Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2025-03-10 10:18:42.370106 daemon-err , modulelauncher[13895]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-03-10 10:18:42.370130 daemon-err , modulelauncher[13895]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-03-10 10:18:42.372118 daemon-err , modulelauncher[13895]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-03-10 10:18:42.372140 daemon-err , modulelauncher[13895]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-03-10 10:18:42.373909 daemon-err , modulelauncher[13895]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-03-10 10:18:42.373933 daemon-err , modulelauncher[13895]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-03-10 10:19:08.325498 daemon-err , modulelauncher[13981]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-03-10 10:19:08.325525 daemon-err , modulelauncher[13981]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-03-10 10:19:08.327256 daemon-err , modulelauncher[13981]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-03-10 10:19:08.327274 daemon-err , modulelauncher[13981]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-03-10 10:19:08.329179 daemon-err , modulelauncher[13981]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-03-10 10:19:08.329204 daemon-err , modulelauncher[13981]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-03-10 10:19:08.835906 auth-err , sshd[14110]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-03-10 10:19:08.836150 auth-err , sshd[14110]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-03-10 10:19:08.849351 auth-err , sshd[14110]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-03-10 10:19:08.849426 auth-err , sshd[14110]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-03-10 10:19:09.253701 authpriv-err , login[14152]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-03-10 10:19:09.253748 authpriv-err , login[14152]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-03-10 10:19:09.254150 authpriv-err , login[14152]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-03-10 10:19:09.254204 authpriv-err , login[14152]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-03-10 10:19:09.260014 authpriv-err , login[14152]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-03-10 10:19:09.260055 authpriv-err , login[14152]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-03-10 10:19:10.611173 daemon-err , modulelauncher[14221]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-03-10 10:19:10.611198 daemon-err , modulelauncher[14221]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-03-10 10:19:10.612930 daemon-err , modulelauncher[14221]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-03-10 10:19:10.612948 daemon-err , modulelauncher[14221]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-03-10 10:19:10.614801 daemon-err , modulelauncher[14221]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-03-10 10:19:10.614822 daemon-err , modulelauncher[14221]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-03-10 10:19:10.616804 daemon-err , modulelauncher[14221]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-03-10 10:19:10.616825 daemon-err , modulelauncher[14221]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-03-10 10:19:10.618618 daemon-err , modulelauncher[14221]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-03-10 10:19:10.618638 daemon-err , modulelauncher[14221]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-03-10 10:19:10.620877 daemon-err , modulelauncher[14221]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-03-10 10:19:10.620896 daemon-err , modulelauncher[14221]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-03-10 10:19:11.048499 auth-err , sshd[14257]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-03-10 10:19:11.048543 auth-err , sshd[14257]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-03-10 10:19:31.397725 authpriv-err , login[14266]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-03-10 10:19:31.397781 authpriv-err , login[14266]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-03-10 10:19:36.414719 daemon-err , modulelauncher[14310]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-03-10 10:19:36.414743 daemon-err , modulelauncher[14310]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-03-10 10:19:36.416421 daemon-err , modulelauncher[14310]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-03-10 10:19:36.416439 daemon-err , modulelauncher[14310]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-03-10 10:19:36.418348 daemon-err , modulelauncher[14310]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-03-10 10:19:36.418369 daemon-err , modulelauncher[14310]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-03-10 10:19:36.420319 daemon-err , modulelauncher[14310]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-03-10 10:19:36.420340 daemon-err , modulelauncher[14310]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-03-10 10:19:36.422187 daemon-err , modulelauncher[14310]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-03-10 10:19:36.422215 daemon-err , modulelauncher[14310]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-03-10 10:19:36.424375 daemon-err , modulelauncher[14310]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-03-10 10:19:36.424396 daemon-err , modulelauncher[14310]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-03-10 10:19:36.883975 auth-err , sshd[14403]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-03-10 10:19:36.884088 auth-err , sshd[14403]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-03-10 10:19:36.890732 auth-err , sshd[14403]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-03-10 10:19:36.890797 auth-err , sshd[14403]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-03-10 10:19:37.283758 authpriv-err , login[14445]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-03-10 10:19:37.283812 authpriv-err , login[14445]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-03-10 10:19:37.283995 authpriv-err , login[14445]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-03-10 10:19:37.284041 authpriv-err , login[14445]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-03-10 10:19:37.287240 authpriv-err , login[14445]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-03-10 10:19:37.287265 authpriv-err , login[14445]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-03-10 10:19:38.772284 daemon-err , modulelauncher[14521]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-03-10 10:19:38.772307 daemon-err , modulelauncher[14521]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-03-10 10:19:38.774096 daemon-err , modulelauncher[14521]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-03-10 10:19:38.774128 daemon-err , modulelauncher[14521]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-03-10 10:19:38.776526 daemon-err , modulelauncher[14521]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-03-10 10:19:38.776543 daemon-err , modulelauncher[14521]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-03-10 10:19:38.778763 daemon-err , modulelauncher[14521]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-03-10 10:19:38.778784 daemon-err , modulelauncher[14521]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-03-10 10:19:38.780600 daemon-err , modulelauncher[14521]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-03-10 10:19:38.780621 daemon-err , modulelauncher[14521]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-03-10 10:19:38.782385 daemon-err , modulelauncher[14521]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-03-10 10:19:38.782405 daemon-err , modulelauncher[14521]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-03-10 10:19:39.240684 auth-err , sshd[14557]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-03-10 10:19:39.240730 auth-err , sshd[14557]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-03-10 10:19:59.557068 authpriv-err , login[14568]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-03-10 10:19:59.557118 authpriv-err , login[14568]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-03-10 10:20:04.399646 daemon-err , modulelauncher[14611]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-03-10 10:20:04.399676 daemon-err , modulelauncher[14611]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-03-10 10:20:04.401476 daemon-err , modulelauncher[14611]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-03-10 10:20:04.401494 daemon-err , modulelauncher[14611]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-03-10 10:20:04.901880 authpriv-err , sshd[14741]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-03-10 10:20:04.901939 authpriv-err , sshd[14741]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-03-10 10:20:05.353785 authpriv-err , login[14783]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-03-10 10:20:05.353894 authpriv-err , login[14783]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-03-10 10:20:06.856367 daemon-err , modulelauncher[14853]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-03-10 10:20:06.856438 daemon-err , modulelauncher[14853]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-03-10 10:20:06.858392 daemon-err , modulelauncher[14853]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-03-10 10:20:06.858416 daemon-err , modulelauncher[14853]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-03-10 10:20:06.861275 daemon-err , modulelauncher[14853]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-03-10 10:20:06.861307 daemon-err , modulelauncher[14853]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-03-10 10:20:06.862997 daemon-err , modulelauncher[14853]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-03-10 10:20:06.863023 daemon-err , modulelauncher[14853]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-03-10 10:20:07.325842 authpriv-err , sshd[14887]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-03-10 10:20:07.325899 authpriv-err , sshd[14887]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-03-10 10:20:27.714132 authpriv-err , login[14896]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-03-10 10:20:27.714189 authpriv-err , login[14896]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-03-10 10:20:31.840016 daemon-err , modulelauncher[14941]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-03-10 10:20:31.840049 daemon-err , modulelauncher[14941]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-03-10 