Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2025-05-11 21:08:31.039183 daemon-err , modulelauncher[81530]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-05-11 21:08:57.887979 daemon-err , modulelauncher[81616]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:08:57.888036 daemon-err , modulelauncher[81616]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:08:57.893517 daemon-err , modulelauncher[81616]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:08:57.893573 daemon-err , modulelauncher[81616]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:09:25.312661 daemon-err , modulelauncher[81769]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:09:25.312800 daemon-err , modulelauncher[81769]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:09:25.315856 daemon-err , modulelauncher[81769]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:09:25.315967 daemon-err , modulelauncher[81769]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:09:25.319262 daemon-err , modulelauncher[81769]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:09:25.319390 daemon-err , modulelauncher[81769]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:09:25.322353 daemon-err , modulelauncher[81769]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:09:25.322453 daemon-err , modulelauncher[81769]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:09:51.596063 daemon-err , modulelauncher[81852]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:09:51.596107 daemon-err , modulelauncher[81852]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:09:51.599799 daemon-err , modulelauncher[81852]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:09:51.599837 daemon-err , modulelauncher[81852]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:09:51.603057 daemon-err , modulelauncher[81852]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:09:51.603170 daemon-err , modulelauncher[81852]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:09:51.607088 daemon-err , modulelauncher[81852]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:09:51.607192 daemon-err , modulelauncher[81852]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:10:18.489607 daemon-err , modulelauncher[81971]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:10:18.489735 daemon-err , modulelauncher[81971]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:10:18.493652 daemon-err , modulelauncher[81971]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:10:18.493734 daemon-err , modulelauncher[81971]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:10:18.497894 daemon-err , modulelauncher[81971]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:10:18.497939 daemon-err , modulelauncher[81971]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:10:18.501586 daemon-err , modulelauncher[81971]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:10:18.501621 daemon-err , modulelauncher[81971]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:10:46.320616 daemon-err , modulelauncher[82053]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-05-11 21:10:46.320680 daemon-err , modulelauncher[82053]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-05-11 21:10:46.323268 daemon-err , modulelauncher[82053]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-05-11 21:10:46.323297 daemon-err , modulelauncher[82053]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-05-11 21:10:46.328345 daemon-err , modulelauncher[82053]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-05-11 21:10:46.328409 daemon-err , modulelauncher[82053]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-05-11 21:10:47.096235 auth-err , sshd[82155]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:10:47.096305 auth-err , sshd[82155]: connection to srv[0] 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:10:47.106132 auth-err , sshd[82155]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:10:47.106202 auth-err , sshd[82155]: connection to srv[0] 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:10:47.614044 authpriv-err , login[82197]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:10:47.614200 authpriv-err , login[82197]: connection to srv[0] 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:10:47.614866 authpriv-err , login[82197]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:10:47.615011 authpriv-err , login[82197]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:10:47.619324 authpriv-err , login[82197]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:10:47.619402 authpriv-err , login[82197]: connection to srv[0] 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:10:49.655883 daemon-err , modulelauncher[82265]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-05-11 21:10:49.656026 daemon-err , modulelauncher[82265]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-05-11 21:10:49.659201 daemon-err , modulelauncher[82265]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-05-11 21:10:49.659324 daemon-err , modulelauncher[82265]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-05-11 21:10:49.663354 daemon-err , modulelauncher[82265]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-05-11 21:10:49.663513 daemon-err , modulelauncher[82265]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-05-11 21:10:49.668002 daemon-err , modulelauncher[82265]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-05-11 21:10:49.668122 daemon-err , modulelauncher[82265]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-05-11 21:10:49.672050 daemon-err , modulelauncher[82265]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-05-11 21:10:49.672165 daemon-err , modulelauncher[82265]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-05-11 21:10:49.676265 daemon-err , modulelauncher[82265]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-05-11 21:10:49.676391 daemon-err , modulelauncher[82265]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-05-11 21:10:50.399124 auth-err , sshd[82301]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:10:50.399199 auth-err , sshd[82301]: connection to srv[0] 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:11:10.925183 authpriv-err , login[82315]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:11:10.925240 authpriv-err , login[82315]: connection to srv[0] 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:11:15.339230 daemon-err , modulelauncher[82355]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-05-11 21:11:15.339367 daemon-err , modulelauncher[82355]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-05-11 21:11:15.342352 daemon-err , modulelauncher[82355]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-05-11 21:11:15.342431 daemon-err , modulelauncher[82355]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-05-11 21:11:15.345205 daemon-err , modulelauncher[82355]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-05-11 21:11:15.345286 daemon-err , modulelauncher[82355]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-05-11 21:11:15.348257 daemon-err , modulelauncher[82355]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-05-11 21:11:15.348333 daemon-err , modulelauncher[82355]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-05-11 21:11:15.351142 daemon-err , modulelauncher[82355]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-05-11 21:11:15.351221 daemon-err , modulelauncher[82355]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-05-11 21:11:15.353851 daemon-err , modulelauncher[82355]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-05-11 21:11:15.353879 daemon-err , modulelauncher[82355]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-05-11 21:11:16.101903 auth-err , sshd[82421]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2025-05-11 21:11:16.101956 auth-err , sshd[82421]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2025-05-11 21:11:16.106665 auth-err , sshd[82421]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2025-05-11 21:11:16.106721 auth-err , sshd[82421]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2025-05-11 21:11:16.581618 authpriv-err , login[82463]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2025-05-11 21:11:16.581689 authpriv-err , login[82463]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2025-05-11 21:11:16.582017 authpriv-err , login[82463]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:11:16.582101 authpriv-err , login[82463]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-05-11 21:11:16.586250 authpriv-err , login[82463]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2025-05-11 21:11:16.586297 authpriv-err , login[82463]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2025-05-11 21:11:18.835855 daemon-err , modulelauncher[82534]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-05-11 21:11:18.835997 daemon-err , modulelauncher[82534]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-05-11 21:11:18.839951 daemon-err , modulelauncher[82534]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-05-11 21:11:18.840072 daemon-err , modulelauncher[82534]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-05-11 21:11:18.844434 daemon-err , modulelauncher[82534]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-05-11 21:11:18.844545 daemon-err , modulelauncher[82534]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-05-11 21:11:18.848917 daemon-err , modulelauncher[82534]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-05-11 21:11:18.849000 daemon-err , modulelauncher[82534]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-05-11 21:11:18.851809 daemon-err , modulelauncher[82534]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-05-11 21:11:18.851838 daemon-err , modulelauncher[82534]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-05-11 21:11:18.854743 daemon-err , modulelauncher[82534]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-05-11 21:11:18.854856 daemon-err , modulelauncher[82534]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-05-11 21:11:19.630045 auth-err , sshd[82570]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2025-05-11 21:11:19.630117 auth-err , sshd[82570]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2025-05-11 21:11:40.085155 authpriv-err , login[82579]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2025-05-11 21:11:40.085228 authpriv-err , login[82579]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2025-05-11 21:11:46.101500 daemon-err , modulelauncher[82621]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:11:46.101557 daemon-err , modulelauncher[82621]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:11:46.105785 daemon-err , modulelauncher[82621]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:11:46.105839 daemon-err , modulelauncher[82621]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:11:46.849672 authpriv-err , sshd[82724]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2025-05-11 21:11:46.849727 authpriv-err , sshd[82724]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2025-05-11 21:11:47.306950 authpriv-err , login[82766]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2025-05-11 21:11:47.307103 authpriv-err , login[82766]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2025-05-11 21:11:49.179813 daemon-err , modulelauncher[82835]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:11:49.179925 daemon-err , modulelauncher[82835]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:11:49.184114 daemon-err , modulelauncher[82835]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:11:49.184235 daemon-err , modulelauncher[82835]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:11:49.188748 daemon-err , modulelauncher[82835]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:11:49.188784 daemon-err , modulelauncher[82835]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:11:49.192044 daemon-err , modulelauncher[82835]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:11:49.192083 daemon-err , modulelauncher[82835]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:11:49.819726 authpriv-err , sshd[82869]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2025-05-11 21:11:49.819802 authpriv-err , sshd[82869]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2025-05-11 21:12:10.181091 authpriv-err , login[82883]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2025-05-11 21:12:10.181245 authpriv-err , login[82883]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2025-05-11 21:12:15.311349 daemon-err , modulelauncher[82923]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:12:15.311393 daemon-err , modulelauncher[82923]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:12:15.314201 daemon-err , modulelauncher[82923]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:12:15.314232 daemon-err , modulelauncher[82923]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:12:15.317613 daemon-err , modulelauncher[82923]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:12:15.317711 daemon-err , modulelauncher[82923]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:12:15.320946 daemon-err , modulelauncher[82923]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:12:15.321033 daemon-err , modulelauncher[82923]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:12:16.308148 authpriv-err , sshd[82988]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2025-05-11 21:12:16.308220 authpriv-err , sshd[82988]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2025-05-11 21:12:16.795132 authpriv-err , login[83030]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2025-05-11 21:12:16.795287 authpriv-err , login[83030]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2025-05-11 21:12:19.219258 daemon-err , modulelauncher[83102]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:12:19.219416 daemon-err , modulelauncher[83102]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:12:19.223466 daemon-err , modulelauncher[83102]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:12:19.223593 daemon-err , modulelauncher[83102]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:12:19.226919 daemon-err , modulelauncher[83102]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:12:19.227099 daemon-err , modulelauncher[83102]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:12:19.231565 daemon-err , modulelauncher[83102]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:12:19.231683 daemon-err , modulelauncher[83102]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:12:20.057145 authpriv-err , sshd[83136]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2025-05-11 21:12:20.057302 authpriv-err , sshd[83136]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2025-05-11 21:12:40.439879 authpriv-err , login[83145]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2025-05-11 21:12:40.440032 authpriv-err , login[83145]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2025-05-11 21:12:50.040343 user-err , ERROR: Dissociating VRF from service: cnm 2025-05-11 21:12:50.130228 daemon-err , staticd[1214]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 243 2025-05-11 21:12:50.130287 daemon-err , staticd[1214]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 243 2025-05-11 21:13:08.664852 daemon-err , modulelauncher[83977]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:13:08.664891 daemon-err , modulelauncher[83977]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:13:08.667865 daemon-err , modulelauncher[83977]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:13:08.667908 daemon-err , modulelauncher[83977]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:13:21.645902 daemon-err , modulelauncher[84340]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:13:21.645971 daemon-err , modulelauncher[84340]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:13:21.655815 daemon-err , modulelauncher[84340]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:13:21.655892 daemon-err , modulelauncher[84340]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:13:24.024949 daemon-err , modulelauncher[84512]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-05-11 21:13:24.025010 daemon-err , modulelauncher[84512]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-05-11 21:13:24.027672 daemon-err , modulelauncher[84512]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-05-11 21:13:24.027718 daemon-err , modulelauncher[84512]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-05-11 21:14:27.435211 daemon-err , modulelauncher[86169]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-05-11 21:14:27.435322 daemon-err , modulelauncher[86169]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-05-11 21:14:27.438171 daemon-err , modulelauncher[86169]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-05-11 21:14:27.438249 daemon-err , modulelauncher[86169]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-05-11 21:14:27.441148 daemon-err , modulelauncher[86169]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-05-11 21:14:27.441231 daemon-err , modulelauncher[86169]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-05-11 21:14:38.924337 daemon-err , modulelauncher[86545]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-05-11 21:14:38.924389 daemon-err , modulelauncher[86545]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-05-11 21:14:38.928069 daemon-err , modulelauncher[86545]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-05-11 21:14:38.928101 daemon-err , modulelauncher[86545]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-05-11 21:14:38.931690 daemon-err , modulelauncher[86545]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-05-11 21:14:38.931746 daemon-err , modulelauncher[86545]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-05-11 21:14:41.467963 daemon-err , modulelauncher[86725]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-05-11 21:14:41.468013 daemon-err , modulelauncher[86725]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-05-11 21:14:41.470814 daemon-err , modulelauncher[86725]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-05-11 21:14:41.470850 daemon-err , modulelauncher[86725]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-05-11 21:14:41.473954 daemon-err , modulelauncher[86725]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-05-11 21:14:41.474007 daemon-err , modulelauncher[86725]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-05-11 21:15:34.013129 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2025-05-11 21:15:36.178459 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2025-05-11 21:15:48.767131 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2025-05-11 21:15:50.424886 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2025-05-11 21:16:03.032702 daemon-err , modulelauncher[89037]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-05-11 21:16:03.032762 daemon-err , modulelauncher[89037]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-05-11 21:16:03.036398 daemon-err , modulelauncher[89037]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-05-11 21:16:03.036457 daemon-err , modulelauncher[89037]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-05-11 21:16:03.040999 daemon-err , modulelauncher[89037]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-05-11 21:16:03.041073 daemon-err , modulelauncher[89037]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-05-11 21:16:04.325919 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2025-05-11 21:16:05.497190 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2025-05-11 21:18:03.092931 daemon-info , systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-05-11 21:18:03.093186 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="75109" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-05-11 21:18:03.094223 daemon-info , systemd[1]: rsyslog.service: Deactivated successfully. 2025-05-11 21:18:03.094482 daemon-info , systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-05-11 21:18:03.123417 daemon-info , systemd[1]: Starting rsyslog.service - System Logging Service... 2025-05-11 21:18:03.126087 syslog-info , rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-05-11 21:18:03.126158 daemon-info , systemd[1]: Started rsyslog.service - System Logging Service. 2025-05-11 21:18:03.126216 syslog-info , rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="93277" x-info="https://www.rsyslog.com"] start 2025-05-11 21:18:03.127272 daemon-notice , cfgd[1244]: [89195]Completed change to active configuration 2025-05-11 21:18:03.129888 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2025-05-11 21:18:03.156919 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2025-05-11 21:18:03.312315 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.Show output
2025-05-11 21:18:13.462696 daemon-info , systemd[1]: rsyslog.service: Deactivated successfully. 2025-05-11 21:18:13.462760 daemon-info , systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-05-11 21:18:13.480200 daemon-info , systemd[1]: Starting rsyslog.service - System Logging Service... 2025-05-11 21:18:13.485843 daemon-info , systemd[1]: Started rsyslog.service - System Logging Service. 2025-05-11 21:18:14.599160 daemon-info , systemd[1]: Created slice system-dhcpd.slice - Slice /system/dhcpd. 2025-05-11 21:18:14.636129 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
Started.*"DHCP Server Service instance main"\.Show output
2025-05-11 21:18:23.954588 daemon-info , systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-05-11 21:18:23.955329 daemon-info , systemd[1]: rsyslog.service: Deactivated successfully. 2025-05-11 21:18:23.955464 daemon-info , systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-05-11 21:18:23.989913 daemon-info , systemd[1]: Starting rsyslog.service - System Logging Service... 2025-05-11 21:18:23.992441 daemon-info , systemd[1]: Started rsyslog.service - System Logging Service. 2025-05-11 21:18:24.994006 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog Regex
Description
Create a new syslog file and collect all the syslog messages matching a specified regex.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file cli_msg filter CLI app OSDxCLI set system syslog file cli_msg filter CLI level notice set system syslog file cli_msg filter CLI regex '(^|[^a-zA-Z0-9_])alert([^a-zA-Z0-9_]|$)'
Step 2: Run command command with alert word
at DUT0
and expect this output:
Show output
Command validation failed: CLI Error: Invalid token [command] CLI Error: Command error
Step 3: Run command command with alerted word
at DUT0
and expect this output:
Show output
Command validation failed: CLI Error: Invalid token [command] CLI Error: Command error
Step 4: Run command file show running://log/user/cli_msg/cli_msg | cat
at DUT0
and expect this output:
Show output
2025-05-11 21:18:33.977684 auth-notice , OSDxCLI: User 'admin' entered an invalid command: 'command with alert word'.
