Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2024-12-04 16:42:24.894055 daemon-err , modulelauncher[320223]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-12-04 16:42:24.895650 daemon-err , modulelauncher[320223]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-12-04 16:42:24.895668 daemon-err , modulelauncher[320223]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-12-04 16:42:50.606954 daemon-err , modulelauncher[320371]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-12-04 16:42:50.606980 daemon-err , modulelauncher[320371]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-12-04 16:42:50.608580 daemon-err , modulelauncher[320371]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-12-04 16:42:50.608598 daemon-err , modulelauncher[320371]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-12-04 16:42:50.610610 daemon-err , modulelauncher[320371]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-12-04 16:42:50.610631 daemon-err , modulelauncher[320371]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-12-04 16:42:50.612606 daemon-err , modulelauncher[320371]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-12-04 16:42:50.612623 daemon-err , modulelauncher[320371]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-12-04 16:43:17.282750 daemon-err , modulelauncher[320461]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-12-04 16:43:17.282787 daemon-err , modulelauncher[320461]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-12-04 16:43:17.285221 daemon-err , modulelauncher[320461]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-12-04 16:43:17.285253 daemon-err , modulelauncher[320461]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-12-04 16:43:17.287505 daemon-err , modulelauncher[320461]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-12-04 16:43:17.287562 daemon-err , modulelauncher[320461]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-12-04 16:43:17.290097 daemon-err , modulelauncher[320461]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-12-04 16:43:17.290123 daemon-err , modulelauncher[320461]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-12-04 16:43:43.738415 daemon-err , modulelauncher[320574]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-12-04 16:43:43.738445 daemon-err , modulelauncher[320574]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-12-04 16:43:43.740974 daemon-err , modulelauncher[320574]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-12-04 16:43:43.740992 daemon-err , modulelauncher[320574]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-12-04 16:43:43.743330 daemon-err , modulelauncher[320574]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-12-04 16:43:43.743353 daemon-err , modulelauncher[320574]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-12-04 16:43:43.745314 daemon-err , modulelauncher[320574]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-12-04 16:43:43.745337 daemon-err , modulelauncher[320574]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-12-04 16:44:09.262902 daemon-err , modulelauncher[320661]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2024-12-04 16:44:09.262922 daemon-err , modulelauncher[320661]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2024-12-04 16:44:09.264707 daemon-err , modulelauncher[320661]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2024-12-04 16:44:09.264723 daemon-err , modulelauncher[320661]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2024-12-04 16:44:09.266955 daemon-err , modulelauncher[320661]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2024-12-04 16:44:09.266971 daemon-err , modulelauncher[320661]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2024-12-04 16:44:09.745330 auth-err , sshd[320763]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:09.745378 auth-err , sshd[320763]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:09.751607 auth-err , sshd[320763]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:09.751627 auth-err , sshd[320763]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:10.112953 authpriv-err , login[320805]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:10.113025 authpriv-err , login[320805]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:10.113269 authpriv-err , login[320805]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:10.113334 authpriv-err , login[320805]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:10.116649 authpriv-err , login[320805]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:10.116683 authpriv-err , login[320805]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:11.319325 daemon-err , modulelauncher[320873]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2024-12-04 16:44:11.319352 daemon-err , modulelauncher[320873]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2024-12-04 16:44:11.321740 daemon-err , modulelauncher[320873]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2024-12-04 16:44:11.321758 daemon-err , modulelauncher[320873]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2024-12-04 16:44:11.324158 daemon-err , modulelauncher[320873]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2024-12-04 16:44:11.324174 daemon-err , modulelauncher[320873]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2024-12-04 16:44:11.326887 daemon-err , modulelauncher[320873]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2024-12-04 16:44:11.326904 daemon-err , modulelauncher[320873]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2024-12-04 16:44:11.329350 daemon-err , modulelauncher[320873]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2024-12-04 16:44:11.329366 daemon-err , modulelauncher[320873]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2024-12-04 16:44:11.331371 daemon-err , modulelauncher[320873]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2024-12-04 16:44:11.331398 daemon-err , modulelauncher[320873]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2024-12-04 16:44:11.735690 auth-err , sshd[320909]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:11.735826 auth-err , sshd[320909]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:32.037538 authpriv-err , login[320918]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:32.037626 authpriv-err , login[320918]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:36.947024 daemon-err , modulelauncher[320960]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2024-12-04 16:44:36.947054 daemon-err , modulelauncher[320960]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2024-12-04 16:44:36.948700 daemon-err , modulelauncher[320960]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2024-12-04 16:44:36.948716 daemon-err , modulelauncher[320960]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2024-12-04 16:44:36.950381 daemon-err , modulelauncher[320960]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2024-12-04 16:44:36.950400 daemon-err , modulelauncher[320960]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2024-12-04 16:44:36.952191 daemon-err , modulelauncher[320960]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2024-12-04 16:44:36.952206 daemon-err , modulelauncher[320960]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2024-12-04 16:44:36.953912 daemon-err , modulelauncher[320960]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2024-12-04 16:44:36.953927 daemon-err , modulelauncher[320960]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2024-12-04 16:44:36.955869 daemon-err , modulelauncher[320960]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2024-12-04 16:44:36.955886 daemon-err , modulelauncher[320960]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2024-12-04 16:44:37.496714 auth-err , sshd[321026]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2024-12-04 16:44:37.496779 auth-err , sshd[321026]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2024-12-04 16:44:37.503015 auth-err , sshd[321026]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2024-12-04 16:44:37.503044 auth-err , sshd[321026]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2024-12-04 16:44:37.905895 authpriv-err , login[321068]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2024-12-04 16:44:37.905939 authpriv-err , login[321068]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2024-12-04 16:44:37.906343 authpriv-err , login[321068]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:37.906395 authpriv-err , login[321068]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2024-12-04 16:44:37.912119 authpriv-err , login[321068]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2024-12-04 16:44:37.912146 authpriv-err , login[321068]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2024-12-04 16:44:39.623091 daemon-err , modulelauncher[321139]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2024-12-04 16:44:39.623117 daemon-err , modulelauncher[321139]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2024-12-04 16:44:39.624918 daemon-err , modulelauncher[321139]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2024-12-04 16:44:39.624933 daemon-err , modulelauncher[321139]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2024-12-04 16:44:39.626913 daemon-err , modulelauncher[321139]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2024-12-04 16:44:39.626936 daemon-err , modulelauncher[321139]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2024-12-04 16:44:39.628985 daemon-err , modulelauncher[321139]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2024-12-04 16:44:39.629006 daemon-err , modulelauncher[321139]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2024-12-04 16:44:39.630849 daemon-err , modulelauncher[321139]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2024-12-04 16:44:39.630873 daemon-err , modulelauncher[321139]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2024-12-04 16:44:39.633190 daemon-err , modulelauncher[321139]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2024-12-04 16:44:39.633207 daemon-err , modulelauncher[321139]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2024-12-04 16:44:40.121275 auth-err , sshd[321175]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2024-12-04 16:44:40.121338 auth-err , sshd[321175]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2024-12-04 16:45:00.448681 authpriv-err , login[321184]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2024-12-04 16:45:00.448726 authpriv-err , login[321184]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2024-12-04 16:45:05.718106 daemon-err , modulelauncher[321228]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-12-04 16:45:05.718143 daemon-err , modulelauncher[321228]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-12-04 16:45:05.719791 daemon-err , modulelauncher[321228]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-12-04 16:45:05.719816 daemon-err , modulelauncher[321228]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-12-04 16:45:06.249596 authpriv-err , sshd[321331]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2024-12-04 16:45:06.249673 authpriv-err , sshd[321331]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2024-12-04 16:45:06.606417 authpriv-err , login[321374]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2024-12-04 16:45:06.606485 authpriv-err , login[321374]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2024-12-04 16:45:07.858732 daemon-err , modulelauncher[321443]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-12-04 16:45:07.858756 daemon-err , modulelauncher[321443]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-12-04 16:45:07.860324 daemon-err , modulelauncher[321443]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-12-04 16:45:07.860366 daemon-err , modulelauncher[321443]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-12-04 16:45:07.862204 daemon-err , modulelauncher[321443]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-12-04 16:45:07.862227 daemon-err , modulelauncher[321443]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-12-04 16:45:07.863933 daemon-err , modulelauncher[321443]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-12-04 16:45:07.863965 daemon-err , modulelauncher[321443]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-12-04 16:45:08.253120 authpriv-err , sshd[321477]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2024-12-04 16:45:08.253168 authpriv-err , sshd[321477]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2024-12-04 16:45:28.562494 authpriv-err , login[321486]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2024-12-04 16:45:28.562539 authpriv-err , login[321486]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2024-12-04 16:45:33.137164 daemon-err , modulelauncher[321526]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-12-04 16:45:33.137190 daemon-err , modulelauncher[321526]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-12-04 16:45:33.139469 daemon-err , modulelauncher[321526]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-12-04 16:45:33.139486 daemon-err , modulelauncher[321526]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-12-04 16:45:33.141784 daemon-err , modulelauncher[321526]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-12-04 16:45:33.141809 daemon-err , modulelauncher[321526]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-12-04 16:45:33.143525 daemon-err , modulelauncher[321526]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-12-04 16:45:33.143545 daemon-err , modulelauncher[321526]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-12-04 16:45:33.636330 authpriv-err , sshd[321590]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-12-04 16:45:33.636382 authpriv-err , sshd[321590]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2024-12-04 16:45:33.985241 authpriv-err , login[321632]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-12-04 16:45:33.985377 authpriv-err , login[321632]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2024-12-04 16:45:35.474725 daemon-err , modulelauncher[321704]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-12-04 16:45:35.474746 daemon-err , modulelauncher[321704]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-12-04 16:45:35.476781 daemon-err , modulelauncher[321704]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-12-04 16:45:35.476803 daemon-err , modulelauncher[321704]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-12-04 16:45:35.478688 daemon-err , modulelauncher[321704]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2024-12-04 16:45:35.478705 daemon-err , modulelauncher[321704]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2024-12-04 16:45:35.480426 daemon-err , modulelauncher[321704]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2024-12-04 16:45:35.480470 daemon-err , modulelauncher[321704]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2024-12-04 16:45:36.012253 authpriv-err , sshd[321738]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-12-04 16:45:36.012331 authpriv-err , sshd[321738]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2024-12-04 16:45:56.346949 authpriv-err , login[321748]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2024-12-04 16:45:56.346992 authpriv-err , login[321748]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2024-12-04 16:46:02.143793 user-err , ERROR:  Dissociating VRF from service: cnm
2024-12-04 16:46:02.213300 daemon-err , staticd[1209]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 301
