Syslog
Test suite to check syslog
Test Syslog
Description
Change the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog global level info
Step 2: Set the following configuration in DUT0
:
set system host-name New-hostname
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
daemon-info.*Changed host name to 'New-hostname'Show output
2023-11-23 23:44:24.252117 auth-err , sshd[18942]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2023-11-23 23:44:44.653556 authpriv-err , login[18954]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2023-11-23 23:44:44.653781 authpriv-err , login[18954]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2023-11-23 23:44:49.040680 daemon-err , modulelauncher[18985]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2023-11-23 23:44:49.040735 daemon-err , modulelauncher[18985]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2023-11-23 23:44:49.046214 daemon-err , modulelauncher[18985]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2023-11-23 23:44:49.046271 daemon-err , modulelauncher[18985]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2023-11-23 23:44:49.555335 authpriv-err , sshd[19078]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2023-11-23 23:44:49.555527 authpriv-err , sshd[19078]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2023-11-23 23:44:49.978662 authpriv-err , login[19118]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2023-11-23 23:44:49.979025 authpriv-err , login[19118]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2023-11-23 23:44:51.638231 daemon-err , modulelauncher[19174]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2023-11-23 23:44:51.638296 daemon-err , modulelauncher[19174]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2023-11-23 23:44:51.642835 daemon-err , modulelauncher[19174]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2023-11-23 23:44:51.642886 daemon-err , modulelauncher[19174]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2023-11-23 23:44:51.648075 daemon-err , modulelauncher[19174]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2023-11-23 23:44:51.648127 daemon-err , modulelauncher[19174]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2023-11-23 23:44:51.653379 daemon-err , modulelauncher[19174]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2023-11-23 23:44:51.653429 daemon-err , modulelauncher[19174]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2023-11-23 23:44:52.057319 authpriv-err , sshd[19208]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2023-11-23 23:44:52.057515 authpriv-err , sshd[19208]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2023-11-23 23:45:12.469678 authpriv-err , login[19222]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2023-11-23 23:45:12.469830 authpriv-err , login[19222]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2023-11-23 23:45:18.315166 daemon-err , modulelauncher[19251]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2023-11-23 23:45:18.315219 daemon-err , modulelauncher[19251]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2023-11-23 23:45:18.320711 daemon-err , modulelauncher[19251]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2023-11-23 23:45:18.320786 daemon-err , modulelauncher[19251]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2023-11-23 23:45:18.327905 daemon-err , modulelauncher[19251]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2023-11-23 23:45:18.327986 daemon-err , modulelauncher[19251]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2023-11-23 23:45:18.334718 daemon-err , modulelauncher[19251]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2023-11-23 23:45:18.334786 daemon-err , modulelauncher[19251]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2023-11-23 23:45:18.845286 authpriv-err , sshd[19313]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2023-11-23 23:45:18.845435 authpriv-err , sshd[19313]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2023-11-23 23:45:19.346863 authpriv-err , login[19353]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2023-11-23 23:45:19.347050 authpriv-err , login[19353]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2023-11-23 23:45:21.291894 daemon-err , modulelauncher[19411]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2023-11-23 23:45:21.291954 daemon-err , modulelauncher[19411]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2023-11-23 23:45:21.296395 daemon-err , modulelauncher[19411]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2023-11-23 23:45:21.296447 daemon-err , modulelauncher[19411]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2023-11-23 23:45:21.303242 daemon-err , modulelauncher[19411]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2023-11-23 23:45:21.303314 daemon-err , modulelauncher[19411]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2023-11-23 23:45:21.310450 daemon-err , modulelauncher[19411]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2023-11-23 23:45:21.310532 daemon-err , modulelauncher[19411]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2023-11-23 23:45:21.801691 authpriv-err , sshd[19445]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2023-11-23 23:45:21.801886 authpriv-err , sshd[19445]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2023-11-23 23:45:42.183619 authpriv-err , login[19454]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2023-11-23 23:45:42.183835 authpriv-err , login[19454]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2023-11-23 23:45:49.626099 daemon-err , staticd[1039]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 254 2023-11-23 23:45:49.626191 daemon-err , staticd[1039]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 254 2023-11-23 23:46:03.170043 daemon-err , modulelauncher[20193]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0 2023-11-23 23:46:03.170105 daemon-err , modulelauncher[20193]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2023-11-23 23:46:03.174355 daemon-err , modulelauncher[20193]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2023-11-23 23:46:03.174406 daemon-err , modulelauncher[20193]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2023-11-23 23:46:03.181157 daemon-err , modulelauncher[20193]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2023-11-23 23:46:03.181213 daemon-err , modulelauncher[20193]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2023-11-23 23:46:11.028794 daemon-err , modulelauncher[20537]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0 2023-11-23 23:46:11.028844 daemon-err , modulelauncher[20537]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2023-11-23 23:46:11.033252 daemon-err , modulelauncher[20537]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2023-11-23 23:46:11.033298 daemon-err , modulelauncher[20537]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2023-11-23 23:46:11.040124 daemon-err , modulelauncher[20537]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2023-11-23 23:46:11.040179 daemon-err , modulelauncher[20537]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2023-11-23 23:46:12.439531 daemon-err , modulelauncher[20682]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0 2023-11-23 23:46:12.439582 daemon-err , modulelauncher[20682]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2023-11-23 23:46:12.444157 daemon-err , modulelauncher[20682]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2023-11-23 23:46:12.444207 daemon-err , modulelauncher[20682]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2023-11-23 23:46:12.449826 daemon-err , modulelauncher[20682]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2023-11-23 23:46:12.449882 daemon-err , modulelauncher[20682]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2023-11-23 23:47:03.409714 daemon-err , modulelauncher[22225]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2023-11-23 23:47:03.409783 daemon-err , modulelauncher[22225]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2023-11-23 23:47:03.417229 daemon-err , modulelauncher[22225]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2023-11-23 23:47:03.417281 daemon-err , modulelauncher[22225]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2023-11-23 23:47:12.169659 daemon-err , modulelauncher[22561]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2023-11-23 23:47:12.169707 daemon-err , modulelauncher[22561]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2023-11-23 23:47:12.176581 daemon-err , modulelauncher[22561]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2023-11-23 23:47:12.176633 daemon-err , modulelauncher[22561]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2023-11-23 23:47:13.707170 daemon-err , modulelauncher[22699]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2023-11-23 23:47:13.707233 daemon-err , modulelauncher[22699]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2023-11-23 23:47:13.715830 daemon-err , modulelauncher[22699]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2023-11-23 23:47:13.715904 daemon-err , modulelauncher[22699]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2023-11-23 23:49:13.668541 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2023-11-23 23:49:15.913589 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2023-11-23 23:49:26.883949 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2023-11-23 23:49:27.503575 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2023-11-23 23:49:37.321380 daemon-err , modulelauncher[28199]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0 2023-11-23 23:49:37.321429 daemon-err , modulelauncher[28199]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2023-11-23 23:49:37.326254 daemon-err , modulelauncher[28199]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2023-11-23 23:49:37.326308 daemon-err , modulelauncher[28199]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2023-11-23 23:49:37.332287 daemon-err , modulelauncher[28199]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2023-11-23 23:49:37.332337 daemon-err , modulelauncher[28199]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2023-11-23 23:49:38.187013 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2023-11-23 23:49:38.926360 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2023-11-23 23:50:43.661957 daemon-err , cfgd[1092]: External python command [cfg.auto_scripts process ADVISOR1 SCRIPT_1 true] finished with status 1 2023-11-23 23:51:25.714388 user-err , ERROR: `system script SCRIPT_1` validation error 2023-11-23 23:51:25.714602 user-err , ERROR: "Configuration path: [potato] is not valid" 2023-11-23 23:51:25.716260 daemon-err , cfgd[1092]: [28348]Command output:#012Value validation failed#012 2023-11-23 23:51:26.143134 user-err , ERROR: `system script SCRIPT_1` validation error 2023-11-23 23:51:26.143315 user-err , ERROR: system potato: Invalid operational command. 2023-11-23 23:51:26.144906 daemon-err , cfgd[1092]: [28348]Command output:#012Value validation failed#012 2023-11-23 23:51:33.531856 daemon-err , cfgd[1092]: [ service dhcp-server ] 2023-11-23 23:51:33.531965 daemon-err , cfgd[1092]: \"shared-network\" configuration is required 2023-11-23 23:51:33.532043 daemon-err , cfgd[1092]: Commit validation failed 2023-11-23 23:51:33.534389 daemon-err , cfgd[1092]: [31694]Command output:#012[ service dhcp-server ]#012\"shared-network\" configuration is required#012Commit validation failed#012 2023-11-23 23:51:33.541810 daemon-err , cfgd[1092]: External python command [cfg.auto_scripts execute_script SCRIPT_1] finished with status 1 2023-11-23 23:51:45.031191 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="10890" x-info="https://www.rsyslog.com"] exiting on signal 15. 