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.167 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.167/0.167/0.167/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-05-11T21:18:43.796149+00:00 10.215.168.64 2025-05-11T21:18:43.506451+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-05-11T21:18:43.796149+00:00 10.215.168.64 2025-05-11T21:18:43.506640+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94053" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-05-11T21:18:43.796149+00:00 10.215.168.64 2025-05-11T21:18:43.507571+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2025-05-11T21:18:43.796149+00:00 10.215.168.64 2025-05-11T21:18:43.507737+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-05-11T21:18:43.796149+00:00 10.215.168.64 2025-05-11T21:18:43.529258+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2025-05-11T21:18:43.796149+00:00 10.215.168.64 2025-05-11T21:18:43.531771+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2025-05-11T21:18:43.796149+00:00 10.215.168.64 2025-05-11T21:18:43.532482+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-05-11T21:18:43.796149+00:00 10.215.168.64 2025-05-11T21:18:43.532565+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94167" x-info="https://www.rsyslog.com"] start 2025-05-11T21:18:43.796631+00:00 10.215.168.64 2025-05-11T21:18:43.533344+00:00 daemon-notice osdx cfgd[1244]: [89195]Completed change to active configuration 2025-05-11T21:18:43.833287+00:00 10.215.168.64 2025-05-11T21:18:43.569841+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-05-11T21:18:43.894022+00:00 10.215.168.64 2025-05-11T21:18:43.630631+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-05-11T21:18:44.071305+00:00 10.215.168.64 2025-05-11T21:18:43.807946+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-05-11T21:18:44.163219+00:00 10.215.168.64 2025-05-11T21:18:43.899830+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.301 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.301/0.301/0.301/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-05-11T21:18:44.730550+00:00 10.215.168.64 2025-05-11T21:18:44.467148+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-05-11T21:18:45.072669+00:00 10.215.168.64 2025-05-11T21:18:44.809282+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-05-11T21:18:45.099683+00:00 10.215.168.64 2025-05-11T21:18:44.835874+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-05-11T21:18:46.298393+00:00 10.215.168.64 2025-05-11T21:18:46.034866+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2025-05-11T21:18:46.765066+00:00 10.215.168.64 2025-05-11T21:18:46.501539+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-05-11T21:18:46.884669+00:00 10.215.168.64 2025-05-11T21:18:46.621130+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2025-05-11T21:18:46.995303+00:00 10.215.168.64 2025-05-11T21:18:46.731818+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-05-11T21:18:47.089958+00:00 10.215.168.64 2025-05-11T21:18:46.826422+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-05-11T21:18:53.127731+00:00 10.215.168.64 2025-05-11T21:18:52.426575+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-05-11T21:18:53.127793+00:00 10.215.168.64 2025-05-11T21:18:52.426759+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94265" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-05-11T21:18:53.127865+00:00 10.215.168.64 2025-05-11T21:18:52.427554+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2025-05-11T21:18:53.127865+00:00 10.215.168.64 2025-05-11T21:18:52.427716+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-05-11T21:18:53.127865+00:00 10.215.168.64 2025-05-11T21:18:52.451664+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2025-05-11T21:18:53.127875+00:00 10.215.168.64 2025-05-11T21:18:52.454315+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-05-11T21:18:53.127905+00:00 10.215.168.64 2025-05-11T21:18:52.454385+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2025-05-11T21:18:53.127905+00:00 10.215.168.64 2025-05-11T21:18:52.454451+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94428" x-info="https://www.rsyslog.com"] start 2025-05-11T21:18:53.128192+00:00 10.215.168.64 2025-05-11T21:18:52.455339+00:00 daemon-notice osdx cfgd[1244]: [89195]Completed change to active configuration 2025-05-11T21:18:53.167047+00:00 10.215.168.64 2025-05-11T21:18:52.492563+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-05-11T21:18:53.192949+00:00 10.215.168.64 2025-05-11T21:18:52.520056+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-05-11T21:18:53.503256+00:00 10.215.168.64 2025-05-11T21:18:52.830195+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-05-11T21:18:53.585096+00:00 10.215.168.64 2025-05-11T21:18:52.912098+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-interface eth0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.175 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.175/0.175/0.175/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-05-11T21:18:54.065279+00:00 10.215.168.64 2025-05-11T21:18:53.392339+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-05-11T21:18:54.322035+00:00 10.215.168.64 2025-05-11T21:18:53.649070+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-05-11T21:18:54.363547+00:00 10.215.168.64 2025-05-11T21:18:53.689540+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-05-11T21:18:55.723512+00:00 10.215.168.64 2025-05-11T21:18:55.050530+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2025-05-11T21:18:56.222444+00:00 10.215.168.64 2025-05-11T21:18:55.549434+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-05-11T21:18:56.340333+00:00 10.215.168.64 2025-05-11T21:18:55.667362+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2025-05-11T21:18:56.466446+00:00 10.215.168.64 2025-05-11T21:18:55.793467+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-05-11T21:18:56.654155+00:00 10.215.168.64 2025-05-11T21:18:55.981188+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-05-11T21:19:02.840569+00:00 10.215.168.64 2025-05-11T21:19:02.130395+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-05-11T21:19:02.840569+00:00 10.215.168.64 2025-05-11T21:19:02.130559+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94526" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-05-11T21:19:02.840569+00:00 10.215.168.64 2025-05-11T21:19:02.131703+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2025-05-11T21:19:02.840569+00:00 10.215.168.64 2025-05-11T21:19:02.131747+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-05-11T21:19:02.840569+00:00 10.215.168.64 2025-05-11T21:19:02.164781+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2025-05-11T21:19:02.840569+00:00 10.215.168.64 2025-05-11T21:19:02.168578+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-05-11T21:19:02.840569+00:00 10.215.168.64 2025-05-11T21:19:02.168658+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94697" x-info="https://www.rsyslog.com"] start 2025-05-11T21:19:02.840569+00:00 10.215.168.64 2025-05-11T21:19:02.168712+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2025-05-11T21:19:02.841497+00:00 10.215.168.64 2025-05-11T21:19:02.169662+00:00 daemon-notice osdx cfgd[1244]: [89195]Completed change to active configuration 2025-05-11T21:19:02.881729+00:00 10.215.168.64 2025-05-11T21:19:02.209860+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-05-11T21:19:02.917133+00:00 10.215.168.64 2025-05-11T21:19:02.245306+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-05-11T21:19:03.098264+00:00 10.215.168.64 2025-05-11T21:19:02.426423+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-05-11T21:19:03.207552+00:00 10.215.168.64 2025-05-11T21:19:02.535675+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and UDP
Description
Add a remote host to send syslog messages through a specific local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.207 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.207/0.207/0.207/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-05-11T21:19:12.554944+00:00 33.33.33.33 2025-05-11T21:19:11.485460+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-05-11T21:19:12.554944+00:00 33.33.33.33 2025-05-11T21:19:11.485694+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94795" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-05-11T21:19:12.554944+00:00 33.33.33.33 2025-05-11T21:19:11.486652+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2025-05-11T21:19:12.554944+00:00 33.33.33.33 2025-05-11T21:19:11.486785+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-05-11T21:19:12.554944+00:00 33.33.33.33 2025-05-11T21:19:11.506936+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2025-05-11T21:19:12.554944+00:00 33.33.33.33 2025-05-11T21:19:11.511048+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-05-11T21:19:12.554966+00:00 