Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2025-02-19 16:15:46.063106 daemon-err , modulelauncher[96176]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-02-19 16:15:46.063202 daemon-err , modulelauncher[96176]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-02-19 16:15:46.067700 daemon-err , modulelauncher[96176]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-02-19 16:15:46.067752 daemon-err , modulelauncher[96176]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-02-19 16:17:07.279708 daemon-err , modulelauncher[98198]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-02-19 16:17:07.279790 daemon-err , modulelauncher[98198]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-02-19 16:17:07.283558 daemon-err , modulelauncher[98198]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-02-19 16:17:07.283609 daemon-err , modulelauncher[98198]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-02-19 16:17:07.289106 daemon-err , modulelauncher[98198]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-02-19 16:17:07.289285 daemon-err , modulelauncher[98198]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-02-19 16:17:32.482641 daemon-err , modulelauncher[98316]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-02-19 16:17:32.482686 daemon-err , modulelauncher[98316]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-02-19 16:17:32.485208 daemon-err , modulelauncher[98316]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-02-19 16:17:32.485241 daemon-err , modulelauncher[98316]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-02-19 16:17:32.487855 daemon-err , modulelauncher[98316]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-02-19 16:17:32.487886 daemon-err , modulelauncher[98316]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-02-19 16:17:32.491189 daemon-err , modulelauncher[98316]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-02-19 16:17:32.491239 daemon-err , modulelauncher[98316]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-02-19 16:17:32.494424 daemon-err , modulelauncher[98316]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-02-19 16:17:32.494461 daemon-err , modulelauncher[98316]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-02-19 16:17:32.497449 daemon-err , modulelauncher[98316]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-02-19 16:17:32.497496 daemon-err , modulelauncher[98316]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-02-19 16:17:58.834692 daemon-err , modulelauncher[98406]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-02-19 16:17:58.834742 daemon-err , modulelauncher[98406]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-02-19 16:17:58.837507 daemon-err , modulelauncher[98406]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-02-19 16:17:58.837536 daemon-err , modulelauncher[98406]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-02-19 16:17:58.841707 daemon-err , modulelauncher[98406]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-02-19 16:17:58.841772 daemon-err , modulelauncher[98406]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-02-19 16:17:58.846094 daemon-err , modulelauncher[98406]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-02-19 16:17:58.846143 daemon-err , modulelauncher[98406]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-02-19 16:17:58.849070 daemon-err , modulelauncher[98406]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-02-19 16:17:58.849154 daemon-err , modulelauncher[98406]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-02-19 16:17:58.853198 daemon-err , modulelauncher[98406]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-02-19 16:17:58.853252 daemon-err , modulelauncher[98406]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-02-19 16:18:25.637876 daemon-err , modulelauncher[98554]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-02-19 16:18:25.637932 daemon-err , modulelauncher[98554]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-02-19 16:18:25.642040 daemon-err , modulelauncher[98554]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-02-19 16:18:25.642102 daemon-err , modulelauncher[98554]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-02-19 16:18:25.645375 daemon-err , modulelauncher[98554]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-02-19 16:18:25.645411 daemon-err , modulelauncher[98554]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-02-19 16:18:25.648967 daemon-err , modulelauncher[98554]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-02-19 16:18:25.649073 daemon-err , modulelauncher[98554]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-02-19 16:18:25.652355 daemon-err , modulelauncher[98554]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-02-19 16:18:25.652397 daemon-err , modulelauncher[98554]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-02-19 16:18:25.655689 daemon-err , modulelauncher[98554]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-02-19 16:18:25.655752 daemon-err , modulelauncher[98554]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-02-19 16:18:52.078511 daemon-err , modulelauncher[98641]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-02-19 16:18:52.078572 daemon-err , modulelauncher[98641]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-02-19 16:18:52.085177 daemon-err , modulelauncher[98641]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-02-19 16:18:52.085245 daemon-err , modulelauncher[98641]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-02-19 16:19:19.837251 daemon-err , modulelauncher[98820]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-02-19 16:19:19.837349 daemon-err , modulelauncher[98820]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-02-19 16:19:19.840751 daemon-err , modulelauncher[98820]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-02-19 16:19:19.840794 daemon-err , modulelauncher[98820]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-02-19 16:19:19.844980 daemon-err , modulelauncher[98820]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-02-19 16:19:19.845096 daemon-err , modulelauncher[98820]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-02-19 16:19:19.849132 daemon-err , modulelauncher[98820]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-02-19 16:19:19.849238 daemon-err , modulelauncher[98820]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-02-19 16:19:47.955491 daemon-err , modulelauncher[98908]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-02-19 16:19:47.955634 daemon-err , modulelauncher[98908]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-02-19 16:19:47.958890 daemon-err , modulelauncher[98908]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-02-19 16:19:47.958982 daemon-err , modulelauncher[98908]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-02-19 16:19:47.962609 daemon-err , modulelauncher[98908]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-02-19 16:19:47.962696 daemon-err , modulelauncher[98908]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-02-19 16:19:47.966466 daemon-err , modulelauncher[98908]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-02-19 16:19:47.966568 daemon-err , modulelauncher[98908]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-02-19 16:20:15.751365 daemon-err , modulelauncher[99056]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-02-19 16:20:15.751420 daemon-err , modulelauncher[99056]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-02-19 16:20:15.754182 daemon-err , modulelauncher[99056]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-02-19 16:20:15.754226 daemon-err , modulelauncher[99056]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-02-19 16:20:15.757858 daemon-err , modulelauncher[99056]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-02-19 16:20:15.757960 daemon-err , modulelauncher[99056]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-02-19 16:20:15.761030 daemon-err , modulelauncher[99056]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-02-19 16:20:15.761184 daemon-err , modulelauncher[99056]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-02-19 16:20:44.132813 daemon-err , modulelauncher[99139]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-02-19 16:20:44.132874 daemon-err , modulelauncher[99139]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-02-19 16:20:44.136370 daemon-err , modulelauncher[99139]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-02-19 16:20:44.136427 daemon-err , modulelauncher[99139]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-02-19 16:20:44.141082 daemon-err , modulelauncher[99139]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-02-19 16:20:44.141199 daemon-err , modulelauncher[99139]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-02-19 16:20:45.056864 auth-err , sshd[99268]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-02-19 16:20:45.057024 auth-err , sshd[99268]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-02-19 16:20:45.078621 auth-err , sshd[99268]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-02-19 16:20:45.078696 auth-err , sshd[99268]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-02-19 16:20:45.635698 authpriv-err , login[99310]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-02-19 16:20:45.635777 authpriv-err , login[99310]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-02-19 16:20:45.636300 authpriv-err , login[99310]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-02-19 16:20:45.636395 authpriv-err , login[99310]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-02-19 16:20:45.642728 authpriv-err , login[99310]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-02-19 16:20:45.642803 authpriv-err , login[99310]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-02-19 16:20:48.319135 daemon-err , modulelauncher[99379]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-02-19 16:20:48.319261 daemon-err , modulelauncher[99379]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-02-19 16:20:48.323017 daemon-err , modulelauncher[99379]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-02-19 16:20:48.323182 daemon-err , modulelauncher[99379]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-02-19 16:20:48.327440 daemon-err , modulelauncher[99379]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-02-19 16:20:48.327559 daemon-err , modulelauncher[99379]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-02-19 16:20:48.338266 daemon-err , modulelauncher[99379]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-02-19 16:20:48.338396 daemon-err , modulelauncher[99379]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-02-19 16:20:48.342827 daemon-err , modulelauncher[99379]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-02-19 16:20:48.342878 daemon-err , modulelauncher[99379]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-02-19 16:20:48.347317 daemon-err , modulelauncher[99379]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-02-19 16:20:48.347374 daemon-err , modulelauncher[99379]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-02-19 16:20:49.249136 auth-err , sshd[99415]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-02-19 16:20:49.249228 auth-err , sshd[99415]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-02-19 16:21:09.684041 authpriv-err , login[99427]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-02-19 16:21:09.684261 authpriv-err , login[99427]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-02-19 16:21:15.071418 daemon-err , modulelauncher[99471]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-02-19 16:21:15.071510 daemon-err , modulelauncher[99471]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-02-19 16:21:15.077022 daemon-err , modulelauncher[99471]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-02-19 16:21:15.077085 daemon-err , modulelauncher[99471]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-02-19 16:21:15.090905 daemon-err , modulelauncher[99471]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-02-19 16:21:15.091046 daemon-err , modulelauncher[99471]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-02-19 16:21:15.096670 daemon-err , modulelauncher[99471]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-02-19 16:21:15.096749 daemon-err , modulelauncher[99471]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-02-19 16:21:15.100988 daemon-err , modulelauncher[99471]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-02-19 16:21:15.101144 daemon-err , modulelauncher[99471]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-02-19 16:21:15.105253 daemon-err , modulelauncher[99471]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-02-19 16:21:15.105304 daemon-err , modulelauncher[99471]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-02-19 16:21:15.209673 daemon-err , zebra[66672]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: No such file or directory, type=RTM_DELNEXTHOP(105), seq=1983, pid=2361265723
2025-02-19 16:21:15.209765 daemon-err , zebra[66672]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: No such file or directory, type=RTM_DELNEXTHOP(105), seq=1985, pid=2361265723
2025-02-19 16:21:15.209809 daemon-err , zebra[66672]:  [YA619-S7J5M][EC 4043309075] Failed to uninstall Nexthop ID (772) from the kernel
2025-02-19 16:21:15.209853 daemon-err , zebra[66672]:  [YA619-S7J5M][EC 4043309075] Failed to uninstall Nexthop ID (774) from the kernel
2025-02-19 16:21:16.232335 auth-err , sshd[99564]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-02-19 16:21:16.232486 auth-err , sshd[99564]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-02-19 16:21:16.237627 auth-err , sshd[99564]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-02-19 16:21:16.237741 auth-err , sshd[99564]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-02-19 16:21:16.883791 authpriv-err , login[99606]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-02-19 16:21:16.883874 authpriv-err , login[99606]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-02-19 16:21:16.884367 authpriv-err , login[99606]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-02-19 16:21:16.884528 authpriv-err , login[99606]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-02-19 16:21:16.891344 authpriv-err , login[99606]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-02-19 16:21:16.891458 authpriv-err , login[99606]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-02-19 16:21:19.618685 daemon-err , modulelauncher[99681]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-02-19 16:21:19.618760 daemon-err , modulelauncher[99681]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-02-19 16:21:19.623665 daemon-err , modulelauncher[99681]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-02-19 16:21:19.623723 daemon-err , modulelauncher[99681]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-02-19 16:21:19.628982 daemon-err , modulelauncher[99681]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-02-19 16:21:19.629083 daemon-err , modulelauncher[99681]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-02-19 16:21:19.633375 daemon-err , modulelauncher[99681]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-02-19 16:21:19.633433 daemon-err , modulelauncher[99681]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-02-19 16:21:19.637648 daemon-err , modulelauncher[99681]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-02-19 16:21:19.637804 daemon-err , modulelauncher[99681]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-02-19 16:21:19.641803 daemon-err , modulelauncher[99681]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-02-19 16:21:19.641925 daemon-err , modulelauncher[99681]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-02-19 16:21:20.540570 auth-err , sshd[99717]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-02-19 16:21:20.540649 auth-err , sshd[99717]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-02-19 16:21:40.989987 authpriv-err , login[99728]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-02-19 16:21:40.990072 authpriv-err , login[99728]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-02-19 16:21:46.321457 daemon-err , modulelauncher[99768]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-02-19 16:21:46.321500 daemon-err , modulelauncher[99768]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-02-19 16:21:46.324266 daemon-err , modulelauncher[99768]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-02-19 16:21:46.324313 daemon-err , modulelauncher[99768]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-02-19 16:21:47.187613 authpriv-err , sshd[99898]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-02-19 16:21:47.187689 authpriv-err , sshd[99898]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-02-19 16:21:47.760778 authpriv-err , login[99941]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-02-19 16:21:47.760863 authpriv-err , login[99941]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-02-19 16:21:50.096793 daemon-err , modulelauncher[100011]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-02-19 16:21:50.096948 daemon-err , modulelauncher[100011]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-02-19 16:21:50.100137 daemon-err , modulelauncher[100011]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-02-19 16:21:50.100245 daemon-err , modulelauncher[100011]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-02-19 16:21:50.103923 daemon-err , modulelauncher[100011]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-02-19 16:21:50.104030 daemon-err , modulelauncher[100011]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-02-19 16:21:50.107404 daemon-err , modulelauncher[100011]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-02-19 16:21:50.107514 daemon-err , modulelauncher[100011]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-02-19 16:21:50.878262 authpriv-err , sshd[100045]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-02-19 16:21:50.878391 authpriv-err , sshd[100045]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-02-19 16:22:11.370719 authpriv-err , login[100057]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-02-19 16:22:11.370796 authpriv-err , login[100057]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-02-19 16:22:16.482267 daemon-err , modulelauncher[100101]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-02-19 16:22:16.482318 daemon-err , modulelauncher[100101]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-02-19 16:22:16.485029 daemon-err , modulelauncher[100101]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-02-19 16:22:16.485077 daemon-err , modulelauncher[100101]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-02-19 16:22:16.488882 daemon-err , modulelauncher[100101]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-02-19 16:22:16.488920 daemon-err , modulelauncher[100101]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-02-19 16:22:16.492176 daemon-err , modulelauncher[100101]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-02-19 16:22:16.492234 daemon-err , modulelauncher[100101]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-02-19 16:22:17.477003 authpriv-err , sshd[100192]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-02-19 16:22:17.477119 authpriv-err , sshd[100192]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-02-19 16:22:18.004375 authpriv-err , login[100234]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-02-19 16:22:18.004446 authpriv-err , login[100234]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-02-19 16:22:21.155196 daemon-err , modulelauncher[100310]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-02-19 16:22:21.155349 daemon-err , modulelauncher[100310]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-02-19 16:22:21.158900 daemon-err , modulelauncher[100310]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-02-19 16:22:21.159040 daemon-err , modulelauncher[100310]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-02-19 16:22:21.163325 daemon-err , modulelauncher[100310]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-02-19 16:22:21.163436 daemon-err , modulelauncher[100310]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-02-19 16:22:21.166601 daemon-err , modulelauncher[100310]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-02-19 16:22:21.166649 daemon-err , modulelauncher[100310]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-02-19 16:22:22.102822 authpriv-err , sshd[100344]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-02-19 16:22:22.102913 authpriv-err , sshd[100344]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-02-19 16:22:42.611001 authpriv-err , login[100353]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-02-19 16:22:42.611056 authpriv-err , login[100353]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-02-19 16:22:50.660519 user-err , ERROR:  Dissociating VRF from service: cnm
2025-02-19 16:22:50.737882 daemon-err , staticd[66677]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 180
2025-02-19 16:22:50.737957 daemon-err , staticd[66677]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 180
2025-02-19 16:24:36.029527 daemon-err , cfgd[1446]:  [88729]Command output: File name reserved Value validation failed
2025-02-19 16:24:44.466388 daemon-notice , cfgd[1446]:  [88729]Completed change to active configuration
2025-02-19 16:24:44.468595 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-02-19 16:24:44.512902 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19 16:24:44.688923 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2025-02-19 16:24:57.074067 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2025-02-19 16:25:09.238853 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.210 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.210/0.210/0.210/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-19T16:25:19.537221+00:00 10.215.168.64  2025-02-19T16:25:19.028203+00:00 daemon-notice osdx cfgd[1446]:  [88729]Completed change to active configuration
2025-02-19T16:25:19.600442+00:00 10.215.168.64  2025-02-19T16:25:19.092007+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-19T16:25:19.659570+00:00 10.215.168.64  2025-02-19T16:25:19.147972+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19T16:25:19.945430+00:00 10.215.168.64  2025-02-19T16:25:19.437620+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-02-19T16:25:20.110727+00:00 10.215.168.64  2025-02-19T16:25:19.602834+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=3.22 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 3.215/3.215/3.215/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-19T16:25:20.860416+00:00 10.215.168.64  2025-02-19T16:25:20.352629+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-02-19T16:25:21.138177+00:00 10.215.168.64  2025-02-19T16:25:20.630328+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-02-19T16:25:21.163376+00:00 10.215.168.64  2025-02-19T16:25:20.655532+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-02-19T16:25:22.702998+00:00 10.215.168.64  2025-02-19T16:25:22.194186+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2025-02-19T16:25:23.337115+00:00 10.215.168.64  2025-02-19T16:25:22.829251+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-02-19T16:25:23.466046+00:00 10.215.168.64  2025-02-19T16:25:22.958197+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-02-19T16:25:23.612379+00:00 10.215.168.64  2025-02-19T16:25:23.104549+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-02-19T16:25:23.727269+00:00 10.215.168.64  2025-02-19T16:25:23.219435+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-02-19T16:25:30.901056+00:00 10.215.168.64  2025-02-19T16:25:30.106692+00:00 daemon-notice osdx cfgd[1446]:  [88729]Completed change to active configuration
2025-02-19T16:25:30.943263+00:00 10.215.168.64  2025-02-19T16:25:30.152377+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-19T16:25:30.989159+00:00 10.215.168.64  2025-02-19T16:25:30.198467+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19T16:25:31.367660+00:00 10.215.168.64  2025-02-19T16:25:30.576931+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-02-19T16:25:31.457633+00:00 10.215.168.64  2025-02-19T16:25:30.666778+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.167 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.167/0.167/0.167/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-19T16:25:32.137054+00:00 10.215.168.64  2025-02-19T16:25:31.344259+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-02-19T16:25:32.532500+00:00 10.215.168.64  2025-02-19T16:25:31.741780+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-02-19T16:25:32.564124+00:00 10.215.168.64  2025-02-19T16:25:31.773125+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-02-19T16:25:34.206324+00:00 10.215.168.64  2025-02-19T16:25:33.415609+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2025-02-19T16:25:34.775623+00:00 10.215.168.64  2025-02-19T16:25:33.984871+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-02-19T16:25:34.904314+00:00 10.215.168.64  2025-02-19T16:25:34.113400+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-02-19T16:25:35.061533+00:00 10.215.168.64  2025-02-19T16:25:34.270771+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-02-19T16:25:35.180409+00:00 10.215.168.64  2025-02-19T16:25:34.387623+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-02-19T16:25:41.196173+00:00 10.215.168.64  2025-02-19T16:25:40.797574+00:00 daemon-notice osdx cfgd[1446]:  [88729]Completed change to active configuration
2025-02-19T16:25:41.236490+00:00 10.215.168.64  2025-02-19T16:25:40.838115+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-19T16:25:41.288210+00:00 10.215.168.64  2025-02-19T16:25:40.889629+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19T16:25:41.514437+00:00 10.215.168.64  2025-02-19T16:25:41.116037+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-02-19T16:25:41.630573+00:00 10.215.168.64  2025-02-19T16:25:41.232170+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.188 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.188/0.188/0.188/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-19T16:25:51.771690+00:00 33.33.33.33  2025-02-19T16:25:51.617765+00:00 daemon-notice osdx cfgd[1446]:  [88729]Completed change to active configuration
2025-02-19T16:25:51.814965+00:00 33.33.33.33  2025-02-19T16:25:51.661128+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-19T16:25:51.863194+00:00 33.33.33.33  2025-02-19T16:25:51.709541+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19T16:25:52.089525+00:00 33.33.33.33  2025-02-19T16:25:51.935813+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-02-19T16:25:52.193056+00:00 33.33.33.33  2025-02-19T16:25:52.035836+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.197 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.197/0.197/0.197/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-19T16:25:52.824401+00:00 33.33.33.33  2025-02-19T16:25:52.670696+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-02-19T16:25:53.084779+00:00 33.33.33.33  2025-02-19T16:25:52.931157+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-02-19T16:25:53.108296+00:00 33.33.33.33  2025-02-19T16:25:52.954590+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-02-19T16:25:54.412909+00:00 33.33.33.33  2025-02-19T16:25:54.259247+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2025-02-19T16:25:55.019394+00:00 33.33.33.33  2025-02-19T16:25:54.865757+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-02-19T16:25:55.131302+00:00 33.33.33.33  2025-02-19T16:25:54.977590+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-02-19T16:25:55.318681+00:00 33.33.33.33  2025-02-19T16:25:55.164936+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-02-19T16:25:55.447253+00:00 33.33.33.33  2025-02-19T16:25:55.293441+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-02-19T16:26:03.408046+00:00 33.33.33.33  2025-02-19T16:26:02.823101+00:00 daemon-notice osdx cfgd[1446]:  [88729]Completed change to active configuration
2025-02-19T16:26:03.408046+00:00 33.33.33.33  2025-02-19T16:26:02.823482+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2025-02-19T16:26:03.461044+00:00 33.33.33.33  2025-02-19T16:26:02.866121+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-19T16:26:03.494345+00:00 33.33.33.33  2025-02-19T16:26:02.909936+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19T16:26:03.836530+00:00 33.33.33.33  2025-02-19T16:26:03.252118+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-02-19T16:26:03.956452+00:00 33.33.33.33  2025-02-19T16:26:03.371973+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.347 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.347/0.347/0.347/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-19T16:26:14.754691+00:00 10.215.168.64  2025-02-19T16:26:13.342731+00:00 daemon-notice osdx cfgd[1446]:  [88729]Completed change to active configuration
2025-02-19T16:26:14.797144+00:00 10.215.168.64  2025-02-19T16:26:13.384235+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-19T16:26:14.797144+00:00 10.215.168.64  2025-02-19T16:26:13.438040+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19T16:26:14.797144+00:00 10.215.168.64  2025-02-19T16:26:13.707016+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-02-19T16:26:14.797144+00:00 10.215.168.64  2025-02-19T16:26:13.864212+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-02-19T16:26:14.797144+00:00 10.215.168.64  2025-02-19T16:26:13.864289+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-02-19T16:26:15.983475+00:00 10.215.168.64  2025-02-19T16:26:15.158519+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.296 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.296/0.296/0.296/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-02-19T16:26:26.262415+00:00 33.33.33.33  2025-02-19T16:26:24.716381+00:00 daemon-notice osdx cfgd[1446]:  [88729]Completed change to active configuration
2025-02-19T16:26:26.309204+00:00 33.33.33.33  2025-02-19T16:26:24.757062+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-02-19T16:26:26.309204+00:00 33.33.33.33  2025-02-19T16:26:24.814536+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-02-19T16:26:26.309204+00:00 33.33.33.33  2025-02-19T16:26:25.059109+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-02-19T16:26:26.309204+00:00 33.33.33.33  2025-02-19T16:26:25.289292+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-02-19T16:26:26.309204+00:00 33.33.33.33  2025-02-19T16:26:25.289370+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-02-19T16:26:27.474000+00:00 33.33.33.33  2025-02-19T16:26:26.513272+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.