2024-12-04 16:46:02.213352 daemon-err , staticd[1209]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 301
2024-12-04 16:46:12.545617 daemon-err , modulelauncher[322601]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2024-12-04 16:46:12.545642 daemon-err , modulelauncher[322601]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2024-12-04 16:46:12.547557 daemon-err , modulelauncher[322601]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2024-12-04 16:46:12.547574 daemon-err , modulelauncher[322601]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2024-12-04 16:46:12.549591 daemon-err , modulelauncher[322601]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2024-12-04 16:46:12.549617 daemon-err , modulelauncher[322601]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2024-12-04 16:46:19.186602 daemon-err , modulelauncher[322974]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2024-12-04 16:46:19.186625 daemon-err , modulelauncher[322974]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2024-12-04 16:46:19.188334 daemon-err , modulelauncher[322974]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2024-12-04 16:46:19.188351 daemon-err , modulelauncher[322974]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2024-12-04 16:46:19.190252 daemon-err , modulelauncher[322974]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2024-12-04 16:46:19.190274 daemon-err , modulelauncher[322974]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2024-12-04 16:46:20.619587 daemon-err , modulelauncher[323154]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2024-12-04 16:46:20.619613 daemon-err , modulelauncher[323154]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2024-12-04 16:46:20.621697 daemon-err , modulelauncher[323154]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2024-12-04 16:46:20.621714 daemon-err , modulelauncher[323154]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2024-12-04 16:46:20.623725 daemon-err , modulelauncher[323154]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2024-12-04 16:46:20.623748 daemon-err , modulelauncher[323154]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2024-12-04 16:48:00.480565 local0-notice , osdx-reboot:  shutdown v4.1.1.4 2024-12-04 14:28:25 - 2024-12-04 16:48:00 (up 2 hours, 19 minutes)
2024-12-04 16:48:00.502278 local0-notice , osdx-reboot:  bootup v4.1.1.4 2024-12-04 16:48:00 (reason: Power Failure)
2024-12-04 16:48:07.627799 local0-notice , osdx-reboot:  shutdown v4.1.1.4 2024-12-04 14:28:25 - 2024-12-04 16:48:07 (up 2 hours, 19 minutes)
2024-12-04 16:48:07.649217 local0-notice , osdx-reboot:  bootup v4.1.1.4 2024-12-04 16:48:07 (reason: Power Failure)
2024-12-04 16:48:10.309273 local0-notice , osdx-reboot:  shutdown v4.1.1.4 2024-12-04 14:28:24 - 2024-12-04 16:48:10 (up 2 hours, 19 minutes)
2024-12-04 16:48:10.327800 local0-notice , osdx-reboot:  bootup v4.1.1.4 2024-12-04 16:48:10 (reason: Power Failure)
2024-12-04 16:48:17.588130 local0-notice , osdx-reboot:  shutdown v4.1.1.4 2024-12-04 14:28:24 - 2024-12-04 16:48:17 (up 2 hours, 19 minutes)
2024-12-04 16:48:17.607184 local0-notice , osdx-reboot:  bootup v4.1.1.4 2024-12-04 16:48:17 (reason: Power Failure)
2024-12-04 16:48:26.320545 local0-notice , osdx-reboot:  shutdown v4.1.1.4 2024-12-04 14:28:25 - 2024-12-04 16:48:26 (up 2 hours, 20 minutes)
2024-12-04 16:48:26.339938 local0-notice , osdx-reboot:  bootup v4.1.1.4 2024-12-04 16:48:26 (reason: Power Failure)
2024-12-04 16:48:28.384264 local0-notice , osdx-reboot:  shutdown v4.1.1.4 2024-12-04 14:28:25 - 2024-12-04 16:48:28 (up 2 hours, 20 minutes)
2024-12-04 16:48:28.406737 local0-notice , osdx-reboot:  bootup v4.1.1.4 2024-12-04 16:48:28 (reason: Power Failure)
2024-12-04 16:48:39.989743 daemon-err , cfgd[1239]:  [ interfaces ethernet eth0 alarm down ]
2024-12-04 16:48:39.989895 daemon-err , cfgd[1239]:  \"system alarm ALARM_TO_TEST\" does not exist
2024-12-04 16:48:39.989979 daemon-err , cfgd[1239]:  Commit validation failed
2024-12-04 16:48:39.992084 daemon-err , cfgd[1239]:  [339493]Command output:#012[ interfaces ethernet eth0 alarm down ]#012\"system alarm ALARM_TO_TEST\" does not exist#012Commit validation failed#012
2024-12-04 16:48:47.886544 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2024-12-04 16:48:47.941672 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2024-12-04 16:48:58.069536 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2024-12-04 16:49:07.148936 user-err , OSDxCLI:  Unable to open config file /etc/aaa/tacacs/acct-tacgroup1: No such file or directory
2024-12-04 16:50:41.173207 daemon-err , cfgd[1239]:  External python command [op.pki scep info CSR] finished with status 1
2024-12-04 16:51:01.238428 daemon-err , cfgd[1239]:  External python command [op.pki scep info CSR] finished with status 1
2024-12-04 16:51:07.296245 user-err , scep_controller:  Failed to get CA certificate for CSR 'CSR'
2024-12-04 16:51:27.762368 daemon-err , modulelauncher[343494]:  osdx.utils.xos cmd error: swanctl -q
2024-12-04 16:51:27.762411 daemon-err , modulelauncher[343494]:  Command 'swanctl -q' returned non-zero exit status 22.