33.33.33.33 2025-05-11T21:19:11.511118+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2025-05-11T21:19:12.554966+00:00 33.33.33.33 2025-05-11T21:19:11.512592+00:00 daemon-notice osdx cfgd[1244]: [89195]Completed change to active configuration 2025-05-11T21:19:12.555138+00:00 33.33.33.33 2025-05-11T21:19:11.513221+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94944" x-info="https://www.rsyslog.com"] start 2025-05-11T21:19:12.619209+00:00 33.33.33.33 2025-05-11T21:19:11.567720+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-05-11T21:19:12.640765+00:00 33.33.33.33 2025-05-11T21:19:11.598765+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-05-11T21:19:12.866711+00:00 33.33.33.33 2025-05-11T21:19:11.824757+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-05-11T21:19:12.996859+00:00 33.33.33.33 2025-05-11T21:19:11.954891+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and VRF
Description
Add a remote host to send syslog messages through a VRF and a local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.232 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.232/0.232/0.232/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-05-11T21:19:13.543403+00:00 33.33.33.33 2025-05-11T21:19:12.501411+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-05-11T21:19:13.878128+00:00 33.33.33.33 2025-05-11T21:19:12.836096+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-05-11T21:19:13.902563+00:00 33.33.33.33 2025-05-11T21:19:12.860540+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-05-11T21:19:15.266160+00:00 33.33.33.33 2025-05-11T21:19:14.224128+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2025-05-11T21:19:15.868641+00:00 33.33.33.33 2025-05-11T21:19:14.826594+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-05-11T21:19:16.018793+00:00 33.33.33.33 2025-05-11T21:19:14.976735+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete'. 2025-05-11T21:19:16.168638+00:00 33.33.33.33 2025-05-11T21:19:15.126519+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-05-11T21:19:16.284950+00:00 33.33.33.33 2025-05-11T21:19:15.242887+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-05-11T21:19:23.084602+00:00 33.33.33.33 2025-05-11T21:19:22.769036+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-05-11T21:19:23.084602+00:00 33.33.33.33 2025-05-11T21:19:22.769376+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="95042" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-05-11T21:19:23.084602+00:00 33.33.33.33 2025-05-11T21:19:22.770348+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2025-05-11T21:19:23.084602+00:00 33.33.33.33 2025-05-11T21:19:22.770510+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-05-11T21:19:23.084602+00:00 33.33.33.33 2025-05-11T21:19:22.795169+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2025-05-11T21:19:23.084602+00:00 33.33.33.33 2025-05-11T21:19:22.798109+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-05-11T21:19:23.084602+00:00 33.33.33.33 2025-05-11T21:19:22.798178+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2025-05-11T21:19:23.084602+00:00 33.33.33.33 2025-05-11T21:19:22.798728+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="95230" x-info="https://www.rsyslog.com"] start 2025-05-11T21:19:23.084602+00:00 33.33.33.33 2025-05-11T21:19:22.798798+00:00 syslog-warning osdx rsyslogd: bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ] 2025-05-11T21:19:23.087779+00:00 33.33.33.33 2025-05-11T21:19:22.802132+00:00 daemon-notice osdx cfgd[1244]: [89195]Completed change to active configuration 2025-05-11T21:19:23.124739+00:00 33.33.33.33 2025-05-11T21:19:22.839136+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-05-11T21:19:23.174912+00:00 33.33.33.33 2025-05-11T21:19:22.889290+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-05-11T21:19:23.511650+00:00 33.33.33.33 2025-05-11T21:19:23.226060+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-05-11T21:19:23.624559+00:00 33.33.33.33 2025-05-11T21:19:23.338925+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.184 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.184/0.184/0.184/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-05-11T21:19:32.896503+00:00 10.215.168.64 2025-05-11T21:19:31.977948+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-05-11T21:19:32.896503+00:00 