Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2024-02-13 16:10:54.352395 auth-err , sshd[9830]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2024-02-13 16:10:54.352577 auth-err , sshd[9830]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2024-02-13 16:11:04.680556 authpriv-err , login[9844]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2024-02-13 16:11:04.680742 authpriv-err , login[9844]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2024-02-13 16:11:08.675958 daemon-err , modulelauncher[9873]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-02-13 16:11:08.676025 daemon-err , modulelauncher[9873]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-02-13 16:11:08.681271 daemon-err , modulelauncher[9873]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-02-13 16:11:08.681323 daemon-err , modulelauncher[9873]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-02-13 16:11:09.186418 authpriv-err , sshd[9966]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2024-02-13 16:11:09.186557 authpriv-err , sshd[9966]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-02-13 16:11:09.661728 authpriv-err , login[10008]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2024-02-13 16:11:09.661913 authpriv-err , login[10008]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-02-13 16:11:11.750598 daemon-err , modulelauncher[10066]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-02-13 16:11:11.750656 daemon-err , modulelauncher[10066]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-02-13 16:11:11.754932 daemon-err , modulelauncher[10066]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-02-13 16:11:11.754982 daemon-err , modulelauncher[10066]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-02-13 16:11:11.760310 daemon-err , modulelauncher[10066]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-02-13 16:11:11.760366 daemon-err , modulelauncher[10066]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-02-13 16:11:11.765866 daemon-err , modulelauncher[10066]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-02-13 16:11:11.765919 daemon-err , modulelauncher[10066]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-02-13 16:11:12.248825 authpriv-err , sshd[10100]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2024-02-13 16:11:12.249004 authpriv-err , sshd[10100]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-02-13 16:11:22.663179 authpriv-err , login[10109]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2024-02-13 16:11:22.663332 authpriv-err , login[10109]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-02-13 16:11:27.719171 daemon-err , modulelauncher[10138]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-02-13 16:11:27.719234 daemon-err , modulelauncher[10138]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-02-13 16:11:27.724599 daemon-err , modulelauncher[10138]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-02-13 16:11:27.724655 daemon-err , modulelauncher[10138]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-02-13 16:11:27.731442 daemon-err , modulelauncher[10138]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-02-13 16:11:27.731603 daemon-err , modulelauncher[10138]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-02-13 16:11:27.739524 daemon-err , modulelauncher[10138]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-02-13 16:11:27.739610 daemon-err , modulelauncher[10138]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-02-13 16:11:28.342898 authpriv-err , sshd[10200]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-02-13 16:11:28.343052 authpriv-err , sshd[10200]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-02-13 16:11:28.768538 authpriv-err , login[10242]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-02-13 16:11:28.768717 authpriv-err , login[10242]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-02-13 16:11:30.596252 daemon-err , modulelauncher[10302]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-02-13 16:11:30.596310 daemon-err , modulelauncher[10302]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-02-13 16:11:30.601120 daemon-err , modulelauncher[10302]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-02-13 16:11:30.601187 daemon-err , modulelauncher[10302]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-02-13 16:11:30.608569 daemon-err , modulelauncher[10302]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-02-13 16:11:30.608643 daemon-err , modulelauncher[10302]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-02-13 16:11:30.615501 daemon-err , modulelauncher[10302]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-02-13 16:11:30.615586 daemon-err , modulelauncher[10302]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-02-13 16:11:31.173983 authpriv-err , sshd[10336]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-02-13 16:11:31.174169 authpriv-err , sshd[10336]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2024-02-13 16:11:41.622754 authpriv-err , login[10347]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2024-02-13 16:11:41.622962 authpriv-err , login[10347]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2024-02-13 16:11:48.758701 daemon-err , staticd[1261]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 282 2024-02-13 16:11:48.758799 daemon-err , staticd[1261]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 282 2024-02-13 16:12:04.045896 daemon-err , modulelauncher[11174]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0 2024-02-13 16:12:04.045965 daemon-err , modulelauncher[11174]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2024-02-13 16:12:04.052420 daemon-err , modulelauncher[11174]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2024-02-13 16:12:04.052497 daemon-err , modulelauncher[11174]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2024-02-13 16:12:04.060741 daemon-err , modulelauncher[11174]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2024-02-13 16:12:04.060822 daemon-err , modulelauncher[11174]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2024-02-13 16:12:13.692922 daemon-err , modulelauncher[11564]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0 2024-02-13 16:12:13.692991 daemon-err , modulelauncher[11564]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2024-02-13 16:12:13.698686 daemon-err , modulelauncher[11564]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2024-02-13 16:12:13.698747 daemon-err , modulelauncher[11564]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2024-02-13 16:12:13.707502 daemon-err , modulelauncher[11564]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2024-02-13 16:12:13.707567 daemon-err , modulelauncher[11564]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2024-02-13 16:12:15.185959 daemon-err , modulelauncher[11714]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0 2024-02-13 16:12:15.186014 daemon-err , modulelauncher[11714]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2024-02-13 16:12:15.190883 daemon-err , modulelauncher[11714]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2024-02-13 16:12:15.190936 daemon-err , modulelauncher[11714]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2024-02-13 16:12:15.196345 daemon-err , modulelauncher[11714]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2024-02-13 16:12:15.196398 daemon-err , modulelauncher[11714]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2024-02-13 16:13:04.859141 daemon-err , modulelauncher[13431]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-02-13 16:13:04.859205 daemon-err , modulelauncher[13431]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-02-13 16:13:04.866108 daemon-err , modulelauncher[13431]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-02-13 16:13:04.866165 daemon-err , modulelauncher[13431]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-02-13 16:13:13.982066 daemon-err , modulelauncher[13812]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-02-13 16:13:13.982115 daemon-err , modulelauncher[13812]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-02-13 16:13:13.988563 daemon-err , modulelauncher[13812]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-02-13 16:13:13.988612 daemon-err , modulelauncher[13812]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-02-13 16:13:15.440000 daemon-err , modulelauncher[13958]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard 2024-02-13 16:13:15.440047 daemon-err , modulelauncher[13958]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusstandard' returned non-zero exit status 9 2024-02-13 16:13:15.446069 daemon-err , modulelauncher[13958]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged 2024-02-13 16:13:15.446120 daemon-err , modulelauncher[13958]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/radius_shell' radiusprivileged' returned non-zero exit status 9 2024-02-13 16:15:14.959586 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2024-02-13 16:15:17.189069 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2024-02-13 16:15:29.244235 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2024-02-13 16:15:29.996145 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2024-02-13 16:15:41.468520 daemon-err , modulelauncher[20063]: osdx.utils.xos cmd error: useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0 2024-02-13 16:15:41.468574 daemon-err , modulelauncher[20063]: Command 'useradd -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs0' returned non-zero exit status 9 2024-02-13 16:15:41.472994 daemon-err , modulelauncher[20063]: osdx.utils.xos cmd error: useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5 2024-02-13 16:15:41.473041 daemon-err , modulelauncher[20063]: Command 'useradd -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs5' returned non-zero exit status 9 2024-02-13 16:15:41.479788 daemon-err , modulelauncher[20063]: osdx.utils.xos cmd error: useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15 2024-02-13 16:15:41.479839 daemon-err , modulelauncher[20063]: Command 'useradd -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' -m -N -s '/sbin/tacacs_shell' tacacs15' returned non-zero exit status 9 2024-02-13 16:15:42.288333 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2024-02-13 16:15:43.027660 