2024-12-04 16:51:27.822570 daemon-err , cfgd[1239]:  External python command [op.pki scep info CSR] finished with status 1
2024-12-04 16:51:59.277867 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-12-04 16:51:59.278030 syslog-info , rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="339616" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-12-04 16:51:59.278588 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2024-12-04 16:51:59.278723 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-12-04 16:51:59.302769 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-12-04 16:51:59.304439 syslog-info , rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-12-04 16:51:59.304478 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2024-12-04 16:51:59.304511 syslog-info , rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="343938" x-info="https://www.rsyslog.com"] start
2024-12-04 16:51:59.305092 daemon-notice , cfgd[1239]:  [340614]Completed change to active configuration
2024-12-04 16:51:59.307270 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2024-12-04 16:51:59.326471 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2024-12-04 16:51:59.449102 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2024-12-04 16:52:05.433477 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-12-04 16:52:05.434201 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2024-12-04 16:52:05.434334 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-12-04 16:52:05.454733 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-12-04 16:52:05.456500 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2024-12-04 16:52:06.130702 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2024-12-04 16:52:11.532269 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-12-04 16:52:11.532796 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2024-12-04 16:52:11.532831 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-12-04 16:52:11.547426 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-12-04 16:52:11.549310 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2024-12-04 16:52:12.215448 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.154 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.154/0.154/0.154/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-12-04T16:52:18.198125+00:00 10.215.168.64  2024-12-04T16:52:17.640445+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-12-04T16:52:18.198125+00:00 10.215.168.64  2024-12-04T16:52:17.640593+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="344541" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-12-04T16:52:18.198125+00:00 10.215.168.64  2024-12-04T16:52:17.640892+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-12-04T16:52:18.198125+00:00 10.215.168.64  2024-12-04T16:52:17.640986+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-12-04T16:52:18.198125+00:00 10.215.168.64  2024-12-04T16:52:17.664225+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-12-04T16:52:18.198125+00:00 10.215.168.64  2024-12-04T16:52:17.666011+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-12-04T16:52:18.198125+00:00 10.215.168.64  2024-12-04T16:52:17.666042+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="344673" x-info="https://www.rsyslog.com"] start
2024-12-04T16:52:18.198125+00:00 10.215.168.64  2024-12-04T16:52:17.666066+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-12-04T16:52:18.198265+00:00 10.215.168.64  2024-12-04T16:52:17.667270+00:00 daemon-notice osdx cfgd[1239]:  [340614]Completed change to active configuration
2024-12-04T16:52:18.225058+00:00 10.215.168.64  2024-12-04T16:52:17.692892+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-12-04T16:52:18.240407+00:00 10.215.168.64  2024-12-04T16:52:17.709331+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-12-04T16:52:18.412930+00:00 10.215.168.64  2024-12-04T16:52:17.881824+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-12-04T16:52:18.478713+00:00 10.215.168.64  2024-12-04T16:52:17.947552+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.236 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.236/0.236/0.236/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-12-04T16:52:18.911977+00:00 10.215.168.64  2024-12-04T16:52:18.380804+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-12-04T16:52:19.075161+00:00 10.215.168.64  2024-12-04T16:52:18.543991+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-12-04T16:52:19.092762+00:00 10.215.168.64  2024-12-04T16:52:18.561581+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-12-04T16:52:19.860703+00:00 10.215.168.64  2024-12-04T16:52:19.329415+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-12-04T16:52:20.198141+00:00 10.215.168.64  2024-12-04T16:52:19.666902+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-12-04T16:52:20.254199+00:00 10.215.168.64  2024-12-04T16:52:19.723059+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-12-04T16:52:20.364059+00:00 10.215.168.64  2024-12-04T16:52:19.832807+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-12-04T16:52:20.426351+00:00 10.215.168.64  2024-12-04T16:52:19.895197+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2024-12-04T16:52:23.965760+00:00 10.215.168.64  2024-12-04T16:52:23.855780+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-12-04T16:52:23.965760+00:00 10.215.168.64  2024-12-04T16:52:23.855973+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="344762" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-12-04T16:52:23.965760+00:00 10.215.168.64  2024-12-04T16:52:23.856377+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-12-04T16:52:23.965760+00:00 10.215.168.64  2024-12-04T16:52:23.856470+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-12-04T16:52:23.965760+00:00 10.215.168.64  2024-12-04T16:52:23.880818+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-12-04T16:52:23.965760+00:00 10.215.168.64  2024-12-04T16:52:23.882984+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-12-04T16:52:23.965760+00:00 10.215.168.64  2024-12-04T16:52:23.883023+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="344923" x-info="https://www.rsyslog.com"] start
2024-12-04T16:52:23.965760+00:00 10.215.168.64  2024-12-04T16:52:23.883054+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-12-04T16:52:23.967072+00:00 10.215.168.64  2024-12-04T16:52:23.883788+00:00 daemon-notice osdx cfgd[1239]:  [340614]Completed change to active configuration
2024-12-04T16:52:23.997384+00:00 10.215.168.64  2024-12-04T16:52:23.914111+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-12-04T16:52:24.011366+00:00 10.215.168.64  2024-12-04T16:52:23.928780+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-12-04T16:52:24.226935+00:00 10.215.168.64  2024-12-04T16:52:24.144255+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1  vrf VRF0    count 1 size 56 timeout 1'.
2024-12-04T16:52:24.279501+00:00 10.215.168.64  2024-12-04T16:52:24.196830+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.180 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.180/0.180/0.180/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-12-04T16:52:24.668831+00:00 10.215.168.64  2024-12-04T16:52:24.586163+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-12-04T16:52:24.850594+00:00 10.215.168.64  2024-12-04T16:52:24.767830+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-12-04T16:52:24.864708+00:00 10.215.168.64  2024-12-04T16:52:24.781982+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-12-04T16:52:25.632230+00:00 10.215.168.64  2024-12-04T16:52:25.549522+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-12-04T16:52:25.944604+00:00 10.215.168.64  2024-12-04T16:52:25.861741+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-12-04T16:52:25.998656+00:00 10.215.168.64  2024-12-04T16:52:25.915951+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-12-04T16:52:26.103054+00:00 10.215.168.64  2024-12-04T16:52:26.020248+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-12-04T16:52:26.165914+00:00 10.215.168.64  2024-12-04T16:52:26.083105+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2024-12-04T16:52:29.878985+00:00 10.215.168.64  2024-12-04T16:52:29.775633+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-12-04T16:52:29.878985+00:00 10.215.168.64  2024-12-04T16:52:29.775745+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="345012" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-12-04T16:52:29.878985+00:00 10.215.168.64  2024-12-04T16:52:29.776077+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-12-04T16:52:29.878985+00:00 10.215.168.64  2024-12-04T16:52:29.776225+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-12-04T16:52:29.878985+00:00 10.215.168.64  2024-12-04T16:52:29.794107+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-12-04T16:52:29.878985+00:00 10.215.168.64  2024-12-04T16:52:29.796065+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-12-04T16:52:29.878985+00:00 10.215.168.64  2024-12-04T16:52:29.796101+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="345176" x-info="https://www.rsyslog.com"] start
2024-12-04T16:52:29.879008+00:00 10.215.168.64  2024-12-04T16:52:29.796131+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-12-04T16:52:29.879008+00:00 10.215.168.64  2024-12-04T16:52:29.797189+00:00 daemon-notice osdx cfgd[1239]:  [340614]Completed change to active configuration
2024-12-04T16:52:29.907581+00:00 10.215.168.64  2024-12-04T16:52:29.825956+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-12-04T16:52:29.922346+00:00 10.215.168.64  2024-12-04T16:52:29.840805+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-12-04T16:52:30.061686+00:00 10.215.168.64  2024-12-04T16:52:29.980217+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-12-04T16:52:30.115890+00:00 10.215.168.64  2024-12-04T16:52:30.034297+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.290 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.290/0.290/0.290/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-12-04T16:52:35.629628+00:00 33.33.33.33  2024-12-04T16:52:34.886375+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-12-04T16:52:35.629628+00:00 33.33.33.33  2024-12-04T16:52:34.886491+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="345265" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-12-04T16:52:35.629628+00:00 33.33.33.33  2024-12-04T16:52:34.887033+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-12-04T16:52:35.629628+00:00 33.33.33.33  2024-12-04T16:52:34.887134+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-12-04T16:52:35.629628+00:00 33.33.33.33  2024-12-04T16:52:34.918208+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-12-04T16:52:35.629695+00:00 33.33.33.33  2024-12-04T16:52:34.919896+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-12-04T16:52:35.630313+00:00 33.33.33.33  2024-12-04T16:52:34.919934+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-12-04T16:52:35.630313+00:00 33.33.33.33  2024-12-04T16:52:34.919959+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="345414" x-info="https://www.rsyslog.com"] start
2024-12-04T16:52:35.630313+00:00 33.33.33.33  2024-12-04T16:52:34.920526+00:00 daemon-notice osdx cfgd[1239]:  [340614]Completed change to active configuration
2024-12-04T16:52:35.658438+00:00 33.33.33.33  2024-12-04T16:52:34.948507+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-12-04T16:52:35.674261+00:00 33.33.33.33  2024-12-04T16:52:34.964366+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-12-04T16:52:35.810850+00:00 33.33.33.33  2024-12-04T16:52:35.101066+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-12-04T16:52:35.863616+00:00 33.33.33.33  2024-12-04T16:52:35.153706+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.185 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.185/0.185/0.185/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-12-04T16:52:36.264254+00:00 33.33.33.33  2024-12-04T16:52:35.554300+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2024-12-04T16:52:36.419847+00:00 33.33.33.33  2024-12-04T16:52:35.709797+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2024-12-04T16:52:36.450933+00:00 33.33.33.33  2024-12-04T16:52:35.740945+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2024-12-04T16:52:37.180856+00:00 33.33.33.33  2024-12-04T16:52:36.470791+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2024-12-04T16:52:37.502304+00:00 33.33.33.33  2024-12-04T16:52:36.792355+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2024-12-04T16:52:37.550338+00:00 33.33.33.33  2024-12-04T16:52:36.840449+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2024-12-04T16:52:37.654838+00:00 33.33.33.33  2024-12-04T16:52:36.944850+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2024-12-04T16:52:37.712478+00:00 33.33.33.33  2024-12-04T16:52:37.002553+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2024-12-04T16:52:41.882380+00:00 33.33.33.33  2024-12-04T16:52:41.384082+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-12-04T16:52:41.882380+00:00 33.33.33.33  2024-12-04T16:52:41.384236+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="345503" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-12-04T16:52:41.882380+00:00 33.33.33.33  2024-12-04T16:52:41.384590+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-12-04T16:52:41.882380+00:00 33.33.33.33  2024-12-04T16:52:41.384715+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-12-04T16:52:41.882380+00:00 33.33.33.33  2024-12-04T16:52:41.414880+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-12-04T16:52:41.882380+00:00 33.33.33.33  2024-12-04T16:52:41.416929+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-12-04T16:52:41.882380+00:00 33.33.33.33  2024-12-04T16:52:41.416971+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="345688" x-info="https://www.rsyslog.com"] start
2024-12-04T16:52:41.882398+00:00 33.33.33.33  2024-12-04T16:52:41.416996+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-12-04T16:52:41.882398+00:00 33.33.33.33  2024-12-04T16:52:41.417040+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2024-12-04T16:52:41.882910+00:00 33.33.33.33  2024-12-04T16:52:41.417642+00:00 daemon-notice osdx cfgd[1239]:  [340614]Completed change to active configuration
2024-12-04T16:52:41.922866+00:00 33.33.33.33  2024-12-04T16:52:41.457512+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-12-04T16:52:41.939730+00:00 33.33.33.33  2024-12-04T16:52:41.474409+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-12-04T16:52:42.184744+00:00 33.33.33.33  2024-12-04T16:52:41.719358+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1  vrf VRF0    count 1 size 56 timeout 1'.
2024-12-04T16:52:42.237262+00:00 33.33.33.33  2024-12-04T16:52:41.771794+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.146 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.146/0.146/0.146/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-12-04T16:52:48.214906+00:00 10.215.168.64  2024-12-04T16:52:47.845665+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-12-04T16:52:48.215140+00:00 10.215.168.64  2024-12-04T16:52:47.845778+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="345786" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-12-04T16:52:48.215140+00:00 10.215.168.64  2024-12-04T16:52:47.846215+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-12-04T16:52:48.215140+00:00 10.215.168.64  2024-12-04T16:52:47.846312+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-12-04T16:52:48.215140+00:00 10.215.168.64  2024-12-04T16:52:47.905083+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-12-04T16:52:48.215140+00:00 10.215.168.64  2024-12-04T16:52:47.913166+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-12-04T16:52:48.215140+00:00 10.215.168.64  2024-12-04T16:52:47.913218+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="345962" x-info="https://www.rsyslog.com"] start
2024-12-04T16:52:48.215140+00:00 10.215.168.64  2024-12-04T16:52:47.913249+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-12-04T16:52:48.215140+00:00 10.215.168.64  2024-12-04T16:52:47.913376+00:00 daemon-notice osdx cfgd[1239]:  [340614]Completed change to active configuration
2024-12-04T16:52:48.215140+00:00 10.215.168.64  2024-12-04T16:52:47.940248+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-12-04T16:52:48.215140+00:00 10.215.168.64  2024-12-04T16:52:47.984494+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-12-04T16:52:48.215140+00:00 10.215.168.64  2024-12-04T16:52:48.033417+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2024-12-04T16:52:48.215140+00:00 10.215.168.64  2024-12-04T16:52:48.033466+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2024-12-04T16:52:48.255750+00:00 10.215.168.64  2024-12-04T16:52:48.123360+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-12-04T16:52:48.453506+00:00 10.215.168.64  2024-12-04T16:52:48.322064+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.150 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.150/0.150/0.150/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2024-12-04T16:52:54.713115+00:00 33.33.33.33  2024-12-04T16:52:54.147159+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2024-12-04T16:52:54.713115+00:00 33.33.33.33  2024-12-04T16:52:54.147295+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="346060" x-info="https://www.rsyslog.com"] exiting on signal 15.
2024-12-04T16:52:54.713115+00:00 33.33.33.33  2024-12-04T16:52:54.147823+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2024-12-04T16:52:54.713115+00:00 33.33.33.33  2024-12-04T16:52:54.147917+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2024-12-04T16:52:54.713115+00:00 33.33.33.33  2024-12-04T16:52:54.171177+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2024-12-04T16:52:54.713115+00:00 33.33.33.33  2024-12-04T16:52:54.173203+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2024-12-04T16:52:54.713115+00:00 33.33.33.33  2024-12-04T16:52:54.173238+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="346213" x-info="https://www.rsyslog.com"] start
2024-12-04T16:52:54.713115+00:00 33.33.33.33  2024-12-04T16:52:54.173258+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2024-12-04T16:52:54.755676+00:00 33.33.33.33  2024-12-04T16:52:54.174504+00:00 daemon-notice osdx cfgd[1239]:  [340614]Completed change to active configuration
2024-12-04T16:52:54.755676+00:00 33.33.33.33  2024-12-04T16:52:54.202064+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2024-12-04T16:52:54.755676+00:00 33.33.33.33  2024-12-04T16:52:54.229640+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2024-12-04T16:52:54.755676+00:00 33.33.33.33  2024-12-04T16:52:54.243054+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2024-12-04T16:52:54.755676+00:00 33.33.33.33  2024-12-04T16:52:54.243100+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2024-12-04T16:52:54.822185+00:00 33.33.33.33  2024-12-04T16:52:54.360655+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2024-12-04T16:52:55.010417+00:00 33.33.33.33  2024-12-04T16:52:54.548868+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.