10:20:31.841701 daemon-err , modulelauncher[14941]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-03-10 10:20:31.841724 daemon-err , modulelauncher[14941]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-03-10 10:20:31.844349 daemon-err , modulelauncher[14941]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-03-10 10:20:31.844380 daemon-err , modulelauncher[14941]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-03-10 10:20:31.846037 daemon-err , modulelauncher[14941]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-03-10 10:20:31.846064 daemon-err , modulelauncher[14941]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-03-10 10:20:32.307315 authpriv-err , sshd[15032]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-03-10 10:20:32.307406 authpriv-err , sshd[15032]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-03-10 10:20:32.776903 authpriv-err , login[15074]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-03-10 10:20:32.776951 authpriv-err , login[15074]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-03-10 10:20:34.404082 daemon-err , modulelauncher[15150]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-03-10 10:20:34.404111 daemon-err , modulelauncher[15150]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-03-10 10:20:34.406417 daemon-err , modulelauncher[15150]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-03-10 10:20:34.406435 daemon-err , modulelauncher[15150]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-03-10 10:20:34.408916 daemon-err , modulelauncher[15150]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-03-10 10:20:34.408940 daemon-err , modulelauncher[15150]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-03-10 10:20:34.411177 daemon-err , modulelauncher[15150]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-03-10 10:20:34.411194 daemon-err , modulelauncher[15150]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-03-10 10:20:34.873561 authpriv-err , sshd[15184]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-03-10 10:20:34.873761 authpriv-err , sshd[15184]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-03-10 10:20:55.275085 authpriv-err , login[15193]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-03-10 10:20:55.275152 authpriv-err , login[15193]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-03-10 10:21:01.238552 user-err , ERROR:  Dissociating VRF from service: cnm
2025-03-10 10:21:01.321278 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 5
2025-03-10 10:21:01.321316 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 5
2025-03-10 10:21:55.573295 daemon-err , cfgd[1455]:  External python command [op.pki scep info CSR] finished with status 1
2025-03-10 10:22:15.679380 daemon-err , cfgd[1455]:  External python command [op.pki scep info CSR] finished with status 1
2025-03-10 10:22:21.348239 user-err , scep_controller:  Failed to get CA certificate for CSR 'CSR' libcurl request failed [28]: Operation timed out after 30001 milliseconds with 0 bytes received did not receive a valid SCEP response: HTTP 0
2025-03-10 10:22:42.145633 daemon-err , modulelauncher[16447]:  osdx.utils.xos cmd error: swanctl -q
2025-03-10 10:22:42.145690 daemon-err , modulelauncher[16447]:  Command 'swanctl -q' returned non-zero exit status 22.
2025-03-10 10:22:42.209765 daemon-err , cfgd[1455]:  External python command [op.pki scep info CSR] finished with status 1
2025-03-10 10:23:17.452721 daemon-err , modulelauncher[17048]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-03-10 10:23:17.452759 daemon-err , modulelauncher[17048]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-03-10 10:23:17.460453 daemon-err , modulelauncher[17048]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-03-10 10:23:17.460485 daemon-err , modulelauncher[17048]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-03-10 10:23:29.769212 daemon-err , modulelauncher[17484]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-03-10 10:23:29.769257 daemon-err , modulelauncher[17484]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-03-10 10:23:29.778686 daemon-err , modulelauncher[17484]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-03-10 10:23:29.778730 daemon-err , modulelauncher[17484]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-03-10 10:23:41.640853 daemon-err , modulelauncher[17917]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-03-10 10:23:41.640894 daemon-err , modulelauncher[17917]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-03-10 10:23:41.648584 daemon-err , modulelauncher[17917]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-03-10 10:23:41.648621 daemon-err , modulelauncher[17917]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-03-10 10:23:53.836944 daemon-err , modulelauncher[18353]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-03-10 10:23:53.836998 daemon-err , modulelauncher[18353]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-03-10 10:23:53.845758 daemon-err , modulelauncher[18353]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-03-10 10:23:53.845801 daemon-err , modulelauncher[18353]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-03-10 10:24:28.609636 user-err , ERROR:  Dissociating VRF from service: cnm
