Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2024-01-25 00:35:36.660196 daemon-err , modulelauncher[1604]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2024-01-25 00:35:36.667163 daemon-err , modulelauncher[1604]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2024-01-25 00:35:36.667271 daemon-err , modulelauncher[1604]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2024-01-25 00:35:37.179513 auth-err , sshd[1640]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2024-01-25 00:35:37.179758 auth-err , sshd[1640]: connection to srv[0] 1.2.3.4:49 failed: Network is unreachable 2024-01-25 00:35:47.552295 authpriv-err , login[1650]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2024-01-25 00:35:47.552475 authpriv-err , login[1650]: connection to srv[0] 1.2.3.4:49 failed: Network is unreachable 2024-01-25 00:35:52.398184 daemon-err , modulelauncher[1681]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0 2024-01-25 00:35:52.398267 daemon-err , modulelauncher[1681]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2024-01-25 00:35:52.404406 daemon-err , modulelauncher[1681]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2024-01-25 00:35:52.404465 daemon-err , modulelauncher[1681]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2024-01-25 00:35:52.408869 daemon-err , modulelauncher[1681]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2024-01-25 00:35:52.408938 daemon-err , modulelauncher[1681]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2024-01-25 00:35:52.416014 daemon-err , modulelauncher[1681]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0 2024-01-25 00:35:52.416088 daemon-err , modulelauncher[1681]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2024-01-25 00:35:52.422163 daemon-err , modulelauncher[1681]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2024-01-25 00:35:52.422230 daemon-err , modulelauncher[1681]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2024-01-25 00:35:52.429264 daemon-err , modulelauncher[1681]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2024-01-25 00:35:52.429335 daemon-err , modulelauncher[1681]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2024-01-25 00:35:52.974075 auth-err , sshd[1746]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2024-01-25 00:35:52.974498 auth-err , sshd[1746]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2024-01-25 00:35:52.984256 auth-err , sshd[1746]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2024-01-25 00:35:52.984408 auth-err , sshd[1746]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2024-01-25 00:35:53.425597 authpriv-err , login[1788]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2024-01-25 00:35:53.425751 authpriv-err , login[1788]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2024-01-25 00:35:53.430736 authpriv-err , login[1788]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2024-01-25 00:35:53.430840 authpriv-err , login[1788]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2024-01-25 00:35:55.399801 daemon-err , modulelauncher[1848]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0 2024-01-25 00:35:55.399861 daemon-err , modulelauncher[1848]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2024-01-25 00:35:55.404587 daemon-err , modulelauncher[1848]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2024-01-25 00:35:55.404644 daemon-err , modulelauncher[1848]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2024-01-25 00:35:55.408972 daemon-err , modulelauncher[1848]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2024-01-25 00:35:55.409025 daemon-err , modulelauncher[1848]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2024-01-25 00:35:55.414287 daemon-err , modulelauncher[1848]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0 2024-01-25 00:35:55.414344 daemon-err , modulelauncher[1848]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2024-01-25 00:35:55.418961 daemon-err , modulelauncher[1848]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2024-01-25 00:35:55.419048 daemon-err , modulelauncher[1848]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2024-01-25 00:35:55.424459 daemon-err , modulelauncher[1848]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2024-01-25 00:35:55.424515 daemon-err , modulelauncher[1848]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2024-01-25 00:35:55.955136 auth-err , sshd[1884]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2024-01-25 00:35:55.955324 auth-err , sshd[1884]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2024-01-25 00:36:06.326284 authpriv-err , login[1898]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2024-01-25 00:36:06.326442 authpriv-err , login[1898]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2024-01-25 00:36:11.378041 daemon-err , modulelauncher[1927]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-01-25 00:36:11.378096 daemon-err , modulelauncher[1927]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-01-25 00:36:11.383983 daemon-err , modulelauncher[1927]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-01-25 00:36:11.384043 daemon-err , modulelauncher[1927]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-01-25 00:36:11.931412 authpriv-err , sshd[2020]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2024-01-25 00:36:11.931589 authpriv-err , sshd[2020]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-01-25 00:36:12.412588 authpriv-err , login[2062]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2024-01-25 00:36:12.412773 authpriv-err , login[2062]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-01-25 00:36:14.018367 daemon-err , modulelauncher[2120]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-01-25 00:36:14.018428 daemon-err , modulelauncher[2120]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-01-25 00:36:14.022644 daemon-err , modulelauncher[2120]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-01-25 00:36:14.022697 daemon-err , modulelauncher[2120]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-01-25 00:36:14.028476 daemon-err , modulelauncher[2120]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-01-25 00:36:14.028532 daemon-err , modulelauncher[2120]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-01-25 00:36:14.034082 daemon-err , modulelauncher[2120]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-01-25 00:36:14.034135 daemon-err , modulelauncher[2120]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-01-25 00:36:14.407957 authpriv-err , sshd[2154]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2024-01-25 00:36:14.408150 authpriv-err , sshd[2154]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-01-25 00:36:24.761538 authpriv-err , login[2163]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2024-01-25 00:36:24.761735 authpriv-err , login[2163]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-01-25 00:36:30.237832 daemon-err , modulelauncher[2192]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-01-25 00:36:30.237887 daemon-err , modulelauncher[2192]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-01-25 00:36:30.242500 daemon-err , modulelauncher[2192]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-01-25 00:36:30.242550 daemon-err , modulelauncher[2192]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-01-25 00:36:30.248042 daemon-err , modulelauncher[2192]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-01-25 00:36:30.248103 daemon-err , modulelauncher[2192]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-01-25 00:36:30.253542 daemon-err , modulelauncher[2192]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-01-25 00:36:30.253598 daemon-err , modulelauncher[2192]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-01-25 00:36:30.882791 authpriv-err , sshd[2254]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-01-25 00:36:30.882945 authpriv-err , sshd[2254]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-01-25 00:36:31.338982 authpriv-err , login[2296]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-01-25 00:36:31.339134 authpriv-err , login[2296]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-01-25 00:36:33.396476 daemon-err , modulelauncher[2356]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-01-25 00:36:33.396529 daemon-err , modulelauncher[2356]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-01-25 00:36:33.400585 daemon-err , modulelauncher[2356]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-01-25 00:36:33.400635 daemon-err , modulelauncher[2356]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-01-25 00:36:33.405676 daemon-err , modulelauncher[2356]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-01-25 00:36:33.405729 daemon-err , modulelauncher[2356]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-01-25 00:36:33.411118 daemon-err , modulelauncher[2356]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-01-25 00:36:33.411191 daemon-err , modulelauncher[2356]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-01-25 00:36:33.893167 authpriv-err , sshd[2390]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-01-25 00:36:33.893303 authpriv-err , sshd[2390]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-01-25 00:36:44.373476 authpriv-err , login[2399]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-01-25 00:36:44.373676 authpriv-err , login[2399]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-01-25 00:36:50.491652 daemon-err , staticd[1053]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 310 2024-01-25 00:36:50.491724 daemon-err , staticd[1053]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 310 2024-01-25 00:37:27.571872 daemon-err , modulelauncher[3436]: osdx.utils.xos cmd error: swanctl -r && swanctl -q 2024-01-25 00:37:27.571961 daemon-err , modulelauncher[3436]: Command 'swanctl -r && swanctl -q' returned non-zero exit status 22 2024-01-25 00:37:33.605517 daemon-err , cfgd[1112]: External python command [op.pki scep info CSR] finished with status 1 2024-01-25 00:37:55.237565 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX18BIbor57HVzuBoJSkeIDxAxehy4mbnopY=] finished with status 1 2024-01-25 00:37:55.237710 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:37:55.237771 daemon-err , cfgd[1112]: \"U2FsdGVkX18BIbor57HVzuBoJSkeIDxAxehy4mbnopY=\" strong-password: score is too weak 2024-01-25 00:37:55.237860 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:37:55.242274 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX18BIbor57HVzuBoJSkeIDxAxehy4mbnopY=\" strong-password: score is too weak#012Commit validation failed#012 2024-01-25 00:38:06.677413 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=] finished with status 1 2024-01-25 00:38:06.677504 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:38:06.677558 daemon-err , cfgd[1112]: \"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak 2024-01-25 00:38:06.677614 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:38:06.681917 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak#012Commit validation failed#012 2024-01-25 00:38:10.233492 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=] finished with status 1 2024-01-25 00:38:10.233581 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:38:10.233635 daemon-err , cfgd[1112]: \"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak 2024-01-25 00:38:10.233685 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:38:10.237734 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak#012Commit validation failed#012 2024-01-25 00:38:10.834282 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=] finished with status 1 2024-01-25 00:38:10.834377 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:38:10.834471 daemon-err , cfgd[1112]: \"U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=\" strong-password: score is too weak 2024-01-25 00:38:10.834522 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:38:10.838649 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=\" strong-password: score is too weak#012Commit validation failed#012 2024-01-25 00:38:13.855413 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=] finished with status 1 2024-01-25 00:38:13.855510 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:38:13.855559 daemon-err , cfgd[1112]: \"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak 2024-01-25 00:38:13.855604 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:38:13.860162 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak#012Commit validation failed#012 2024-01-25 00:38:14.512024 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=] finished with status 1 2024-01-25 00:38:14.512120 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:38:14.512175 daemon-err , cfgd[1112]: \"U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=\" strong-password: score is too weak 2024-01-25 00:38:14.512228 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:38:14.516466 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=\" strong-password: score is too weak#012Commit validation failed#012 2024-01-25 00:38:15.223380 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDgHJaB3iZQg44fbLzpE55SY=] finished with status 1 2024-01-25 00:38:15.223472 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:38:15.223525 daemon-err , cfgd[1112]: \"U2FsdGVkX1+1gdjRdF1WDgHJaB3iZQg44fbLzpE55SY=\" strong-password: score is too weak 2024-01-25 00:38:15.223585 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:38:15.227660 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDgHJaB3iZQg44fbLzpE55SY=\" strong-password: score is too weak#012Commit validation failed#012 2024-01-25 00:38:17.383267 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=] finished with status 1 2024-01-25 00:38:17.383339 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:38:17.383380 daemon-err , cfgd[1112]: \"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak 2024-01-25 00:38:17.383417 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:38:17.386686 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak#012Commit validation failed#012 2024-01-25 00:38:18.064246 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=] finished with status 1 2024-01-25 00:38:18.064341 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:38:18.064395 daemon-err , cfgd[1112]: \"U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=\" strong-password: score is too weak 2024-01-25 00:38:18.064446 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:38:18.068897 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=\" strong-password: score is too weak#012Commit validation failed#012 2024-01-25 00:38:18.783624 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDgHJaB3iZQg44fbLzpE55SY=] finished with status 1 2024-01-25 00:38:18.783696 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:38:18.783736 daemon-err , cfgd[1112]: \"U2FsdGVkX1+1gdjRdF1WDgHJaB3iZQg44fbLzpE55SY=\" strong-password: score is too weak 2024-01-25 00:38:18.783773 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:38:18.786869 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDgHJaB3iZQg44fbLzpE55SY=\" strong-password: score is too weak#012Commit validation failed#012 2024-01-25 00:38:19.344321 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDkiL4di1DYjSH2aTVSFWhBo=] finished with status 1 2024-01-25 00:38:19.344418 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:38:19.344478 daemon-err , cfgd[1112]: \"U2FsdGVkX1+1gdjRdF1WDkiL4di1DYjSH2aTVSFWhBo=\" strong-password: score is too weak 2024-01-25 00:38:19.344530 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:38:19.349034 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDkiL4di1DYjSH2aTVSFWhBo=\" strong-password: score is too weak#012Commit validation failed#012 2024-01-25 00:38:43.732630 daemon-err , cfgd[1112]: [28118]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-01-25 00:38:44.266919 daemon-err , cfgd[1112]: [28118]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-01-25 00:38:57.661078 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX19juq3Xn+ojEQISUgBR29FjgI+6l3M5rCk=] finished with status 1 2024-01-25 00:38:57.661141 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:38:57.661179 daemon-err , cfgd[1112]: \"U2FsdGVkX19juq3Xn+ojEQISUgBR29FjgI+6l3M5rCk=\" strong-password: score is too weak 2024-01-25 00:38:57.661213 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:38:57.664223 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX19juq3Xn+ojEQISUgBR29FjgI+6l3M5rCk=\" strong-password: score is too weak#012Commit validation failed#012 2024-01-25 00:38:58.307107 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1/CbZQs5IQXH/fFkZWRQtIKZOMO2XqR7/4=] finished with status 1 2024-01-25 00:38:58.307199 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:38:58.307252 daemon-err , cfgd[1112]: \"U2FsdGVkX1/CbZQs5IQXH/fFkZWRQtIKZOMO2XqR7/4=\" strong-password: score is too weak 2024-01-25 00:38:58.307309 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:38:58.310617 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1/CbZQs5IQXH/fFkZWRQtIKZOMO2XqR7/4=\" strong-password: score is too weak#012Commit validation failed#012 2024-01-25 00:39:06.610975 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX19p6TGEX2JNcTkfeasybsEMGp4nbukUCKg=] finished with status 2 2024-01-25 00:39:06.611045 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:39:06.611085 daemon-err , cfgd[1112]: \"U2FsdGVkX19p6TGEX2JNcTkfeasybsEMGp4nbukUCKg=\" strong-password: not long enough 2024-01-25 00:39:06.611120 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:39:06.615183 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX19p6TGEX2JNcTkfeasybsEMGp4nbukUCKg=\" strong-password: not long enough#012Commit validation failed#012 2024-01-25 00:39:15.184709 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX19mvJkFbJGscgLKN7Wb59lq7Pt5cKmdwSE=] finished with status 3 2024-01-25 00:39:15.184799 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:39:15.184853 daemon-err , cfgd[1112]: \"U2FsdGVkX19mvJkFbJGscgLKN7Wb59lq7Pt5cKmdwSE=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-01-25 00:39:15.184902 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:39:15.188966 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX19mvJkFbJGscgLKN7Wb59lq7Pt5cKmdwSE=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-01-25 