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2024-02-13 16:15:54.058915 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX18b0wfunMlPbt9MOHWStbwM6HnOyXtApIM=] finished with status 1 2024-02-13 16:15:54.058984 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:15:54.059021 daemon-err , cfgd[1320]: \"U2FsdGVkX18b0wfunMlPbt9MOHWStbwM6HnOyXtApIM=\" strong-password: score is too weak 2024-02-13 16:15:54.059061 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:15:54.063093 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX18b0wfunMlPbt9MOHWStbwM6HnOyXtApIM=\" strong-password: score is too weak#012Commit validation failed#012 2024-02-13 16:16:05.738466 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1/YgbYcjj6LVQYNqoSWW/Ea7BP7rDfSfE8=] finished with status 1 2024-02-13 16:16:05.738542 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:16:05.738580 daemon-err , cfgd[1320]: \"U2FsdGVkX1/YgbYcjj6LVQYNqoSWW/Ea7BP7rDfSfE8=\" strong-password: score is too weak 2024-02-13 16:16:05.738615 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:16:05.741669 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1/YgbYcjj6LVQYNqoSWW/Ea7BP7rDfSfE8=\" strong-password: score is too weak#012Commit validation failed#012 2024-02-13 16:16:09.182921 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1/YgbYcjj6LVQYNqoSWW/Ea7BP7rDfSfE8=] finished with status 1 2024-02-13 16:16:09.183004 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:16:09.183057 daemon-err , cfgd[1320]: \"U2FsdGVkX1/YgbYcjj6LVQYNqoSWW/Ea7BP7rDfSfE8=\" strong-password: score is too weak 2024-02-13 16:16:09.183107 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:16:09.187233 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1/YgbYcjj6LVQYNqoSWW/Ea7BP7rDfSfE8=\" strong-password: score is too weak#012Commit validation failed#012 2024-02-13 16:16:09.900961 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1/YgbYcjj6LVdWtwo0rFy9qdooaKkiWe9E=] finished with status 1 2024-02-13 16:16:09.901032 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:16:09.901071 daemon-err , cfgd[1320]: \"U2FsdGVkX1/YgbYcjj6LVdWtwo0rFy9qdooaKkiWe9E=\" strong-password: score is too weak 2024-02-13 16:16:09.901107 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:16:09.904086 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1/YgbYcjj6LVdWtwo0rFy9qdooaKkiWe9E=\" strong-password: score is too weak#012Commit validation failed#012 2024-02-13 16:16:12.367142 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1/YgbYcjj6LVQYNqoSWW/Ea7BP7rDfSfE8=] finished with status 1 2024-02-13 16:16:12.367211 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:16:12.367248 daemon-err , cfgd[1320]: \"U2FsdGVkX1/YgbYcjj6LVQYNqoSWW/Ea7BP7rDfSfE8=\" strong-password: score is too weak 2024-02-13 16:16:12.367283 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:16:12.370265 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1/YgbYcjj6LVQYNqoSWW/Ea7BP7rDfSfE8=\" strong-password: score is too weak#012Commit validation failed#012 2024-02-13 16:16:12.929521 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1/YgbYcjj6LVdWtwo0rFy9qdooaKkiWe9E=] finished with status 1 2024-02-13 16:16:12.929608 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:16:12.929663 daemon-err , cfgd[1320]: \"U2FsdGVkX1/YgbYcjj6LVdWtwo0rFy9qdooaKkiWe9E=\" strong-password: score is too weak 2024-02-13 16:16:12.929719 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:16:12.933798 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1/YgbYcjj6LVdWtwo0rFy9qdooaKkiWe9E=\" strong-password: score is too weak#012Commit validation failed#012 2024-02-13 16:16:13.514269 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1/YgbYcjj6LVQ7zqQ2rO/dKZgLd6OHGcLs=] finished with status 1 2024-02-13 16:16:13.514366 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:16:13.514420 daemon-err , cfgd[1320]: \"U2FsdGVkX1/YgbYcjj6LVQ7zqQ2rO/dKZgLd6OHGcLs=\" strong-password: score is too weak 2024-02-13 16:16:13.514474 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:16:13.518710 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1/YgbYcjj6LVQ7zqQ2rO/dKZgLd6OHGcLs=\" strong-password: score is too weak#012Commit validation failed#012 2024-02-13 16:16:15.477125 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1/YgbYcjj6LVQYNqoSWW/Ea7BP7rDfSfE8=] finished with status 1 2024-02-13 16:16:15.477193 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:16:15.477237 daemon-err , cfgd[1320]: \"U2FsdGVkX1/YgbYcjj6LVQYNqoSWW/Ea7BP7rDfSfE8=\" strong-password: score is too weak 2024-02-13 16:16:15.477274 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:16:15.480418 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1/YgbYcjj6LVQYNqoSWW/Ea7BP7rDfSfE8=\" strong-password: score is too weak#012Commit validation failed#012 2024-02-13 16:16:16.128239 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1/YgbYcjj6LVdWtwo0rFy9qdooaKkiWe9E=] finished with status 1 2024-02-13 16:16:16.128327 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:16:16.128365 daemon-err , cfgd[1320]: \"U2FsdGVkX1/YgbYcjj6LVdWtwo0rFy9qdooaKkiWe9E=\" strong-password: score is too weak 2024-02-13 16:16:16.128406 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:16:16.131455 