10.215.168.64 2025-05-11T21:19:31.978182+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="95328" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-05-11T21:19:32.896503+00:00 10.215.168.64 2025-05-11T21:19:31.978949+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2025-05-11T21:19:32.896503+00:00 10.215.168.64 2025-05-11T21:19:31.979168+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-05-11T21:19:32.896503+00:00 10.215.168.64 2025-05-11T21:19:32.002086+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2025-05-11T21:19:32.939732+00:00 10.215.168.64 2025-05-11T21:19:32.009137+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-05-11T21:19:32.939732+00:00 10.215.168.64 2025-05-11T21:19:32.009244+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="95507" x-info="https://www.rsyslog.com"] start 2025-05-11T21:19:32.939732+00:00 10.215.168.64 2025-05-11T21:19:32.010190+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2025-05-11T21:19:32.939732+00:00 10.215.168.64 2025-05-11T21:19:32.011393+00:00 daemon-notice osdx cfgd[1244]: [89195]Completed change to active configuration 2025-05-11T21:19:32.939732+00:00 10.215.168.64 2025-05-11T21:19:32.051007+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-05-11T21:19:32.939732+00:00 10.215.168.64 2025-05-11T21:19:32.091167+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-05-11T21:19:32.939732+00:00 10.215.168.64 2025-05-11T21:19:32.216175+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-05-11T21:19:32.939732+00:00 10.215.168.64 2025-05-11T21:19:32.216250+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-05-11T21:19:32.963368+00:00 10.215.168.64 2025-05-11T21:19:32.351633+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-05-11T21:19:33.276603+00:00 10.215.168.64 2025-05-11T21:19:32.665751+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Local Address Single TLS
Description
Add a secured remote host to send syslog messages and show the host name from a fiven local-address
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.142 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.142/0.142/0.142/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-05-11T21:19:43.598744+00:00 33.33.33.33 2025-05-11T21:19:42.512835+00:00 daemon-info osdx systemd[1]: Stopping rsyslog.service - System Logging Service... 2025-05-11T21:19:43.598744+00:00 33.33.33.33 2025-05-11T21:19:42.513058+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="95606" x-info="https://www.rsyslog.com"] exiting on signal 15. 2025-05-11T21:19:43.598907+00:00 33.33.33.33 2025-05-11T21:19:42.513465+00:00 daemon-info osdx systemd[1]: rsyslog.service: Deactivated successfully. 2025-05-11T21:19:43.598907+00:00 33.33.33.33 2025-05-11T21:19:42.513732+00:00 daemon-info osdx systemd[1]: Stopped rsyslog.service - System Logging Service. 2025-05-11T21:19:43.598907+00:00 33.33.33.33 2025-05-11T21:19:42.546416+00:00 daemon-info osdx systemd[1]: Starting rsyslog.service - System Logging Service... 2025-05-11T21:19:43.598907+00:00 33.33.33.33 2025-05-11T21:19:42.549232+00:00 syslog-info osdx rsyslogd: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.2302.0] 2025-05-11T21:19:43.598907+00:00 33.33.33.33 2025-05-11T21:19:42.549298+00:00 daemon-info osdx systemd[1]: Started rsyslog.service - System Logging Service. 2025-05-11T21:19:43.598907+00:00 33.33.33.33 2025-05-11T21:19:42.549361+00:00 syslog-info osdx rsyslogd: [origin software="rsyslogd" swVersion="8.2302.0" x-pid="95759" x-info="https://www.rsyslog.com"] start 2025-05-11T21:19:43.598907+00:00 33.33.33.33 2025-05-11T21:19:42.550535+00:00 daemon-notice osdx cfgd[1244]: [89195]Completed change to active configuration 2025-05-11T21:19:43.598907+00:00 33.33.33.33 2025-05-11T21:19:42.603116+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-05-11T21:19:43.598907+00:00 33.33.33.33 2025-05-11T21:19:42.640219+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-05-11T21:19:43.598907+00:00 33.33.33.33 2025-05-11T21:19:42.750803+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-05-11T21:19:43.598907+00:00 33.33.33.33 2025-05-11T21:19:42.750912+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-05-11T21:19:43.681260+00:00 33.33.33.33 2025-05-11T21:19:42.846710+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-05-11T21:19:43.922064+00:00 33.33.33.33 2025-05-11T21:19:43.087476+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.