice , cfgd[1092]:  [28348]Completed change to active configuration
2023-11-23 23:51:45.044955 syslog-info , rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2023-11-23 23:51:45.045037 syslog-info , rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="32045" x-info="https://www.rsyslog.com"] start
2023-11-23 23:51:45.048762 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2023-11-23 23:51:45.081319 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2023-11-23 23:51:45.290971 auth-notice , OSDxCLI:  User 'admin' entered the configuration menu.
2023-11-23 23:51:45.396607 auth-notice , OSDxCLI:  User 'admin' added a new cfg line: 'set system host-name New-hostname'.
2023-11-23 23:51:45.525390 daemon-info , dbus-daemon[726]:  [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.682' (uid=0 pid=32063 comm="hostnamectl set-hostname New-hostname ")
2023-11-23 23:51:45.530081 daemon-info , systemd[1]:  Starting Hostname Service...
2023-11-23 23:51:45.564193 daemon-info , dbus-daemon[726]:  [system] Successfully activated service 'org.freedesktop.hostname1'
2023-11-23 23:51:45.564598 daemon-info , systemd[1]:  Started Hostname Service.
2023-11-23 23:51:45.565387 daemon-info , systemd-hostnamed[32064]:  Changed static host name to 'New-hostname'
2023-11-23 23:51:45.565698 daemon-info , systemd-hostnamed[32064]:  Changed host name to 'New-hostname'
2023-11-23 23:51:45.584374 daemon-notice , cfgd[1092]:  [28348]Completed change to active configuration
2023-11-23 23:51:45.587323 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2023-11-23 23:51:45.627893 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog file systemd_msg
set system syslog file systemd_msg level info
set system syslog file systemd_msg app systemd

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output contains the following tokens:

systemd[1]:  Started "DHCP Server Service instance main".
Show output
2023-11-23 23:51:53.332693 daemon-info , systemd[1]:  Stopping System Logging Service...
2023-11-23 23:51:53.333140 daemon-info , systemd[1]:  rsyslog.service: Succeeded.
2023-11-23 23:51:53.333513 daemon-info , systemd[1]:  Stopped System Logging Service.
2023-11-23 23:51:53.334854 daemon-info , systemd[1]:  Starting System Logging Service...
2023-11-23 23:51:53.338700 daemon-info , systemd[1]:  Started System Logging Service.
2023-11-23 23:51:54.001497 daemon-info , systemd[1]:  Started "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog file systemd_msg
set system syslog file systemd_msg level info
set system syslog file systemd_msg app systemd
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output contains the following tokens:

Started "DHCP Server Service instance main".
Show output
2023-11-23 23:52:00.621496 daemon-info , systemd[1]:  Stopping System Logging Service...
2023-11-23 23:52:00.622195 daemon-info , systemd[1]:  rsyslog.service: Succeeded.
2023-11-23 23:52:00.622718 daemon-info , systemd[1]:  Stopped System Logging Service.
2023-11-23 23:52:00.624444 daemon-info , systemd[1]:  Starting System Logging Service...
2023-11-23 23:52:00.628791 daemon-info , systemd[1]:  Started System Logging Service.
2023-11-23 23:52:01.336930 daemon-info , systemd[1]:  Started "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and change the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set interfaces ethernet eth0 address 10.215.168.20/24

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.208 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.208/0.208/0.208/0.000 ms

Step 3: Set the following configuration in DUT0:

set system host-name New-hostname

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages and change the host name through a VRF.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system syslog host 10.215.168.1 local-vrf VRF0
set interfaces ethernet eth0 address 10.215.168.20/24
set interfaces ethernet eth0 vrf VRF0
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than VRF0.
PING 10.215.168.1 (10.215.168.1) from 10.215.168.20 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.159 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.159/0.159/0.159/0.000 ms

Step 3: Set the following configuration in DUT0:

set system host-name New-hostname

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages and change the host name through an specific interface.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set interfaces ethernet eth0 address 10.215.168.20/24
set system syslog host 10.215.168.1 local-interface eth0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.204 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.204/0.204/0.204/0.000 ms

Step 3: Set the following configuration in DUT0:

set system host-name New-hostname

Step 4: Set the following configuration in DUT0:

set system host-name New-hostname

Test Syslog Remote Single TLS

Description

Add a remote host to send syslog messages and change the host name through a VRF.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca running://ca.crt
set interfaces ethernet eth0 address 10.215.168.20/24

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.178 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.178/0.178/0.178/0.000 ms

Step 3: Set the following configuration in DUT0:

set system host-name New-hostname