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1/YgbYcjj6LVdWtwo0rFy9qdooaKkiWe9E=\" strong-password: score is too weak#012Commit validation failed#012 2024-02-13 16:16:16.840809 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1/YgbYcjj6LVQ7zqQ2rO/dKZgLd6OHGcLs=] finished with status 1 2024-02-13 16:16:16.840876 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:16:16.840913 daemon-err , cfgd[1320]: \"U2FsdGVkX1/YgbYcjj6LVQ7zqQ2rO/dKZgLd6OHGcLs=\" strong-password: score is too weak 2024-02-13 16:16:16.840953 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:16:16.843861 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1/YgbYcjj6LVQ7zqQ2rO/dKZgLd6OHGcLs=\" strong-password: score is too weak#012Commit validation failed#012 2024-02-13 16:16:17.509809 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1/YgbYcjj6LVWMbgnaPVAk76eqgRkS28DA=] finished with status 1 2024-02-13 16:16:17.509908 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:16:17.509961 daemon-err , cfgd[1320]: \"U2FsdGVkX1/YgbYcjj6LVWMbgnaPVAk76eqgRkS28DA=\" strong-password: score is too weak 2024-02-13 16:16:17.510013 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:16:17.514512 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1/YgbYcjj6LVWMbgnaPVAk76eqgRkS28DA=\" strong-password: score is too weak#012Commit validation failed#012 2024-02-13 16:16:42.792525 daemon-err , cfgd[1320]: [20216]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-02-13 16:16:43.285017 daemon-err , cfgd[1320]: [20216]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-02-13 16:16:55.773144 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX18bG4KD2rz+NUvKtq78SEMiBKX8LdGayxk=] finished with status 1 2024-02-13 16:16:55.773230 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:16:55.773290 daemon-err , cfgd[1320]: \"U2FsdGVkX18bG4KD2rz+NUvKtq78SEMiBKX8LdGayxk=\" strong-password: score is too weak 2024-02-13 16:16:55.773338 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:16:55.777537 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX18bG4KD2rz+NUvKtq78SEMiBKX8LdGayxk=\" strong-password: score is too weak#012Commit validation failed#012 2024-02-13 16:16:56.384899 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX199wFZarfD1gMF9Qwt7MWFRK2jqlBMSJ2k=] finished with status 1 2024-02-13 16:16:56.384968 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:16:56.385005 daemon-err , cfgd[1320]: \"U2FsdGVkX199wFZarfD1gMF9Qwt7MWFRK2jqlBMSJ2k=\" strong-password: score is too weak 2024-02-13 16:16:56.385040 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:16:56.388043 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX199wFZarfD1gMF9Qwt7MWFRK2jqlBMSJ2k=\" strong-password: score is too weak#012Commit validation failed#012 2024-02-13 16:17:05.338333 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX195twVWlKwTANzu0GiXHD09ABeA+5s4nA8=] finished with status 2 2024-02-13 16:17:05.338415 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:17:05.338473 daemon-err , cfgd[1320]: \"U2FsdGVkX195twVWlKwTANzu0GiXHD09ABeA+5s4nA8=\" strong-password: not long enough 2024-02-13 16:17:05.338522 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:17:05.342538 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX195twVWlKwTANzu0GiXHD09ABeA+5s4nA8=\" strong-password: not long enough#012Commit validation failed#012 2024-02-13 16:17:13.345938 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1/Tjq+QrNT00wOtu6gDqPjDsq1HRCSEokQ=] finished with status 3 2024-02-13 16:17:13.346020 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:17:13.346077 daemon-err , cfgd[1320]: \"U2FsdGVkX1/Tjq+QrNT00wOtu6gDqPjDsq1HRCSEokQ=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-02-13 16:17:13.346139 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:17:13.350313 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1/Tjq+QrNT00wOtu6gDqPjDsq1HRCSEokQ=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-02-13 16:17:13.965745 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1+D/QQQKaIEhDTt9hnNGMc/V58Gy3sWg0Y=] finished with status 3 2024-02-13 16:17:13.965833 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:17:13.965889 daemon-err , cfgd[1320]: \"U2FsdGVkX1+D/QQQKaIEhDTt9hnNGMc/V58Gy3sWg0Y=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-02-13 16:17:13.965938 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:17:13.968733 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1+D/QQQKaIEhDTt9hnNGMc/V58Gy3sWg0Y=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-02-13 16:17:14.579543 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX1/2McM6bZx3pcmjHLFbinkxcxDgSFHEDtM=] finished with status 3 2024-02-13 16:17:14.579614 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:17:14.579651 daemon-err , cfgd[1320]: \"U2FsdGVkX1/2McM6bZx3pcmjHLFbinkxcxDgSFHEDtM=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-02-13 16:17:14.579685 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:17:14.582513 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX1/2McM6bZx3pcmjHLFbinkxcxDgSFHEDtM=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-02-13 16:17:15.205217 daemon-err , cfgd[1320]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-md5 U2FsdGVkX198dgQfq7/GVNj6BHCXXzTDbWA+Iq07AjQ=] finished with status 3 2024-02-13 16:17:15.205308 daemon-err , cfgd[1320]: [ system ntp authentication-key 1 encrypted-md5 ] 2024-02-13 16:17:15.205359 daemon-err , cfgd[1320]: \"U2FsdGVkX198dgQfq7/GVNj6BHCXXzTDbWA+Iq07AjQ=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2024-02-13 16:17:15.205410 daemon-err , cfgd[1320]: Commit validation failed 2024-02-13 16:17:15.209236 daemon-err , cfgd[1320]: [20216]Command output:#012[ system ntp authentication-key 1 encrypted-md5 ]#012\"U2FsdGVkX198dgQfq7/GVNj6BHCXXzTDbWA+Iq07AjQ=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters#012Commit validation failed#012 2024-02-13 16:17:16.299897 daemon-err , cfgd[1320]: [20216]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-02-13 16:17:16.840893 daemon-err , cfgd[1320]: [20216]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-02-13 16:17:17.457958 daemon-err , cfgd[1320]: [20216]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-02-13 16:17:18.036948 daemon-err , cfgd[1320]: [20216]Command output:#012Login password too weak, too short and/or has not lowercase, uppercase and special characters#012Value validation failed#012 2024-02-13 16:17:33.105890 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="13921" x-info="https://www.rsyslog.com"] exiting on signal 15. 2024-02-13 16:17:33.107011 daemon-info , systemd[1]: Stopping System Logging Service... 2024-02-13 16:17:33.107676 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-02-13 16:17:33.108172 daemon-info , systemd[1]: Stopped System Logging Service. 2024-02-13 16:17:33.110353 daemon-info , systemd[1]: Starting System Logging Service... 2024-02-13 16:17:33.115782 daemon-info , systemd[1]: Started System Logging Service. 2024-02-13 16:17:33.118340 daemon-notice , cfgd[1320]: [20216]Completed change to active configuration 2024-02-13 16:17:33.119530 syslog-info , rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] 2024-02-13 16:17:33.119639 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="23428" x-info="https://www.rsyslog.com"] start 2024-02-13 16:17:33.122573 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2024-02-13 16:17:33.150234 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2024-02-13 16:17:33.296510 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog file systemd_msg set system syslog file systemd_msg level info set system syslog file systemd_msg app systemd
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output contains the following tokens:
systemd[1]: Started "DHCP Server Service instance main".Show output
2024-02-13 16:17:41.175143 daemon-info , systemd[1]: Stopping System Logging Service... 2024-02-13 16:17:41.175590 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-02-13 16:17:41.175953 daemon-info , systemd[1]: Stopped System Logging Service. 2024-02-13 16:17:41.177359 daemon-info , systemd[1]: Starting System Logging Service... 2024-02-13 16:17:41.181473 daemon-info , systemd[1]: Started System Logging Service. 2024-02-13 16:17:41.829292 daemon-info , systemd[1]: Started "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog file systemd_msg set system syslog file systemd_msg level info set system syslog file systemd_msg app systemd set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output contains the following tokens:
Started "DHCP Server Service instance main".Show output
2024-02-13 16:17:50.775763 daemon-info , systemd[1]: Stopping System Logging Service... 2024-02-13 16:17:50.776200 daemon-info , systemd[1]: rsyslog.service: Succeeded. 2024-02-13 16:17:50.776542 daemon-info , systemd[1]: Stopped System Logging Service. 2024-02-13 16:17:50.777868 daemon-info , systemd[1]: Starting System Logging Service... 2024-02-13 16:17:50.782010 daemon-info , systemd[1]: Started System Logging Service. 2024-02-13 16:17:51.474209 daemon-info , systemd[1]: Started "DHCP Server Service instance main".
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set interfaces ethernet eth0 address 10.215.168.64/24
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.159 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.159/0.159/0.159/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system syslog host 10.215.168.1 local-vrf VRF0 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than VRF0. PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.188 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.188/0.188/0.188/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set interfaces ethernet eth0 address 10.215.168.64/24 set system syslog host 10.215.168.1 local-interface eth0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.216 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.216/0.216/0.216/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set system syslog host 10.215.168.1 level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca running://ca.crt set interfaces ethernet eth0 address 10.215.168.64/24
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.165 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.165/0.165/0.165/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx