Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2024-01-25 00:35:36.660196 daemon-err , modulelauncher[1604]:  Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9
2024-01-25 00:35:36.667163 daemon-err , modulelauncher[1604]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15
2024-01-25 00:35:36.667271 daemon-err , modulelauncher[1604]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9
2024-01-25 00:35:37.179513 auth-err , sshd[1640]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2024-01-25 00:35:37.179758 auth-err , sshd[1640]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2024-01-25 00:35:47.552295 authpriv-err , login[1650]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2024-01-25 00:35:47.552475 authpriv-err , login[1650]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2024-01-25 00:35:52.398184 daemon-err , modulelauncher[1681]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0
2024-01-25 00:35:52.398267 daemon-err , modulelauncher[1681]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9
2024-01-25 00:35:52.404406 daemon-err , modulelauncher[1681]:  osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5
2024-01-25 00:35:52.404465 daemon-err , modulelauncher[1681]:  Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9
2024-01-25 00:35:52.408869 daemon-err , modulelauncher[1681]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15
2024-01-25 00:35:52.408938 daemon-err , modulelauncher[1681]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9
2024-01-25 00:35:52.416014 daemon-err , modulelauncher[1681]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0
2024-01-25 00:35:52.416088 daemon-err , modulelauncher[1681]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9
2024-01-25 00:35:52.422163 daemon-err , modulelauncher[1681]:  osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5
2024-01-25 00:35:52.422230 daemon-err , modulelauncher[1681]:  Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9
2024-01-25 00:35:52.429264 daemon-err , modulelauncher[1681]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15
2024-01-25 00:35:52.429335 daemon-err , modulelauncher[1681]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9
2024-01-25 00:35:52.974075 auth-err , sshd[1746]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2024-01-25 00:35:52.974498 auth-err , sshd[1746]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2024-01-25 00:35:52.984256 auth-err , sshd[1746]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2024-01-25 00:35:52.984408 auth-err , sshd[1746]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2024-01-25 00:35:53.425597 authpriv-err , login[1788]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2024-01-25 00:35:53.425751 authpriv-err , login[1788]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2024-01-25 00:35:53.430736 authpriv-err , login[1788]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2024-01-25 00:35:53.430840 authpriv-err , login[1788]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2024-01-25 00:35:55.399801 daemon-err , modulelauncher[1848]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0
2024-01-25 00:35:55.399861 daemon-err , modulelauncher[1848]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9
2024-01-25 00:35:55.404587 daemon-err , modulelauncher[1848]:  osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5
2024-01-25 00:35:55.404644 daemon-err , modulelauncher[1848]:  Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9
2024-01-25 00:35:55.408972 daemon-err , modulelauncher[1848]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15
2024-01-25 00:35:55.409025 daemon-err , modulelauncher[1848]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9
2024-01-25 00:35:55.414287 daemon-err , modulelauncher[1848]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0
2024-01-25 00:35:55.414344 daemon-err , modulelauncher[1848]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9
2024-01-25 00:35:55.418961 daemon-err , modulelauncher[1848]:  osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5
2024-01-25 00:35:55.419048 daemon-err , modulelauncher[1848]:  Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9
2024-01-25 00:35:55.424459 daemon-err , modulelauncher[1848]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15
2024-01-25 00:35:55.424515 daemon-err , modulelauncher[1848]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9
2024-01-25 00:35:55.955136 auth-err , sshd[1884]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2024-01-25 00:35:55.955324 auth-err , sshd[1884]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2024-01-25 00:36:06.326284 authpriv-err , login[1898]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2024-01-25 00:36:06.326442 authpriv-err , login[1898]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2024-01-25 00:36:11.378041 daemon-err , modulelauncher[1927]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2024-01-25 00:36:11.378096 daemon-err , modulelauncher[1927]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2024-01-25 00:36:11.383983 daemon-err , modulelauncher[1927]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2024-01-25 00:36:11.384043 daemon-err , modulelauncher[1927]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2024-01-25 00:36:11.931412 authpriv-err , sshd[2020]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2024-01-25 00:36:11.931589 authpriv-err , sshd[2020]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2024-01-25 00:36:12.412588 authpriv-err , login[2062]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2024-01-25 00:36:12.412773 authpriv-err , login[2062]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2024-01-25 00:36:14.018367 daemon-err , modulelauncher[2120]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2024-01-25 00:36:14.018428 daemon-err , modulelauncher[2120]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2024-01-25 00:36:14.022644 daemon-err , modulelauncher[2120]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2024-01-25 00:36:14.022697 daemon-err , modulelauncher[2120]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2024-01-25 00:36:14.028476 daemon-err , modulelauncher[2120]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2024-01-25 00:36:14.028532 daemon-err , modulelauncher[2120]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2024-01-25 00:36:14.034082 daemon-err , modulelauncher[2120]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2024-01-25 00:36:14.034135 daemon-err , modulelauncher[2120]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2024-01-25 00:36:14.407957 authpriv-err , sshd[2154]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2024-01-25 00:36:14.408150 authpriv-err , sshd[2154]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2024-01-25 00:36:24.761538 authpriv-err , login[2163]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2024-01-25 00:36:24.761735 authpriv-err , login[2163]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2024-01-25 00:36:30.237832 daemon-err , modulelauncher[2192]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2024-01-25 00:36:30.237887 daemon-err , modulelauncher[2192]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2024-01-25 00:36:30.242500 daemon-err , modulelauncher[2192]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2024-01-25 00:36:30.242550 daemon-err , modulelauncher[2192]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2024-01-25 00:36:30.248042 daemon-err , modulelauncher[2192]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2024-01-25 00:36:30.248103 daemon-err , modulelauncher[2192]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2024-01-25 00:36:30.253542 daemon-err , modulelauncher[2192]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2024-01-25 00:36:30.253598 daemon-err , modulelauncher[2192]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2024-01-25 00:36:30.882791 authpriv-err , sshd[2254]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-01-25 00:36:30.882945 authpriv-err , sshd[2254]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2024-01-25 00:36:31.338982 authpriv-err , login[2296]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-01-25 00:36:31.339134 authpriv-err , login[2296]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2024-01-25 00:36:33.396476 daemon-err , modulelauncher[2356]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2024-01-25 00:36:33.396529 daemon-err , modulelauncher[2356]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2024-01-25 00:36:33.400585 daemon-err , modulelauncher[2356]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2024-01-25 00:36:33.400635 daemon-err , modulelauncher[2356]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2024-01-25 00:36:33.405676 daemon-err , modulelauncher[2356]:  osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard
2024-01-25 00:36:33.405729 daemon-err , modulelauncher[2356]:  Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9
2024-01-25 00:36:33.411118 daemon-err , modulelauncher[2356]:  osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged
2024-01-25 00:36:33.411191 daemon-err , modulelauncher[2356]:  Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9
2024-01-25 00:36:33.893167 authpriv-err , sshd[2390]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-01-25 00:36:33.893303 authpriv-err , sshd[2390]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2024-01-25 00:36:44.373476 authpriv-err , login[2399]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-01-25 00:36:44.373676 authpriv-err , login[2399]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2024-01-25 00:36:50.491652 daemon-err , staticd[1053]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 310
2024-01-25 00:36:50.491724 daemon-err , staticd[1053]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 310
2024-01-25 00:37:27.571872 daemon-err , modulelauncher[3436]:  osdx.utils.xos cmd error: swanctl -r && swanctl -q
2024-01-25 00:37:27.571961 daemon-err , modulelauncher[3436]:  Command 'swanctl -r && swanctl -q' returned non-zero exit status 22
2024-01-25 00:37:33.605517 daemon-err , cfgd[1112]:  External python command [op.pki scep info CSR] finished with status 1
2024-01-25 00:37:55.237565 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX18BIbor57HVzuBoJSkeIDxAxehy4mbnopY=] finished with status 1
2024-01-25 00:37:55.237710 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:37:55.237771 daemon-err , cfgd[1112]:  \"U2FsdGVkX18BIbor57HVzuBoJSkeIDxAxehy4mbnopY=\" strong-password: score is too weak
2024-01-25 00:37:55.237860 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:37:55.242274 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX18BIbor57HVzuBoJSkeIDxAxehy4mbnopY=\" strong-password: score is too weak#012Commit validation failed#012
2024-01-25 00:38:06.677413 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=] finished with status 1
2024-01-25 00:38:06.677504 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:38:06.677558 daemon-err , cfgd[1112]:  \"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak
2024-01-25 00:38:06.677614 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:38:06.681917 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak#012Commit validation failed#012
2024-01-25 00:38:10.233492 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=] finished with status 1
2024-01-25 00:38:10.233581 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:38:10.233635 daemon-err , cfgd[1112]:  \"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak
2024-01-25 00:38:10.233685 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:38:10.237734 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak#012Commit validation failed#012
2024-01-25 00:38:10.834282 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=] finished with status 1
2024-01-25 00:38:10.834377 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:38:10.834471 daemon-err , cfgd[1112]:  \"U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=\" strong-password: score is too weak
2024-01-25 00:38:10.834522 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:38:10.838649 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=\" strong-password: score is too weak#012Commit validation failed#012
2024-01-25 00:38:13.855413 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=] finished with status 1
2024-01-25 00:38:13.855510 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:38:13.855559 daemon-err , cfgd[1112]:  \"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak
2024-01-25 00:38:13.855604 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:38:13.860162 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak#012Commit validation failed#012
2024-01-25 00:38:14.512024 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=] finished with status 1
2024-01-25 00:38:14.512120 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:38:14.512175 daemon-err , cfgd[1112]:  \"U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=\" strong-password: score is too weak
2024-01-25 00:38:14.512228 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:38:14.516466 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=\" strong-password: score is too weak#012Commit validation failed#012
2024-01-25 00:38:15.223380 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDgHJaB3iZQg44fbLzpE55SY=] finished with status 1
2024-01-25 00:38:15.223472 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:38:15.223525 daemon-err , cfgd[1112]:  \"U2FsdGVkX1+1gdjRdF1WDgHJaB3iZQg44fbLzpE55SY=\" strong-password: score is too weak
2024-01-25 00:38:15.223585 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:38:15.227660 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDgHJaB3iZQg44fbLzpE55SY=\" strong-password: score is too weak#012Commit validation failed#012
2024-01-25 00:38:17.383267 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=] finished with status 1
2024-01-25 00:38:17.383339 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:38:17.383380 daemon-err , cfgd[1112]:  \"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak
2024-01-25 00:38:17.383417 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:38:17.386686 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDsoZ7BwrW4WPVIEJjwbDugU=\" strong-password: score is too weak#012Commit validation failed#012
2024-01-25 00:38:18.064246 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=] finished with status 1
2024-01-25 00:38:18.064341 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:38:18.064395 daemon-err , cfgd[1112]:  \"U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=\" strong-password: score is too weak
2024-01-25 00:38:18.064446 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:38:18.068897 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDqTSM1eI0FJI85aa2TlwCeU=\" strong-password: score is too weak#012Commit validation failed#012
2024-01-25 00:38:18.783624 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDgHJaB3iZQg44fbLzpE55SY=] finished with status 1
2024-01-25 00:38:18.783696 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:38:18.783736 daemon-err , cfgd[1112]:  \"U2FsdGVkX1+1gdjRdF1WDgHJaB3iZQg44fbLzpE55SY=\" strong-password: score is too weak
2024-01-25 00:38:18.783773 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:38:18.786869 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDgHJaB3iZQg44fbLzpE55SY=\" strong-password: score is too weak#012Commit validation failed#012
2024-01-25 00:38:19.344321 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+1gdjRdF1WDkiL4di1DYjSH2aTVSFWhBo=] finished with status 1
2024-01-25 00:38:19.344418 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:38:19.344478 daemon-err , cfgd[1112]:  \"U2FsdGVkX1+1gdjRdF1WDkiL4di1DYjSH2aTVSFWhBo=\" strong-password: score is too weak
2024-01-25 00:38:19.344530 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:38:19.349034 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+1gdjRdF1WDkiL4di1DYjSH2aTVSFWhBo=\" strong-password: score is too weak#012Commit validation failed#012
2024-01-25 00:38:43.732630 daemon-err , cfgd[1112]:  [28118]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-01-25 00:38:44.266919 daemon-err , cfgd[1112]:  [28118]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-01-25 00:38:57.661078 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX19juq3Xn+ojEQISUgBR29FjgI+6l3M5rCk=] finished with status 1
2024-01-25 00:38:57.661141 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:38:57.661179 daemon-err , cfgd[1112]:  \"U2FsdGVkX19juq3Xn+ojEQISUgBR29FjgI+6l3M5rCk=\" strong-password: score is too weak
2024-01-25 00:38:57.661213 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:38:57.664223 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX19juq3Xn+ojEQISUgBR29FjgI+6l3M5rCk=\" strong-password: score is too weak#012Commit validation failed#012
2024-01-25 00:38:58.307107 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1/CbZQs5IQXH/fFkZWRQtIKZOMO2XqR7/4=] finished with status 1
2024-01-25 00:38:58.307199 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:38:58.307252 daemon-err , cfgd[1112]:  \"U2FsdGVkX1/CbZQs5IQXH/fFkZWRQtIKZOMO2XqR7/4=\" strong-password: score is too weak
2024-01-25 00:38:58.307309 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:38:58.310617 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1/CbZQs5IQXH/fFkZWRQtIKZOMO2XqR7/4=\" strong-password: score is too weak#012Commit validation failed#012
2024-01-25 00:39:06.610975 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX19p6TGEX2JNcTkfeasybsEMGp4nbukUCKg=] finished with status 2
2024-01-25 00:39:06.611045 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:39:06.611085 daemon-err , cfgd[1112]:  \"U2FsdGVkX19p6TGEX2JNcTkfeasybsEMGp4nbukUCKg=\" strong-password: not long enough
2024-01-25 00:39:06.611120 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:39:06.615183 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX19p6TGEX2JNcTkfeasybsEMGp4nbukUCKg=\" strong-password: not long enough#012Commit validation failed#012
2024-01-25 00:39:15.184709 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX19mvJkFbJGscgLKN7Wb59lq7Pt5cKmdwSE=] finished with status 3
2024-01-25 00:39:15.184799 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:39:15.184853 daemon-err , cfgd[1112]:  \"U2FsdGVkX19mvJkFbJGscgLKN7Wb59lq7Pt5cKmdwSE=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2024-01-25 00:39:15.184902 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:39:15.188966 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX19mvJkFbJGscgLKN7Wb59lq7Pt5cKmdwSE=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012
2024-01-25 00:39:15.880254 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX19Hq1TV5T+QyiCUhW2HzE1o2vLqOtxgk/M=] finished with status 3
2024-01-25 00:39:15.880323 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:39:15.880359 daemon-err , cfgd[1112]:  \"U2FsdGVkX19Hq1TV5T+QyiCUhW2HzE1o2vLqOtxgk/M=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2024-01-25 00:39:15.880395 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:39:15.883185 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX19Hq1TV5T+QyiCUhW2HzE1o2vLqOtxgk/M=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012
2024-01-25 00:39:16.515493 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+i/RVJgTICLzLEDHQkN4PbaXhoU+JPa/I=] finished with status 3
2024-01-25 00:39:16.515557 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:39:16.515594 daemon-err , cfgd[1112]:  \"U2FsdGVkX1+i/RVJgTICLzLEDHQkN4PbaXhoU+JPa/I=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2024-01-25 00:39:16.515633 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:39:16.518376 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+i/RVJgTICLzLEDHQkN4PbaXhoU+JPa/I=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012
2024-01-25 00:39:17.061297 daemon-err , cfgd[1112]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX19c6TdLh6w7bKHSUlitjy3x21vYoBC8wAM=] finished with status 3
2024-01-25 00:39:17.061364 daemon-err , cfgd[1112]:  [ system ntp authentication-key 1 encrypted-md5 ]
2024-01-25 00:39:17.061401 daemon-err , cfgd[1112]:  \"U2FsdGVkX19c6TdLh6w7bKHSUlitjy3x21vYoBC8wAM=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2024-01-25 00:39:17.061441 daemon-err , cfgd[1112]:  Commit validation failed
2024-01-25 00:39:17.064211 daemon-err , cfgd[1112]:  [28118]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX19c6TdLh6w7bKHSUlitjy3x21vYoBC8wAM=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012
2024-01-25 00:39:18.276842 daemon-err , cfgd[1112]:  [28118]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-01-25 00:39:18.764146 daemon-err , cfgd[1112]:  [28118]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-01-25 00:39:19.250166 daemon-err , cfgd[1112]:  [28118]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-01-25 00:39:19.789802 daemon-err , cfgd[1112]:  [28118]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012
2024-01-25 00:40:44.178458 syslog-info , rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="1502" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-01-25 00:40:44.179332 daemon-info , systemd[1]:  Stopping System Logging Service...
2024-01-25 00:40:44.179779 daemon-info , systemd[1]:  rsyslog.service: Succeeded.
2024-01-25 00:40:44.180112 daemon-info , systemd[1]:  Stopped System Logging Service.
2024-01-25 00:40:44.181529 daemon-info , systemd[1]:  Starting System Logging Service...
2024-01-25 00:40:44.185533 daemon-info , systemd[1]:  Started System Logging Service.
2024-01-25 00:40:44.187402 daemon-notice , cfgd[1112]:  [28118]Completed change to active configuration
2024-01-25 00:40:44.188214 syslog-info , rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.1901.0]
2024-01-25 00:40:44.188278 syslog-info , rsyslogd:   [origin software="rsyslogd" swVersion="8.1901.0" x-pid="8799" x-info="https://www.rsyslog.com"] start
2024-01-25 00:40:44.191186 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2024-01-25 00:40:44.243423 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2024-01-25 00:40:44.395716 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog file systemd_msg
set system syslog file systemd_msg level info
set system syslog file systemd_msg app systemd

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output contains the following tokens:

systemd[1]:  Started "DHCP Server Service instance main".
Show output
2024-01-25 00:40:52.595457 daemon-info , systemd[1]:  Stopping System Logging Service...
2024-01-25 00:40:52.595956 daemon-info , systemd[1]:  rsyslog.service: Succeeded.
2024-01-25 00:40:52.596296 daemon-info , systemd[1]:  Stopped System Logging Service.
2024-01-25 00:40:52.597675 daemon-info , systemd[1]:  Starting System Logging Service...
2024-01-25 00:40:52.601840 daemon-info , systemd[1]:  Started System Logging Service.
2024-01-25 00:40:53.266451 daemon-info , systemd[1]:  Started "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog file systemd_msg
set system syslog file systemd_msg level info
set system syslog file systemd_msg app systemd
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output contains the following tokens:

Started "DHCP Server Service instance main".
Show output
2024-01-25 00:41:01.513915 daemon-info , systemd[1]:  Stopping System Logging Service...
2024-01-25 00:41:01.514539 daemon-info , systemd[1]:  rsyslog.service: Succeeded.
2024-01-25 00:41:01.515005 daemon-info , systemd[1]:  Stopped System Logging Service.
2024-01-25 00:41:01.517217 daemon-info , systemd[1]:  Starting System Logging Service...
2024-01-25 00:41:01.523100 daemon-info , systemd[1]:  Started System Logging Service.
2024-01-25 00:41:02.260705 daemon-info , systemd[1]:  Started "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set interfaces ethernet eth0 address 10.215.168.64/24

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.188 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.188/0.188/0.188/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system syslog host 10.215.168.1 local-vrf VRF0
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than VRF0.
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.172 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.172/0.172/0.172/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set interfaces ethernet eth0 address 10.215.168.64/24
set system syslog host 10.215.168.1 local-interface eth0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.214 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.214/0.214/0.214/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set system syslog host 10.215.168.1 level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca running://ca.crt
set interfaces ethernet eth0 address 10.215.168.64/24

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.176 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.176/0.176/0.176/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx