Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2025-05-11 21:08:31.039183 daemon-err , modulelauncher[81530]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-05-11 21:08:57.887979 daemon-err , modulelauncher[81616]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:08:57.888036 daemon-err , modulelauncher[81616]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:08:57.893517 daemon-err , modulelauncher[81616]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:08:57.893573 daemon-err , modulelauncher[81616]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:09:25.312661 daemon-err , modulelauncher[81769]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:09:25.312800 daemon-err , modulelauncher[81769]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:09:25.315856 daemon-err , modulelauncher[81769]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:09:25.315967 daemon-err , modulelauncher[81769]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:09:25.319262 daemon-err , modulelauncher[81769]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:09:25.319390 daemon-err , modulelauncher[81769]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:09:25.322353 daemon-err , modulelauncher[81769]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:09:25.322453 daemon-err , modulelauncher[81769]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:09:51.596063 daemon-err , modulelauncher[81852]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:09:51.596107 daemon-err , modulelauncher[81852]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:09:51.599799 daemon-err , modulelauncher[81852]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:09:51.599837 daemon-err , modulelauncher[81852]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:09:51.603057 daemon-err , modulelauncher[81852]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:09:51.603170 daemon-err , modulelauncher[81852]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:09:51.607088 daemon-err , modulelauncher[81852]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:09:51.607192 daemon-err , modulelauncher[81852]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:10:18.489607 daemon-err , modulelauncher[81971]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:10:18.489735 daemon-err , modulelauncher[81971]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:10:18.493652 daemon-err , modulelauncher[81971]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:10:18.493734 daemon-err , modulelauncher[81971]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:10:18.497894 daemon-err , modulelauncher[81971]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:10:18.497939 daemon-err , modulelauncher[81971]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:10:18.501586 daemon-err , modulelauncher[81971]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:10:18.501621 daemon-err , modulelauncher[81971]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:10:46.320616 daemon-err , modulelauncher[82053]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-05-11 21:10:46.320680 daemon-err , modulelauncher[82053]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-05-11 21:10:46.323268 daemon-err , modulelauncher[82053]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-05-11 21:10:46.323297 daemon-err , modulelauncher[82053]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-05-11 21:10:46.328345 daemon-err , modulelauncher[82053]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-05-11 21:10:46.328409 daemon-err , modulelauncher[82053]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-05-11 21:10:47.096235 auth-err , sshd[82155]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:10:47.096305 auth-err , sshd[82155]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:10:47.106132 auth-err , sshd[82155]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:10:47.106202 auth-err , sshd[82155]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:10:47.614044 authpriv-err , login[82197]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:10:47.614200 authpriv-err , login[82197]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:10:47.614866 authpriv-err , login[82197]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:10:47.615011 authpriv-err , login[82197]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:10:47.619324 authpriv-err , login[82197]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:10:47.619402 authpriv-err , login[82197]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:10:49.655883 daemon-err , modulelauncher[82265]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-05-11 21:10:49.656026 daemon-err , modulelauncher[82265]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-05-11 21:10:49.659201 daemon-err , modulelauncher[82265]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-05-11 21:10:49.659324 daemon-err , modulelauncher[82265]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-05-11 21:10:49.663354 daemon-err , modulelauncher[82265]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-05-11 21:10:49.663513 daemon-err , modulelauncher[82265]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-05-11 21:10:49.668002 daemon-err , modulelauncher[82265]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-05-11 21:10:49.668122 daemon-err , modulelauncher[82265]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-05-11 21:10:49.672050 daemon-err , modulelauncher[82265]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-05-11 21:10:49.672165 daemon-err , modulelauncher[82265]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-05-11 21:10:49.676265 daemon-err , modulelauncher[82265]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-05-11 21:10:49.676391 daemon-err , modulelauncher[82265]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-05-11 21:10:50.399124 auth-err , sshd[82301]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:10:50.399199 auth-err , sshd[82301]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:11:10.925183 authpriv-err , login[82315]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:11:10.925240 authpriv-err , login[82315]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:11:15.339230 daemon-err , modulelauncher[82355]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-05-11 21:11:15.339367 daemon-err , modulelauncher[82355]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-05-11 21:11:15.342352 daemon-err , modulelauncher[82355]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-05-11 21:11:15.342431 daemon-err , modulelauncher[82355]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-05-11 21:11:15.345205 daemon-err , modulelauncher[82355]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-05-11 21:11:15.345286 daemon-err , modulelauncher[82355]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-05-11 21:11:15.348257 daemon-err , modulelauncher[82355]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-05-11 21:11:15.348333 daemon-err , modulelauncher[82355]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-05-11 21:11:15.351142 daemon-err , modulelauncher[82355]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-05-11 21:11:15.351221 daemon-err , modulelauncher[82355]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-05-11 21:11:15.353851 daemon-err , modulelauncher[82355]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-05-11 21:11:15.353879 daemon-err , modulelauncher[82355]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-05-11 21:11:16.101903 auth-err , sshd[82421]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-05-11 21:11:16.101956 auth-err , sshd[82421]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-05-11 21:11:16.106665 auth-err , sshd[82421]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-05-11 21:11:16.106721 auth-err , sshd[82421]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-05-11 21:11:16.581618 authpriv-err , login[82463]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-05-11 21:11:16.581689 authpriv-err , login[82463]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-05-11 21:11:16.582017 authpriv-err , login[82463]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:11:16.582101 authpriv-err , login[82463]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-05-11 21:11:16.586250 authpriv-err , login[82463]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-05-11 21:11:16.586297 authpriv-err , login[82463]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-05-11 21:11:18.835855 daemon-err , modulelauncher[82534]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-05-11 21:11:18.835997 daemon-err , modulelauncher[82534]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-05-11 21:11:18.839951 daemon-err , modulelauncher[82534]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-05-11 21:11:18.840072 daemon-err , modulelauncher[82534]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-05-11 21:11:18.844434 daemon-err , modulelauncher[82534]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-05-11 21:11:18.844545 daemon-err , modulelauncher[82534]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-05-11 21:11:18.848917 daemon-err , modulelauncher[82534]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-05-11 21:11:18.849000 daemon-err , modulelauncher[82534]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-05-11 21:11:18.851809 daemon-err , modulelauncher[82534]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-05-11 21:11:18.851838 daemon-err , modulelauncher[82534]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-05-11 21:11:18.854743 daemon-err , modulelauncher[82534]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-05-11 21:11:18.854856 daemon-err , modulelauncher[82534]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-05-11 21:11:19.630045 auth-err , sshd[82570]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-05-11 21:11:19.630117 auth-err , sshd[82570]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-05-11 21:11:40.085155 authpriv-err , login[82579]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-05-11 21:11:40.085228 authpriv-err , login[82579]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-05-11 21:11:46.101500 daemon-err , modulelauncher[82621]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:11:46.101557 daemon-err , modulelauncher[82621]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:11:46.105785 daemon-err , modulelauncher[82621]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:11:46.105839 daemon-err , modulelauncher[82621]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:11:46.849672 authpriv-err , sshd[82724]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-05-11 21:11:46.849727 authpriv-err , sshd[82724]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-05-11 21:11:47.306950 authpriv-err , login[82766]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-05-11 21:11:47.307103 authpriv-err , login[82766]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-05-11 21:11:49.179813 daemon-err , modulelauncher[82835]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:11:49.179925 daemon-err , modulelauncher[82835]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:11:49.184114 daemon-err , modulelauncher[82835]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:11:49.184235 daemon-err , modulelauncher[82835]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:11:49.188748 daemon-err , modulelauncher[82835]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:11:49.188784 daemon-err , modulelauncher[82835]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:11:49.192044 daemon-err , modulelauncher[82835]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:11:49.192083 daemon-err , modulelauncher[82835]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:11:49.819726 authpriv-err , sshd[82869]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-05-11 21:11:49.819802 authpriv-err , sshd[82869]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-05-11 21:12:10.181091 authpriv-err , login[82883]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-05-11 21:12:10.181245 authpriv-err , login[82883]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-05-11 21:12:15.311349 daemon-err , modulelauncher[82923]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:12:15.311393 daemon-err , modulelauncher[82923]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:12:15.314201 daemon-err , modulelauncher[82923]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:12:15.314232 daemon-err , modulelauncher[82923]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:12:15.317613 daemon-err , modulelauncher[82923]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:12:15.317711 daemon-err , modulelauncher[82923]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:12:15.320946 daemon-err , modulelauncher[82923]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:12:15.321033 daemon-err , modulelauncher[82923]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:12:16.308148 authpriv-err , sshd[82988]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-05-11 21:12:16.308220 authpriv-err , sshd[82988]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-05-11 21:12:16.795132 authpriv-err , login[83030]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-05-11 21:12:16.795287 authpriv-err , login[83030]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-05-11 21:12:19.219258 daemon-err , modulelauncher[83102]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:12:19.219416 daemon-err , modulelauncher[83102]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:12:19.223466 daemon-err , modulelauncher[83102]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:12:19.223593 daemon-err , modulelauncher[83102]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:12:19.226919 daemon-err , modulelauncher[83102]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:12:19.227099 daemon-err , modulelauncher[83102]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:12:19.231565 daemon-err , modulelauncher[83102]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:12:19.231683 daemon-err , modulelauncher[83102]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:12:20.057145 authpriv-err , sshd[83136]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-05-11 21:12:20.057302 authpriv-err , sshd[83136]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-05-11 21:12:40.439879 authpriv-err , login[83145]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-05-11 21:12:40.440032 authpriv-err , login[83145]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-05-11 21:12:50.040343 user-err , ERROR:  Dissociating VRF from service: cnm
2025-05-11 21:12:50.130228 daemon-err , staticd[1214]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 243
2025-05-11 21:12:50.130287 daemon-err , staticd[1214]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 243
2025-05-11 21:13:08.664852 daemon-err , modulelauncher[83977]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:13:08.664891 daemon-err , modulelauncher[83977]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:13:08.667865 daemon-err , modulelauncher[83977]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:13:08.667908 daemon-err , modulelauncher[83977]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:13:21.645902 daemon-err , modulelauncher[84340]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:13:21.645971 daemon-err , modulelauncher[84340]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:13:21.655815 daemon-err , modulelauncher[84340]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:13:21.655892 daemon-err , modulelauncher[84340]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:13:24.024949 daemon-err , modulelauncher[84512]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-05-11 21:13:24.025010 daemon-err , modulelauncher[84512]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-05-11 21:13:24.027672 daemon-err , modulelauncher[84512]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-05-11 21:13:24.027718 daemon-err , modulelauncher[84512]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-05-11 21:14:27.435211 daemon-err , modulelauncher[86169]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-05-11 21:14:27.435322 daemon-err , modulelauncher[86169]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-05-11 21:14:27.438171 daemon-err , modulelauncher[86169]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-05-11 21:14:27.438249 daemon-err , modulelauncher[86169]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-05-11 21:14:27.441148 daemon-err , modulelauncher[86169]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-05-11 21:14:27.441231 daemon-err , modulelauncher[86169]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-05-11 21:14:38.924337 daemon-err , modulelauncher[86545]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-05-11 21:14:38.924389 daemon-err , modulelauncher[86545]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-05-11 21:14:38.928069 daemon-err , modulelauncher[86545]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-05-11 21:14:38.928101 daemon-err , modulelauncher[86545]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-05-11 21:14:38.931690 daemon-err , modulelauncher[86545]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-05-11 21:14:38.931746 daemon-err , modulelauncher[86545]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-05-11 21:14:41.467963 daemon-err , modulelauncher[86725]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-05-11 21:14:41.468013 daemon-err , modulelauncher[86725]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-05-11 21:14:41.470814 daemon-err , modulelauncher[86725]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-05-11 21:14:41.470850 daemon-err , modulelauncher[86725]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-05-11 21:14:41.473954 daemon-err , modulelauncher[86725]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-05-11 21:14:41.474007 daemon-err , modulelauncher[86725]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-05-11 21:15:34.013129 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-05-11 21:15:36.178459 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-05-11 21:15:48.767131 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-05-11 21:15:50.424886 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-05-11 21:16:03.032702 daemon-err , modulelauncher[89037]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-05-11 21:16:03.032762 daemon-err , modulelauncher[89037]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-05-11 21:16:03.036398 daemon-err , modulelauncher[89037]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-05-11 21:16:03.036457 daemon-err , modulelauncher[89037]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-05-11 21:16:03.040999 daemon-err , modulelauncher[89037]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-05-11 21:16:03.041073 daemon-err , modulelauncher[89037]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-05-11 21:16:04.325919 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-05-11 21:16:05.497190 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-05-11 21:18:03.092931 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-05-11 21:18:03.093186 syslog-info , rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="75109" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-05-11 21:18:03.094223 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2025-05-11 21:18:03.094482 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-05-11 21:18:03.123417 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-05-11 21:18:03.126087 syslog-info , rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-05-11 21:18:03.126158 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2025-05-11 21:18:03.126216 syslog-info , rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="93277" x-info="https://www.rsyslog.com"] start
2025-05-11 21:18:03.127272 daemon-notice , cfgd[1244]:  [89195]Completed change to active configuration
2025-05-11 21:18:03.129888 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-05-11 21:18:03.156919 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2025-05-11 21:18:03.312315 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2025-05-11 21:18:13.462696 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2025-05-11 21:18:13.462760 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-05-11 21:18:13.480200 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-05-11 21:18:13.485843 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2025-05-11 21:18:14.599160 daemon-info , systemd[1]:  Created slice system-dhcpd.slice - Slice /system/dhcpd.
2025-05-11 21:18:14.636129 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0:

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2025-05-11 21:18:23.954588 daemon-info , systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-05-11 21:18:23.955329 daemon-info , systemd[1]:  rsyslog.service: Deactivated successfully.
2025-05-11 21:18:23.955464 daemon-info , systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-05-11 21:18:23.989913 daemon-info , systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-05-11 21:18:23.992441 daemon-info , systemd[1]:  Started rsyslog.service - System Logging Service.
2025-05-11 21:18:24.994006 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Regex

Description

Create a new syslog file and collect all the syslog messages matching a specified regex.

Scenario

Step 1: Set the following configuration in DUT0:

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file cli_msg filter CLI app OSDxCLI
set system syslog file cli_msg filter CLI level notice
set system syslog file cli_msg filter CLI regex '(^|[^a-zA-Z0-9_])alert([^a-zA-Z0-9_]|$)'

Step 2: Run command command with alert word at DUT0 and expect this output:

Show output
Command validation failed:
CLI Error: Invalid token [command]
CLI Error: Command error

Step 3: Run command command with alerted word at DUT0 and expect this output:

Show output
Command validation failed:
CLI Error: Invalid token [command]
CLI Error: Command error

Step 4: Run command file show running://log/user/cli_msg/cli_msg | cat at DUT0 and expect this output:

Show output
2025-05-11 21:18:33.977684 auth-notice , OSDxCLI:  User 'admin' entered an invalid command: 'command with alert word'.

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.167 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.167/0.167/0.167/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-05-11T21:18:43.796149+00:00 10.215.168.64  2025-05-11T21:18:43.506451+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-05-11T21:18:43.796149+00:00 10.215.168.64  2025-05-11T21:18:43.506640+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94053" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-05-11T21:18:43.796149+00:00 10.215.168.64  2025-05-11T21:18:43.507571+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2025-05-11T21:18:43.796149+00:00 10.215.168.64  2025-05-11T21:18:43.507737+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-05-11T21:18:43.796149+00:00 10.215.168.64  2025-05-11T21:18:43.529258+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-05-11T21:18:43.796149+00:00 10.215.168.64  2025-05-11T21:18:43.531771+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2025-05-11T21:18:43.796149+00:00 10.215.168.64  2025-05-11T21:18:43.532482+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-05-11T21:18:43.796149+00:00 10.215.168.64  2025-05-11T21:18:43.532565+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94167" x-info="https://www.rsyslog.com"] start
2025-05-11T21:18:43.796631+00:00 10.215.168.64  2025-05-11T21:18:43.533344+00:00 daemon-notice osdx cfgd[1244]:  [89195]Completed change to active configuration
2025-05-11T21:18:43.833287+00:00 10.215.168.64  2025-05-11T21:18:43.569841+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-05-11T21:18:43.894022+00:00 10.215.168.64  2025-05-11T21:18:43.630631+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-05-11T21:18:44.071305+00:00 10.215.168.64  2025-05-11T21:18:43.807946+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2025-05-11T21:18:44.163219+00:00 10.215.168.64  2025-05-11T21:18:43.899830+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.301 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.301/0.301/0.301/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-05-11T21:18:44.730550+00:00 10.215.168.64  2025-05-11T21:18:44.467148+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-05-11T21:18:45.072669+00:00 10.215.168.64  2025-05-11T21:18:44.809282+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-05-11T21:18:45.099683+00:00 10.215.168.64  2025-05-11T21:18:44.835874+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-05-11T21:18:46.298393+00:00 10.215.168.64  2025-05-11T21:18:46.034866+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2025-05-11T21:18:46.765066+00:00 10.215.168.64  2025-05-11T21:18:46.501539+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-05-11T21:18:46.884669+00:00 10.215.168.64  2025-05-11T21:18:46.621130+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2025-05-11T21:18:46.995303+00:00 10.215.168.64  2025-05-11T21:18:46.731818+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-05-11T21:18:47.089958+00:00 10.215.168.64  2025-05-11T21:18:46.826422+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-05-11T21:18:53.127731+00:00 10.215.168.64  2025-05-11T21:18:52.426575+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-05-11T21:18:53.127793+00:00 10.215.168.64  2025-05-11T21:18:52.426759+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94265" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-05-11T21:18:53.127865+00:00 10.215.168.64  2025-05-11T21:18:52.427554+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2025-05-11T21:18:53.127865+00:00 10.215.168.64  2025-05-11T21:18:52.427716+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-05-11T21:18:53.127865+00:00 10.215.168.64  2025-05-11T21:18:52.451664+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-05-11T21:18:53.127875+00:00 10.215.168.64  2025-05-11T21:18:52.454315+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-05-11T21:18:53.127905+00:00 10.215.168.64  2025-05-11T21:18:52.454385+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2025-05-11T21:18:53.127905+00:00 10.215.168.64  2025-05-11T21:18:52.454451+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94428" x-info="https://www.rsyslog.com"] start
2025-05-11T21:18:53.128192+00:00 10.215.168.64  2025-05-11T21:18:52.455339+00:00 daemon-notice osdx cfgd[1244]:  [89195]Completed change to active configuration
2025-05-11T21:18:53.167047+00:00 10.215.168.64  2025-05-11T21:18:52.492563+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-05-11T21:18:53.192949+00:00 10.215.168.64  2025-05-11T21:18:52.520056+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-05-11T21:18:53.503256+00:00 10.215.168.64  2025-05-11T21:18:52.830195+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1  vrf VRF0    count 1 size 56 timeout 1'.
2025-05-11T21:18:53.585096+00:00 10.215.168.64  2025-05-11T21:18:52.912098+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.175 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.175/0.175/0.175/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-05-11T21:18:54.065279+00:00 10.215.168.64  2025-05-11T21:18:53.392339+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-05-11T21:18:54.322035+00:00 10.215.168.64  2025-05-11T21:18:53.649070+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-05-11T21:18:54.363547+00:00 10.215.168.64  2025-05-11T21:18:53.689540+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-05-11T21:18:55.723512+00:00 10.215.168.64  2025-05-11T21:18:55.050530+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2025-05-11T21:18:56.222444+00:00 10.215.168.64  2025-05-11T21:18:55.549434+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-05-11T21:18:56.340333+00:00 10.215.168.64  2025-05-11T21:18:55.667362+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2025-05-11T21:18:56.466446+00:00 10.215.168.64  2025-05-11T21:18:55.793467+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-05-11T21:18:56.654155+00:00 10.215.168.64  2025-05-11T21:18:55.981188+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-05-11T21:19:02.840569+00:00 10.215.168.64  2025-05-11T21:19:02.130395+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-05-11T21:19:02.840569+00:00 10.215.168.64  2025-05-11T21:19:02.130559+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94526" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-05-11T21:19:02.840569+00:00 10.215.168.64  2025-05-11T21:19:02.131703+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2025-05-11T21:19:02.840569+00:00 10.215.168.64  2025-05-11T21:19:02.131747+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-05-11T21:19:02.840569+00:00 10.215.168.64  2025-05-11T21:19:02.164781+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-05-11T21:19:02.840569+00:00 10.215.168.64  2025-05-11T21:19:02.168578+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-05-11T21:19:02.840569+00:00 10.215.168.64  2025-05-11T21:19:02.168658+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94697" x-info="https://www.rsyslog.com"] start
2025-05-11T21:19:02.840569+00:00 10.215.168.64  2025-05-11T21:19:02.168712+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2025-05-11T21:19:02.841497+00:00 10.215.168.64  2025-05-11T21:19:02.169662+00:00 daemon-notice osdx cfgd[1244]:  [89195]Completed change to active configuration
2025-05-11T21:19:02.881729+00:00 10.215.168.64  2025-05-11T21:19:02.209860+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-05-11T21:19:02.917133+00:00 10.215.168.64  2025-05-11T21:19:02.245306+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-05-11T21:19:03.098264+00:00 10.215.168.64  2025-05-11T21:19:02.426423+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2025-05-11T21:19:03.207552+00:00 10.215.168.64  2025-05-11T21:19:02.535675+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.207 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.207/0.207/0.207/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-05-11T21:19:12.554944+00:00 33.33.33.33  2025-05-11T21:19:11.485460+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-05-11T21:19:12.554944+00:00 33.33.33.33  2025-05-11T21:19:11.485694+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94795" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-05-11T21:19:12.554944+00:00 33.33.33.33  2025-05-11T21:19:11.486652+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2025-05-11T21:19:12.554944+00:00 33.33.33.33  2025-05-11T21:19:11.486785+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-05-11T21:19:12.554944+00:00 33.33.33.33  2025-05-11T21:19:11.506936+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-05-11T21:19:12.554944+00:00 33.33.33.33  2025-05-11T21:19:11.511048+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-05-11T21:19:12.554966+00:00 33.33.33.33  2025-05-11T21:19:11.511118+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2025-05-11T21:19:12.554966+00:00 33.33.33.33  2025-05-11T21:19:11.512592+00:00 daemon-notice osdx cfgd[1244]:  [89195]Completed change to active configuration
2025-05-11T21:19:12.555138+00:00 33.33.33.33  2025-05-11T21:19:11.513221+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="94944" x-info="https://www.rsyslog.com"] start
2025-05-11T21:19:12.619209+00:00 33.33.33.33  2025-05-11T21:19:11.567720+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-05-11T21:19:12.640765+00:00 33.33.33.33  2025-05-11T21:19:11.598765+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-05-11T21:19:12.866711+00:00 33.33.33.33  2025-05-11T21:19:11.824757+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2025-05-11T21:19:12.996859+00:00 33.33.33.33  2025-05-11T21:19:11.954891+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.232 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.232/0.232/0.232/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-05-11T21:19:13.543403+00:00 33.33.33.33  2025-05-11T21:19:12.501411+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-05-11T21:19:13.878128+00:00 33.33.33.33  2025-05-11T21:19:12.836096+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-05-11T21:19:13.902563+00:00 33.33.33.33  2025-05-11T21:19:12.860540+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-05-11T21:19:15.266160+00:00 33.33.33.33  2025-05-11T21:19:14.224128+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2025-05-11T21:19:15.868641+00:00 33.33.33.33  2025-05-11T21:19:14.826594+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-05-11T21:19:16.018793+00:00 33.33.33.33  2025-05-11T21:19:14.976735+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete'.
2025-05-11T21:19:16.168638+00:00 33.33.33.33  2025-05-11T21:19:15.126519+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-05-11T21:19:16.284950+00:00 33.33.33.33  2025-05-11T21:19:15.242887+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-05-11T21:19:23.084602+00:00 33.33.33.33  2025-05-11T21:19:22.769036+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-05-11T21:19:23.084602+00:00 33.33.33.33  2025-05-11T21:19:22.769376+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="95042" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-05-11T21:19:23.084602+00:00 33.33.33.33  2025-05-11T21:19:22.770348+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2025-05-11T21:19:23.084602+00:00 33.33.33.33  2025-05-11T21:19:22.770510+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-05-11T21:19:23.084602+00:00 33.33.33.33  2025-05-11T21:19:22.795169+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-05-11T21:19:23.084602+00:00 33.33.33.33  2025-05-11T21:19:22.798109+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-05-11T21:19:23.084602+00:00 33.33.33.33  2025-05-11T21:19:22.798178+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2025-05-11T21:19:23.084602+00:00 33.33.33.33  2025-05-11T21:19:22.798728+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="95230" x-info="https://www.rsyslog.com"] start
2025-05-11T21:19:23.084602+00:00 33.33.33.33  2025-05-11T21:19:22.798798+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2025-05-11T21:19:23.087779+00:00 33.33.33.33  2025-05-11T21:19:22.802132+00:00 daemon-notice osdx cfgd[1244]:  [89195]Completed change to active configuration
2025-05-11T21:19:23.124739+00:00 33.33.33.33  2025-05-11T21:19:22.839136+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-05-11T21:19:23.174912+00:00 33.33.33.33  2025-05-11T21:19:22.889290+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-05-11T21:19:23.511650+00:00 33.33.33.33  2025-05-11T21:19:23.226060+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1  vrf VRF0    count 1 size 56 timeout 1'.
2025-05-11T21:19:23.624559+00:00 33.33.33.33  2025-05-11T21:19:23.338925+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.184 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.184/0.184/0.184/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-05-11T21:19:32.896503+00:00 10.215.168.64  2025-05-11T21:19:31.977948+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-05-11T21:19:32.896503+00:00 10.215.168.64  2025-05-11T21:19:31.978182+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="95328" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-05-11T21:19:32.896503+00:00 10.215.168.64  2025-05-11T21:19:31.978949+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2025-05-11T21:19:32.896503+00:00 10.215.168.64  2025-05-11T21:19:31.979168+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-05-11T21:19:32.896503+00:00 10.215.168.64  2025-05-11T21:19:32.002086+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-05-11T21:19:32.939732+00:00 10.215.168.64  2025-05-11T21:19:32.009137+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-05-11T21:19:32.939732+00:00 10.215.168.64  2025-05-11T21:19:32.009244+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="95507" x-info="https://www.rsyslog.com"] start
2025-05-11T21:19:32.939732+00:00 10.215.168.64  2025-05-11T21:19:32.010190+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2025-05-11T21:19:32.939732+00:00 10.215.168.64  2025-05-11T21:19:32.011393+00:00 daemon-notice osdx cfgd[1244]:  [89195]Completed change to active configuration
2025-05-11T21:19:32.939732+00:00 10.215.168.64  2025-05-11T21:19:32.051007+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-05-11T21:19:32.939732+00:00 10.215.168.64  2025-05-11T21:19:32.091167+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-05-11T21:19:32.939732+00:00 10.215.168.64  2025-05-11T21:19:32.216175+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-05-11T21:19:32.939732+00:00 10.215.168.64  2025-05-11T21:19:32.216250+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-05-11T21:19:32.963368+00:00 10.215.168.64  2025-05-11T21:19:32.351633+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2025-05-11T21:19:33.276603+00:00 10.215.168.64  2025-05-11T21:19:32.665751+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0:

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.142 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.142/0.142/0.142/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-05-11T21:19:43.598744+00:00 33.33.33.33  2025-05-11T21:19:42.512835+00:00 daemon-info osdx systemd[1]:  Stopping rsyslog.service - System Logging Service...
2025-05-11T21:19:43.598744+00:00 33.33.33.33  2025-05-11T21:19:42.513058+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="95606" x-info="https://www.rsyslog.com"] exiting on signal 15.
2025-05-11T21:19:43.598907+00:00 33.33.33.33  2025-05-11T21:19:42.513465+00:00 daemon-info osdx systemd[1]:  rsyslog.service: Deactivated successfully.
2025-05-11T21:19:43.598907+00:00 33.33.33.33  2025-05-11T21:19:42.513732+00:00 daemon-info osdx systemd[1]:  Stopped rsyslog.service - System Logging Service.
2025-05-11T21:19:43.598907+00:00 33.33.33.33  2025-05-11T21:19:42.546416+00:00 daemon-info osdx systemd[1]:  Starting rsyslog.service - System Logging Service...
2025-05-11T21:19:43.598907+00:00 33.33.33.33  2025-05-11T21:19:42.549232+00:00 syslog-info osdx rsyslogd:  imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd.  [v8.2302.0]
2025-05-11T21:19:43.598907+00:00 33.33.33.33  2025-05-11T21:19:42.549298+00:00 daemon-info osdx systemd[1]:  Started rsyslog.service - System Logging Service.
2025-05-11T21:19:43.598907+00:00 33.33.33.33  2025-05-11T21:19:42.549361+00:00 syslog-info osdx rsyslogd:  [origin software="rsyslogd" swVersion="8.2302.0" x-pid="95759" x-info="https://www.rsyslog.com"] start
2025-05-11T21:19:43.598907+00:00 33.33.33.33  2025-05-11T21:19:42.550535+00:00 daemon-notice osdx cfgd[1244]:  [89195]Completed change to active configuration
2025-05-11T21:19:43.598907+00:00 33.33.33.33  2025-05-11T21:19:42.603116+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-05-11T21:19:43.598907+00:00 33.33.33.33  2025-05-11T21:19:42.640219+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-05-11T21:19:43.598907+00:00 33.33.33.33  2025-05-11T21:19:42.750803+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-05-11T21:19:43.598907+00:00 33.33.33.33  2025-05-11T21:19:42.750912+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-05-11T21:19:43.681260+00:00 33.33.33.33  2025-05-11T21:19:42.846710+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1      count 1 size 56 timeout 1'.
2025-05-11T21:19:43.922064+00:00 33.33.33.33  2025-05-11T21:19:43.087476+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.