2023-11-23 23:51:45.032347 daemon-info , systemd[1]: Stopping System Logging Service... 2023-11-23 23:51:45.033094 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2023-11-23 23:51:45.033573 daemon-info , systemd[1]: Stopped System Logging Service. 2023-11-23 23:51:45.035705 daemon-info , systemd[1]: Starting System Logging Service... 2023-11-23 23:51:45.041166 daemon-info , systemd[1]: Started System Logging Service. 2023-11-23 23:51:45.043783 daemon-notice , cfgd[1092]: [28348]Completed change to active configuration 2023-11-23 23:51:45.044955 syslog-info , rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2023-11-23 23:51:45.045037 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="32045" x-info="https://www.rsyslog.com"] start 2023-11-23 23:51:45.048762 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2023-11-23 23:51:45.081319 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2023-11-23 23:51:45.290971 auth-notice , OSDxCLI: User 'admin' entered the configuration menu. 2023-11-23 23:51:45.396607 auth-notice , OSDxCLI: User 'admin' added a new cfg line: 'set system host-name New-hostname'. 2023-11-23 23:51:45.525390 daemon-info , dbus-daemon[726]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.682' (uid=0 pid=32063 comm="hostnamectl set-hostname New-hostname ") 2023-11-23 23:51:45.530081 daemon-info , systemd[1]: Starting Hostname Service... 2023-11-23 23:51:45.564193 daemon-info , dbus-daemon[726]: [system] Successfully activated service 'org.freedesktop.hostname1' 2023-11-23 23:51:45.564598 daemon-info , systemd[1]: Started Hostname Service. 2023-11-23 23:51:45.565387 daemon-info , systemd-hostnamed[32064]: Changed static host name to 'New-hostname' 2023-11-23 23:51:45.565698 daemon-info , systemd-hostnamed[32064]: Changed host name to 'New-hostname' 2023-11-23 23:51:45.584374 daemon-notice , cfgd[1092]: [28348]Completed change to active configuration 2023-11-23 23:51:45.587323 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2023-11-23 23:51:45.627893 auth-notice , OSDxCLI: User 'admin' left the configuration menu.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog file systemd_msg set system syslog file systemd_msg level info set system syslog file systemd_msg app systemd
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output contains the following tokens:
systemd[1]: Started "DHCP Server Service instance main".Show output
2023-11-23 23:51:53.332693 daemon-info , systemd[1]: Stopping System Logging Service... 2023-11-23 23:51:53.333140 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2023-11-23 23:51:53.333513 daemon-info , systemd[1]: Stopped System Logging Service. 2023-11-23 23:51:53.334854 daemon-info , systemd[1]: Starting System Logging Service... 2023-11-23 23:51:53.338700 daemon-info , systemd[1]: Started System Logging Service. 2023-11-23 23:51:54.001497 daemon-info , systemd[1]: Started "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog file systemd_msg set system syslog file systemd_msg level info set system syslog file systemd_msg app systemd set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output contains the following tokens:
Started "DHCP Server Service instance main".Show output
2023-11-23 23:52:00.621496 daemon-info , systemd[1]: Stopping System Logging Service... 2023-11-23 23:52:00.622195 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2023-11-23 23:52:00.622718 daemon-info , systemd[1]: Stopped System Logging Service. 2023-11-23 23:52:00.624444 daemon-info , systemd[1]: Starting System Logging Service... 2023-11-23 23:52:00.628791 daemon-info , systemd[1]: Started System Logging Service. 2023-11-23 23:52:01.336930 daemon-info , systemd[1]: Started "DHCP Server Service instance main".
Test Syslog Remote
Description
Add a remote host to send syslog messages and change the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set interfaces ethernet eth0 address 10.215.168.20/24
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.208 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.208/0.208/0.208/0.000 ms
Step 3: Set the following configuration in DUT0
:
set system host-name New-hostname
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages and change the host name through a VRF.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system syslog host 10.215.168.1 local-vrf VRF0 set interfaces ethernet eth0 address 10.215.168.20/24 set interfaces ethernet eth0 vrf VRF0 set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than VRF0. PING 10.215.168.1 (10.215.168.1) from 10.215.168.20 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.159 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.159/0.159/0.159/0.000 ms
Step 3: Set the following configuration in DUT0
:
set system host-name New-hostname
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages and change the host name through an specific interface.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set interfaces ethernet eth0 address 10.215.168.20/24 set system syslog host 10.215.168.1 local-interface eth0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.204 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.204/0.204/0.204/0.000 ms
Step 3: Set the following configuration in DUT0
:
set system host-name New-hostname
Step 4: Set the following configuration in DUT0
:
set system host-name New-hostname
Test Syslog Remote Single TLS
Description
Add a remote host to send syslog messages and change the host name through a VRF.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca running://ca.crt set interfaces ethernet eth0 address 10.215.168.20/24
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.178 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.178/0.178/0.178/0.000 ms
Step 3: Set the following configuration in DUT0
:
set system host-name New-hostname