2025-03-10 10:24:28.703926 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 8
2025-03-10 10:24:28.703957 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 8
2025-03-10 10:24:28.791153 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 9
2025-03-10 10:24:28.791211 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 9
2025-03-10 10:24:28.879818 daemon-err , modulelauncher[19084]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-03-10 10:24:28.879859 daemon-err , modulelauncher[19084]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-03-10 10:24:28.888457 daemon-err , modulelauncher[19084]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-03-10 10:24:28.888510 daemon-err , modulelauncher[19084]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-03-10 10:25:05.815902 user-err , ERROR:  Dissociating VRF from service: cnm
2025-03-10 10:25:05.916905 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 10
2025-03-10 10:25:05.916945 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 10
2025-03-10 10:25:06.004814 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 11
2025-03-10 10:25:06.004864 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 11
2025-03-10 10:25:06.075547 daemon-err , modulelauncher[19858]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-03-10 10:25:06.075591 daemon-err , modulelauncher[19858]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-03-10 10:25:06.083173 daemon-err , modulelauncher[19858]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-03-10 10:25:06.083206 daemon-err , modulelauncher[19858]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-03-10 10:25:18.130584 daemon-err , modulelauncher[20250]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-03-10 10:25:18.130636 daemon-err , modulelauncher[20250]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-03-10 10:25:18.140298 daemon-err , modulelauncher[20250]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-03-10 10:25:18.140343 daemon-err , modulelauncher[20250]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-03-10 10:25:28.636840 daemon-err , modulelauncher[20629]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-03-10 10:25:28.636893 daemon-err , modulelauncher[20629]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-03-10 10:25:28.644392 daemon-err , modulelauncher[20629]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-03-10 10:25:28.644434 daemon-err , modulelauncher[20629]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-03-10 10:30:49.223563 authpriv-err , login[25259]:  pam_mail(login:session): pam_putenv: delete non-existent entry; MAIL
2025-03-10 10:34:06.388280 user-err , OSDxCLI:   Session idle timeout reached. Closing session
2025-03-10 10:34:28.255495 user-err , OSDxCLI:   Session idle timeout reached. Closing session
2025-03-10 10:34:49.240572 user-err , OSDxCLI:   Session idle timeout reached. Closing session
2025-03-10 10:35:35.944916 user-err , ERROR:  Dissociating VRF from service: cnm
2025-03-10 10:35:36.010485 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LOC in VRF 13
2025-03-10 10:35:36.010533 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LOC in VRF 13
2025-03-10 10:35:36.102527 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF AP in VRF 12
2025-03-10 10:35:36.102602 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF AP in VRF 12
2025-03-10 10:35:36.190518 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 14
2025-03-10 10:35:36.190582 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 14
2025-03-10 10:35:47.997946 user-err , ERROR:  Dissociating VRF from service: cnm
2025-03-10 10:35:48.079190 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LOC in VRF 17
2025-03-10 10:35:48.079270 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LOC in VRF 17
2025-03-10 10:35:48.151239 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF AP in VRF 16
2025-03-10 10:35:48.151302 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF AP in VRF 16
2025-03-10 10:35:48.255215 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 18
2025-03-10 10:35:48.255277 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 18
2025-03-10 10:36:16.669758 user-err , ERROR:  Dissociating VRF from service: cnm
2025-03-10 10:36:16.739605 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 20
2025-03-10 10:36:16.739689 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 20
2025-03-10 10:37:18.082564 user-err , ERROR:  Dissociating VRF from service: cnm
2025-03-10 10:37:18.148139 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 21
2025-03-10 10:37:18.148192 daemon-err , staticd[1416]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF1 in VRF 21
2025-03-10 10:39:13.218387 daemon-err , cfgd[1455]:  [33837]Command output: File name reserved Value validation failed
2025-03-10 10:39:18.421698 daemon-notice , cfgd[1455]:  [33837]Completed change to active configuration
2025-03-10 10:39:18.423884 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-03-10 10:39:18.440131 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2025-03-10 10:39:18.571710 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2025-03-10 10:39:26.290564 daemon-info , systemd[1]:  Created slice system-dhcpd.slice - Slice /system/dhcpd.
2025-03-10 10:39:26.314544 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2025-03-10 10:39:32.577638 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.150 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.150/0.150/0.150/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-03-10T10:39:39.508091+00:00 10.215.168.64  2025-03-10T10:39:38.852433+00:00 daemon-notice osdx cfgd[1455]:  [33837]Completed change to active configuration
2025-03-10T10:39:39.535719+00:00 10.215.168.64  2025-03-10T10:39:38.880226+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-03-10T10:39:39.566434+00:00 10.215.168.64  2025-03-10T10:39:38.910915+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-03-10T10:39:39.746471+00:00 10.215.168.64  2025-03-10T10:39:39.091000+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-03-10T10:39:39.809863+00:00 10.215.168.64  2025-03-10T10:39:39.154378+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.143 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.143/0.143/0.143/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-03-10T10:39:40.248793+00:00 10.215.168.64  2025-03-10T10:39:39.593287+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-03-10T10:39:40.400197+00:00 10.215.168.64  2025-03-10T10:39:39.744703+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-03-10T10:39:40.413882+00:00 10.215.168.64  2025-03-10T10:39:39.758370+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-03-10T10:39:41.493158+00:00 10.215.168.64  2025-03-10T10:39:40.837540+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-03-10T10:39:41.591324+00:00 10.215.168.64  2025-03-10T10:39:40.933185+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-03-10T10:39:41.732709+00:00 10.215.168.64  2025-03-10T10:39:41.077151+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-03-10T10:39:41.889435+00:00 10.215.168.64  2025-03-10T10:39:41.233854+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-03-10T10:39:46.492044+00:00 10.215.168.64  2025-03-10T10:39:46.306430+00:00 daemon-notice osdx cfgd[1455]:  [33837]Completed change to active configuration
2025-03-10T10:39:46.519413+00:00 10.215.168.64  2025-03-10T10:39:46.333867+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-03-10T10:39:46.535679+00:00 10.215.168.64  2025-03-10T10:39:46.350252+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-03-10T10:39:46.708557+00:00 10.215.168.64  2025-03-10T10:39:46.522953+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-03-10T10:39:46.765727+00:00 10.215.168.64  2025-03-10T10:39:46.580172+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.125 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.125/0.125/0.125/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-03-10T10:39:47.277280+00:00 10.215.168.64  2025-03-10T10:39:47.091700+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-03-10T10:39:47.434989+00:00 10.215.168.64  2025-03-10T10:39:47.249460+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-03-10T10:39:47.459377+00:00 10.215.168.64  2025-03-10T10:39:47.273760+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-03-10T10:39:48.281786+00:00 10.215.168.64  2025-03-10T10:39:48.096196+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-03-10T10:39:48.337504+00:00 10.215.168.64  2025-03-10T10:39:48.151908+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-03-10T10:39:48.454346+00:00 10.215.168.64  2025-03-10T10:39:48.268748+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-03-10T10:39:48.525429+00:00 10.215.168.64  2025-03-10T10:39:48.339818+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-03-10T10:39:52.936420+00:00 10.215.168.64  2025-03-10T10:39:52.883058+00:00 daemon-notice osdx cfgd[1455]:  [33837]Completed change to active configuration
2025-03-10T10:39:52.962553+00:00 10.215.168.64  2025-03-10T10:39:52.909331+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-03-10T10:39:52.980178+00:00 10.215.168.64  2025-03-10T10:39:52.927010+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-03-10T10:39:53.147250+00:00 10.215.168.64  2025-03-10T10:39:53.094072+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-03-10T10:39:53.206206+00:00 10.215.168.64  2025-03-10T10:39:53.152978+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.160 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.160/0.160/0.160/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-03-10T10:40:00.474487+00:00 33.33.33.33  2025-03-10T10:40:00.127113+00:00 daemon-notice osdx cfgd[1455]:  [33837]Completed change to active configuration
2025-03-10T10:40:00.506467+00:00 33.33.33.33  2025-03-10T10:40:00.159222+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-03-10T10:40:00.554424+00:00 33.33.33.33  2025-03-10T10:40:00.207551+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-03-10T10:40:00.708266+00:00 33.33.33.33  2025-03-10T10:40:00.361419+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-03-10T10:40:00.769801+00:00 33.33.33.33  2025-03-10T10:40:00.422918+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.146 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.146/0.146/0.146/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-03-10T10:40:01.192505+00:00 33.33.33.33  2025-03-10T10:40:00.845555+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-03-10T10:40:01.344548+00:00 33.33.33.33  2025-03-10T10:40:00.997580+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-03-10T10:40:01.360389+00:00 33.33.33.33  2025-03-10T10:40:01.013324+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-03-10T10:40:02.280042+00:00 33.33.33.33  2025-03-10T10:40:01.933043+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-03-10T10:40:02.359136+00:00 33.33.33.33  2025-03-10T10:40:02.012111+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-03-10T10:40:02.430819+00:00 33.33.33.33  2025-03-10T10:40:02.083850+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-03-10T10:40:02.543997+00:00 33.33.33.33  2025-03-10T10:40:02.196963+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-03-10T10:40:07.080855+00:00 33.33.33.33  2025-03-10T10:40:06.253352+00:00 daemon-notice osdx cfgd[1455]:  [33837]Completed change to active configuration
2025-03-10T10:40:07.080855+00:00 33.33.33.33  2025-03-10T10:40:06.253559+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2025-03-10T10:40:07.110503+00:00 33.33.33.33  2025-03-10T10:40:06.283158+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-03-10T10:40:07.126576+00:00 33.33.33.33  2025-03-10T10:40:06.299369+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-03-10T10:40:07.311857+00:00 33.33.33.33  2025-03-10T10:40:06.484532+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-03-10T10:40:07.369641+00:00 33.33.33.33  2025-03-10T10:40:06.542287+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.182 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.182/0.182/0.182/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-03-10T10:40:14.108263+00:00 10.215.168.64  2025-03-10T10:40:13.098808+00:00 daemon-notice osdx cfgd[1455]:  [33837]Completed change to active configuration
2025-03-10T10:40:14.151932+00:00 10.215.168.64  2025-03-10T10:40:13.125665+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-03-10T10:40:14.151932+00:00 10.215.168.64  2025-03-10T10:40:13.148517+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-03-10T10:40:14.151932+00:00 10.215.168.64  2025-03-10T10:40:13.295023+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-03-10T10:40:14.151932+00:00 10.215.168.64  2025-03-10T10:40:13.677905+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-03-10T10:40:14.151932+00:00 10.215.168.64  2025-03-10T10:40:13.677987+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-03-10T10:40:16.020060+00:00 10.215.168.64  2025-03-10T10:40:15.597845+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.228 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.228/0.228/0.228/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-03-10T10:40:22.673210+00:00 33.33.33.33  2025-03-10T10:40:21.482451+00:00 daemon-notice osdx cfgd[1455]:  [33837]Completed change to active configuration
2025-03-10T10:40:22.715971+00:00 33.33.33.33  2025-03-10T10:40:21.515800+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-03-10T10:40:22.715971+00:00 33.33.33.33  2025-03-10T10:40:21.537822+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-03-10T10:40:22.715971+00:00 33.33.33.33  2025-03-10T10:40:21.678065+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-03-10T10:40:22.715971+00:00 33.33.33.33  2025-03-10T10:40:21.684989+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-03-10T10:40:22.715971+00:00 33.33.33.33  2025-03-10T10:40:21.685038+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-03-10T10:40:22.844187+00:00 33.33.33.33  2025-03-10T10:40:21.864072+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.