00:39:15.880254 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX19Hq1TV5T+QyiCUhW2HzE1o2vLqOtxgk/M=] finished with status 3 2024-01-25 00:39:15.880323 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:39:15.880359 daemon-err , cfgd[1112]: \"U2FsdGVkX19Hq1TV5T+QyiCUhW2HzE1o2vLqOtxgk/M=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-01-25 00:39:15.880395 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:39:15.883185 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX19Hq1TV5T+QyiCUhW2HzE1o2vLqOtxgk/M=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-01-25 00:39:16.515493 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+i/RVJgTICLzLEDHQkN4PbaXhoU+JPa/I=] finished with status 3 2024-01-25 00:39:16.515557 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:39:16.515594 daemon-err , cfgd[1112]: \"U2FsdGVkX1+i/RVJgTICLzLEDHQkN4PbaXhoU+JPa/I=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-01-25 00:39:16.515633 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:39:16.518376 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+i/RVJgTICLzLEDHQkN4PbaXhoU+JPa/I=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-01-25 00:39:17.061297 daemon-err , cfgd[1112]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX19c6TdLh6w7bKHSUlitjy3x21vYoBC8wAM=] finished with status 3 2024-01-25 00:39:17.061364 daemon-err , cfgd[1112]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-01-25 00:39:17.061401 daemon-err , cfgd[1112]: \"U2FsdGVkX19c6TdLh6w7bKHSUlitjy3x21vYoBC8wAM=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-01-25 00:39:17.061441 daemon-err , cfgd[1112]: Commit validation failed 2024-01-25 00:39:17.064211 daemon-err , cfgd[1112]: [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX19c6TdLh6w7bKHSUlitjy3x21vYoBC8wAM=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-01-25 00:39:18.276842 daemon-err , cfgd[1112]: [28118]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-01-25 00:39:18.764146 daemon-err , cfgd[1112]: [28118]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-01-25 00:39:19.250166 daemon-err , cfgd[1112]: [28118]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-01-25 00:39:19.789802 daemon-err , cfgd[1112]: [28118]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-01-25 00:40:44.178458 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="1502" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-01-25 00:40:44.179332 daemon-info , systemd[1]: Stopping System Logging Service... 2024-01-25 00:40:44.179779 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-01-25 00:40:44.180112 daemon-info , systemd[1]: Stopped System Logging Service. 2024-01-25 00:40:44.181529 daemon-info , systemd[1]: Starting System Logging Service... 2024-01-25 00:40:44.185533 daemon-info , systemd[1]: Started System Logging Service. 2024-01-25 00:40:44.187402 daemon-notice , cfgd[1112]: [28118]Completed change to active configuration 2024-01-25 00:40:44.188214 syslog-info , rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-01-25 00:40:44.188278 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="8799" x-info="https://www.rsyslog.com"] start 2024-01-25 00:40:44.191186 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2024-01-25 00:40:44.243423 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2024-01-25 00:40:44.395716 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog file systemd_msg set system syslog file systemd_msg level info set system syslog file systemd_msg app systemd
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output contains the following tokens:
systemd[1]: Started "DHCP Server Service instance main".Show output
2024-01-25 00:40:52.595457 daemon-info , systemd[1]: Stopping System Logging Service... 2024-01-25 00:40:52.595956 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-01-25 00:40:52.596296 daemon-info , systemd[1]: Stopped System Logging Service. 2024-01-25 00:40:52.597675 daemon-info , systemd[1]: Starting System Logging Service... 2024-01-25 00:40:52.601840 daemon-info , systemd[1]: Started System Logging Service. 2024-01-25 00:40:53.266451 daemon-info , systemd[1]: Started "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog file systemd_msg set system syslog file systemd_msg level info set system syslog file systemd_msg app systemd set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output contains the following tokens:
Started "DHCP Server Service instance main".Show output
2024-01-25 00:41:01.513915 daemon-info , systemd[1]: Stopping System Logging Service... 2024-01-25 00:41:01.514539 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-01-25 00:41:01.515005 daemon-info , systemd[1]: Stopped System Logging Service. 2024-01-25 00:41:01.517217 daemon-info , systemd[1]: Starting System Logging Service... 2024-01-25 00:41:01.523100 daemon-info , systemd[1]: Started System Logging Service. 2024-01-25 00:41:02.260705 daemon-info , systemd[1]: Started "DHCP Server Service instance main".
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set interfaces ethernet eth0 address 10.215.168.64/24
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.188 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.188/0.188/0.188/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system syslog host 10.215.168.1 local-vrf VRF0 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than VRF0. PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.172 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.172/0.172/0.172/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set interfaces ethernet eth0 address 10.215.168.64/24 set system syslog host 10.215.168.1 local-interface eth0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.214 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.214/0.214/0.214/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca running://ca.crt set interfaces ethernet eth0 address 10.215.168.64/24
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.176 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.176/0.176/0.176/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx