Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2025-04-10 16:25:49.264127 daemon-err , modulelauncher[98733]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-04-10 16:25:49.264170 daemon-err , modulelauncher[98733]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-04-10 16:25:49.266109 daemon-err , modulelauncher[98733]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-04-10 16:25:49.266142 daemon-err , modulelauncher[98733]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-04-10 16:25:49.268568 daemon-err , modulelauncher[98733]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-04-10 16:25:49.268598 daemon-err , modulelauncher[98733]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-04-10 16:25:49.270452 daemon-err , modulelauncher[98733]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-04-10 16:25:49.270483 daemon-err , modulelauncher[98733]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-04-10 16:25:49.272285 daemon-err , modulelauncher[98733]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-04-10 16:25:49.272314 daemon-err , modulelauncher[98733]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-04-10 16:26:13.994578 daemon-err , modulelauncher[98823]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:26:13.994618 daemon-err , modulelauncher[98823]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:26:13.997929 daemon-err , modulelauncher[98823]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:26:13.997975 daemon-err , modulelauncher[98823]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:26:40.376521 daemon-err , modulelauncher[99003]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:26:40.376558 daemon-err , modulelauncher[99003]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:26:40.378239 daemon-err , modulelauncher[99003]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:26:40.378261 daemon-err , modulelauncher[99003]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:26:40.380835 daemon-err , modulelauncher[99003]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:26:40.380866 daemon-err , modulelauncher[99003]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:26:40.383180 daemon-err , modulelauncher[99003]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:26:40.383200 daemon-err , modulelauncher[99003]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:27:08.023441 daemon-err , modulelauncher[99095]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:27:08.023502 daemon-err , modulelauncher[99095]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:27:08.025614 daemon-err , modulelauncher[99095]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:27:08.025665 daemon-err , modulelauncher[99095]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:27:08.027713 daemon-err , modulelauncher[99095]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:27:08.027758 daemon-err , modulelauncher[99095]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:27:08.030266 daemon-err , modulelauncher[99095]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:27:08.030310 daemon-err , modulelauncher[99095]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:27:34.813281 daemon-err , modulelauncher[99241]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:27:34.813356 daemon-err , modulelauncher[99241]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:27:34.815859 daemon-err , modulelauncher[99241]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:27:34.815903 daemon-err , modulelauncher[99241]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:27:34.818012 daemon-err , modulelauncher[99241]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:27:34.818059 daemon-err , modulelauncher[99241]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:27:34.819948 daemon-err , modulelauncher[99241]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:27:34.819987 daemon-err , modulelauncher[99241]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:28:02.748693 daemon-err , modulelauncher[99331]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-04-10 16:28:02.748730 daemon-err , modulelauncher[99331]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-04-10 16:28:02.750356 daemon-err , modulelauncher[99331]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-04-10 16:28:02.750391 daemon-err , modulelauncher[99331]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-04-10 16:28:02.754211 daemon-err , modulelauncher[99331]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-04-10 16:28:02.754238 daemon-err , modulelauncher[99331]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-04-10 16:28:03.268042 auth-err , sshd[99460]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-04-10 16:28:03.268136 auth-err , sshd[99460]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-04-10 16:28:03.276652 auth-err , sshd[99460]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-04-10 16:28:03.276712 auth-err , sshd[99460]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-04-10 16:28:03.689620 authpriv-err , login[99502]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-04-10 16:28:03.689704 authpriv-err , login[99502]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-04-10 16:28:03.690346 authpriv-err , login[99502]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-04-10 16:28:03.690431 authpriv-err , login[99502]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-04-10 16:28:03.696376 authpriv-err , login[99502]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-04-10 16:28:03.696438 authpriv-err , login[99502]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-04-10 16:28:05.110402 daemon-err , modulelauncher[99573]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-04-10 16:28:05.110462 daemon-err , modulelauncher[99573]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-04-10 16:28:05.112509 daemon-err , modulelauncher[99573]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-04-10 16:28:05.112549 daemon-err , modulelauncher[99573]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-04-10 16:28:05.114575 daemon-err , modulelauncher[99573]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-04-10 16:28:05.114616 daemon-err , modulelauncher[99573]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-04-10 16:28:05.116855 daemon-err , modulelauncher[99573]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-04-10 16:28:05.116910 daemon-err , modulelauncher[99573]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-04-10 16:28:05.118977 daemon-err , modulelauncher[99573]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-04-10 16:28:05.119035 daemon-err , modulelauncher[99573]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-04-10 16:28:05.120960 daemon-err , modulelauncher[99573]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-04-10 16:28:05.121005 daemon-err , modulelauncher[99573]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-04-10 16:28:05.543744 auth-err , sshd[99609]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-04-10 16:28:05.543804 auth-err , sshd[99609]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-04-10 16:28:25.882014 authpriv-err , login[99618]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-04-10 16:28:25.882095 authpriv-err , login[99618]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-04-10 16:28:31.075428 daemon-err , modulelauncher[99665]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-04-10 16:28:31.075525 daemon-err , modulelauncher[99665]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-04-10 16:28:31.077632 daemon-err , modulelauncher[99665]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-04-10 16:28:31.077703 daemon-err , modulelauncher[99665]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-04-10 16:28:31.079686 daemon-err , modulelauncher[99665]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-04-10 16:28:31.079739 daemon-err , modulelauncher[99665]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-04-10 16:28:31.081837 daemon-err , modulelauncher[99665]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-04-10 16:28:31.081884 daemon-err , modulelauncher[99665]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-04-10 16:28:31.083761 daemon-err , modulelauncher[99665]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-04-10 16:28:31.083806 daemon-err , modulelauncher[99665]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-04-10 16:28:31.085680 daemon-err , modulelauncher[99665]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-04-10 16:28:31.085741 daemon-err , modulelauncher[99665]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-04-10 16:28:31.593248 auth-err , sshd[99758]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-04-10 16:28:31.593322 auth-err , sshd[99758]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-04-10 16:28:31.601859 auth-err , sshd[99758]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-04-10 16:28:31.601912 auth-err , sshd[99758]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-04-10 16:28:32.006117 authpriv-err , login[99800]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-04-10 16:28:32.006188 authpriv-err , login[99800]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-04-10 16:28:32.006683 authpriv-err , login[99800]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-04-10 16:28:32.006752 authpriv-err , login[99800]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-04-10 16:28:32.010016 authpriv-err , login[99800]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-04-10 16:28:32.010051 authpriv-err , login[99800]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-04-10 16:28:33.678697 daemon-err , modulelauncher[99877]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-04-10 16:28:33.678732 daemon-err , modulelauncher[99877]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-04-10 16:28:33.680729 daemon-err , modulelauncher[99877]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-04-10 16:28:33.680755 daemon-err , modulelauncher[99877]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-04-10 16:28:33.682631 daemon-err , modulelauncher[99877]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-04-10 16:28:33.682663 daemon-err , modulelauncher[99877]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-04-10 16:28:33.685565 daemon-err , modulelauncher[99877]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-04-10 16:28:33.685599 daemon-err , modulelauncher[99877]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-04-10 16:28:33.687466 daemon-err , modulelauncher[99877]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-04-10 16:28:33.687498 daemon-err , modulelauncher[99877]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-04-10 16:28:33.690215 daemon-err , modulelauncher[99877]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-04-10 16:28:33.690237 daemon-err , modulelauncher[99877]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-04-10 16:28:34.143464 auth-err , sshd[99913]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-04-10 16:28:34.143533 auth-err , sshd[99913]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-04-10 16:28:54.535686 authpriv-err , login[99922]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-04-10 16:28:54.535754 authpriv-err , login[99922]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-04-10 16:28:59.529025 daemon-err , modulelauncher[99964]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:28:59.529076 daemon-err , modulelauncher[99964]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:28:59.534243 daemon-err , modulelauncher[99964]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:28:59.534286 daemon-err , modulelauncher[99964]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:29:00.090406 authpriv-err , sshd[100094]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-04-10 16:29:00.090466 authpriv-err , sshd[100094]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-04-10 16:29:00.520737 authpriv-err , login[100136]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-04-10 16:29:00.520794 authpriv-err , login[100136]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-04-10 16:29:02.098046 daemon-err , modulelauncher[100211]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:29:02.098070 daemon-err , modulelauncher[100211]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:29:02.100569 daemon-err , modulelauncher[100211]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:29:02.100593 daemon-err , modulelauncher[100211]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:29:02.102958 daemon-err , modulelauncher[100211]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:29:02.102982 daemon-err , modulelauncher[100211]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:29:02.105428 daemon-err , modulelauncher[100211]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:29:02.105448 daemon-err , modulelauncher[100211]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:29:02.540470 authpriv-err , sshd[100245]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-04-10 16:29:02.540512 authpriv-err , sshd[100245]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-04-10 16:29:22.831314 authpriv-err , login[100255]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-04-10 16:29:22.831375 authpriv-err , login[100255]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-04-10 16:29:26.688860 daemon-err , modulelauncher[100303]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:29:26.688946 daemon-err , modulelauncher[100303]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:29:26.690915 daemon-err , modulelauncher[100303]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:29:26.690958 daemon-err , modulelauncher[100303]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:29:26.692944 daemon-err , modulelauncher[100303]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:29:26.692986 daemon-err , modulelauncher[100303]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:29:26.694829 daemon-err , modulelauncher[100303]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:29:26.694870 daemon-err , modulelauncher[100303]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:29:27.180382 authpriv-err , sshd[100394]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-04-10 16:29:27.180480 authpriv-err , sshd[100394]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-04-10 16:29:27.584455 authpriv-err , login[100436]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-04-10 16:29:27.584533 authpriv-err , login[100436]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-04-10 16:29:29.234105 daemon-err , modulelauncher[100514]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:29:29.234160 daemon-err , modulelauncher[100514]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:29:29.236250 daemon-err , modulelauncher[100514]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:29:29.236286 daemon-err , modulelauncher[100514]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:29:29.238406 daemon-err , modulelauncher[100514]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:29:29.238440 daemon-err , modulelauncher[100514]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:29:29.240922 daemon-err , modulelauncher[100514]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:29:29.240955 daemon-err , modulelauncher[100514]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:29:29.706665 authpriv-err , sshd[100548]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-04-10 16:29:29.706727 authpriv-err , sshd[100548]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-04-10 16:29:50.072691 authpriv-err , login[100557]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-04-10 16:29:50.072746 authpriv-err , login[100557]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-04-10 16:29:55.102346 user-err , ERROR:  Dissociating VRF from service: cnm
2025-04-10 16:29:55.182586 daemon-err , staticd[11820]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 126
2025-04-10 16:30:08.180934 daemon-err , modulelauncher[101536]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:30:08.181009 daemon-err , modulelauncher[101536]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:30:08.183118 daemon-err , modulelauncher[101536]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:30:08.183168 daemon-err , modulelauncher[101536]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:30:15.464962 daemon-err , modulelauncher[101956]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:30:15.464991 daemon-err , modulelauncher[101956]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:30:15.467142 daemon-err , modulelauncher[101956]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:30:15.467167 daemon-err , modulelauncher[101956]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:30:17.028108 daemon-err , modulelauncher[102134]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-04-10 16:30:17.028165 daemon-err , modulelauncher[102134]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-04-10 16:30:17.030345 daemon-err , modulelauncher[102134]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-04-10 16:30:17.030388 daemon-err , modulelauncher[102134]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-04-10 16:31:00.457577 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-04-10 16:31:02.177340 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-04-10 16:31:11.182507 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-04-10 16:31:12.676709 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-04-10 16:31:21.507977 daemon-err , modulelauncher[104695]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-04-10 16:31:21.508007 daemon-err , modulelauncher[104695]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-04-10 16:31:21.509779 daemon-err , modulelauncher[104695]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-04-10 16:31:21.509801 daemon-err , modulelauncher[104695]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-04-10 16:31:21.512355 daemon-err , modulelauncher[104695]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-04-10 16:31:21.512390 daemon-err , modulelauncher[104695]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-04-10 16:31:22.223555 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-04-10 16:31:22.841939 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-04-10 16:32:20.762245 daemon-err , cfgd[1673]:  External python command [op.pki scep info CSR] finished with status 1
2025-04-10 16:32:40.845308 daemon-err , cfgd[1673]:  External python command [op.pki scep info CSR] finished with status 1
2025-04-10 16:32:46.352231 user-err , scep_controller:  Failed to get CA certificate for CSR 'CSR' libcurl request failed [28]: Operation timed out after 30001 milliseconds with 0 bytes received did not receive a valid SCEP response: HTTP 0
2025-04-10 16:33:07.470985 daemon-err , cfgd[1673]:  External python command [op.pki scep info CSR] finished with status 1
2025-04-10 16:33:07.713970 daemon-err , modulelauncher[106483]:  osdx.utils.xos cmd error: swanctl -q
2025-04-10 16:33:07.714018 daemon-err , modulelauncher[106483]:  Command 'swanctl -q' returned non-zero exit status 22.
2025-04-10 16:34:18.972334 user-err , ERROR:  `system script SCRIPT_1` validation error
2025-04-10 16:34:18.972426 user-err , ERROR:  0
2025-04-10 16:34:18.972960 daemon-err , cfgd[1673]:  [104854]Command output: Value validation failed
2025-04-10 16:34:19.306367 user-err , ERROR:  `system script SCRIPT_1` validation error
2025-04-10 16:34:19.306473 user-err , ERROR:  system potato: Invalid operational command.
2025-04-10 16:34:19.306752 daemon-err , cfgd[1673]:  [104854]Command output: Value validation failed
2025-04-10 16:34:24.979811 daemon-err , cfgd[1673]:  [ service dhcp-server ]
2025-04-10 16:34:24.979845 daemon-err , cfgd[1673]:  \"shared-network\" configuration is required
2025-04-10 16:34:24.979883 daemon-err , cfgd[1673]:  Commit validation failed
2025-04-10 16:34:24.981680 daemon-err , cfgd[1673]:  [108735]Command output: [ service dhcp-server ] \"shared-network\" configuration is required Commit validation failed
2025-04-10 16:34:24.986663 daemon-err , cfgd[1673]:  External python command [cfg.auto_scripts execute_script SCRIPT_1] finished with status 1
2025-04-10 16:34:35.270182 daemon-err , cfgd[1673]:  [104854]Command output: File name reserved Value validation failed
2025-04-10 16:34:40.552703 daemon-notice , cfgd[1673]:  [104854]Completed change to active configuration
2025-04-10 16:34:40.554312 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-04-10 16:34:40.570804 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2025-04-10 16:34:40.700605 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2025-04-10 16:34:48.479669 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2025-04-10 16:34:54.646106 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.108 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.108/0.108/0.108/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-04-10T16:35:01.589034+00:00 10.215.168.64  2025-04-10T16:35:00.827839+00:00 daemon-notice osdx cfgd[1673]:  [104854]Completed change to active configuration
2025-04-10T16:35:01.600579+00:00 10.215.168.64  2025-04-10T16:35:00.839300+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-04-10T16:35:01.624915+00:00 10.215.168.64  2025-04-10T16:35:00.863856+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-04-10T16:35:01.774071+00:00 10.215.168.64  2025-04-10T16:35:01.013048+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-04-10T16:35:01.843251+00:00 10.215.168.64  2025-04-10T16:35:01.082190+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.129 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.129/0.129/0.129/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-04-10T16:35:02.226556+00:00 10.215.168.64  2025-04-10T16:35:01.465471+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-04-10T16:35:02.498465+00:00 10.215.168.64  2025-04-10T16:35:01.737390+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-04-10T16:35:02.512600+00:00 10.215.168.64  2025-04-10T16:35:01.751323+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-04-10T16:35:03.417483+00:00 10.215.168.64  2025-04-10T16:35:02.656328+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-04-10T16:35:03.476533+00:00 10.215.168.64  2025-04-10T16:35:02.715356+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-04-10T16:35:03.639058+00:00 10.215.168.64  2025-04-10T16:35:02.877868+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-04-10T16:35:03.700741+00:00 10.215.168.64  2025-04-10T16:35:02.939590+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-04-10T16:35:03.814929+00:00 10.215.168.64  2025-04-10T16:35:03.053798+00:00 daemon-info osdx ubnt-cfgd[110245]:  inactive
2025-04-10T16:35:07.969850+00:00 10.215.168.64  2025-04-10T16:35:07.165525+00:00 daemon-notice osdx cfgd[1673]:  [104854]Completed change to active configuration
2025-04-10T16:35:07.983373+00:00 10.215.168.64  2025-04-10T16:35:07.179205+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-04-10T16:35:08.026839+00:00 10.215.168.64  2025-04-10T16:35:07.222694+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-04-10T16:35:08.235455+00:00 10.215.168.64  2025-04-10T16:35:07.431312+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-04-10T16:35:08.303852+00:00 10.215.168.64  2025-04-10T16:35:07.499671+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.146 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.146/0.146/0.146/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-04-10T16:35:08.673129+00:00 10.215.168.64  2025-04-10T16:35:07.868924+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-04-10T16:35:08.921282+00:00 10.215.168.64  2025-04-10T16:35:08.117005+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-04-10T16:35:08.941534+00:00 10.215.168.64  2025-04-10T16:35:08.137347+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-04-10T16:35:09.805154+00:00 10.215.168.64  2025-04-10T16:35:09.000928+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-04-10T16:35:09.862859+00:00 10.215.168.64  2025-04-10T16:35:09.058651+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-04-10T16:35:09.971470+00:00 10.215.168.64  2025-04-10T16:35:09.167268+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-04-10T16:35:10.035568+00:00 10.215.168.64  2025-04-10T16:35:09.231323+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-04-10T16:35:10.130569+00:00 10.215.168.64  2025-04-10T16:35:09.326366+00:00 daemon-info osdx ubnt-cfgd[110590]:  inactive
2025-04-10T16:35:14.341486+00:00 10.215.168.64  2025-04-10T16:35:13.964015+00:00 daemon-notice osdx cfgd[1673]:  [104854]Completed change to active configuration
2025-04-10T16:35:14.354983+00:00 10.215.168.64  2025-04-10T16:35:13.977604+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-04-10T16:35:14.377405+00:00 10.215.168.64  2025-04-10T16:35:14.000110+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-04-10T16:35:14.541172+00:00 10.215.168.64  2025-04-10T16:35:14.163875+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-04-10T16:35:14.642543+00:00 10.215.168.64  2025-04-10T16:35:14.265199+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.130 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.130/0.130/0.130/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-04-10T16:35:20.905665+00:00 33.33.33.33  2025-04-10T16:35:20.208064+00:00 daemon-notice osdx cfgd[1673]:  [104854]Completed change to active configuration
2025-04-10T16:35:20.916969+00:00 33.33.33.33  2025-04-10T16:35:20.219492+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-04-10T16:35:20.935031+00:00 33.33.33.33  2025-04-10T16:35:20.237599+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-04-10T16:35:21.088194+00:00 33.33.33.33  2025-04-10T16:35:20.390670+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-04-10T16:35:21.151598+00:00 33.33.33.33  2025-04-10T16:35:20.454037+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.141 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.141/0.141/0.141/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-04-10T16:35:21.567085+00:00 33.33.33.33  2025-04-10T16:35:20.869449+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-04-10T16:35:21.794931+00:00 33.33.33.33  2025-04-10T16:35:21.097376+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-04-10T16:35:21.809056+00:00 33.33.33.33  2025-04-10T16:35:21.111420+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-04-10T16:35:22.638507+00:00 33.33.33.33  2025-04-10T16:35:21.940941+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-04-10T16:35:22.696721+00:00 33.33.33.33  2025-04-10T16:35:21.999202+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-04-10T16:35:22.828924+00:00 33.33.33.33  2025-04-10T16:35:22.131378+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-04-10T16:35:22.894064+00:00 33.33.33.33  2025-04-10T16:35:22.196441+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-04-10T16:35:22.993347+00:00 33.33.33.33  2025-04-10T16:35:22.295779+00:00 daemon-info osdx ubnt-cfgd[111266]:  inactive
2025-04-10T16:35:27.634116+00:00 33.33.33.33  2025-04-10T16:35:27.465360+00:00 daemon-notice osdx cfgd[1673]:  [104854]Completed change to active configuration
2025-04-10T16:35:27.634116+00:00 33.33.33.33  2025-04-10T16:35:27.465635+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2025-04-10T16:35:27.645525+00:00 33.33.33.33  2025-04-10T16:35:27.477007+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-04-10T16:35:27.661199+00:00 33.33.33.33  2025-04-10T16:35:27.492721+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-04-10T16:35:27.871115+00:00 33.33.33.33  2025-04-10T16:35:27.702624+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-04-10T16:35:27.942460+00:00 33.33.33.33  2025-04-10T16:35:27.773914+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.199 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.199/0.199/0.199/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-04-10T16:35:35.007889+00:00 10.215.168.64  2025-04-10T16:35:33.969506+00:00 daemon-notice osdx cfgd[1673]:  [104854]Completed change to active configuration
2025-04-10T16:35:35.050070+00:00 10.215.168.64  2025-04-10T16:35:33.984328+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-04-10T16:35:35.050070+00:00 10.215.168.64  2025-04-10T16:35:34.008002+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-04-10T16:35:35.050070+00:00 10.215.168.64  2025-04-10T16:35:34.178919+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-04-10T16:35:35.050070+00:00 10.215.168.64  2025-04-10T16:35:34.575473+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-04-10T16:35:35.050070+00:00 10.215.168.64  2025-04-10T16:35:34.575628+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-04-10T16:35:36.912455+00:00 10.215.168.64  2025-04-10T16:35:36.487858+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.097 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.097/0.097/0.097/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-04-10T16:35:43.182038+00:00 33.33.33.33  2025-04-10T16:35:42.235724+00:00 daemon-notice osdx cfgd[1673]:  [104854]Completed change to active configuration
2025-04-10T16:35:43.230047+00:00 33.33.33.33  2025-04-10T16:35:42.248166+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-04-10T16:35:43.230047+00:00 33.33.33.33  2025-04-10T16:35:42.264697+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-04-10T16:35:43.230047+00:00 33.33.33.33  2025-04-10T16:35:42.370589+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-04-10T16:35:43.230047+00:00 33.33.33.33  2025-04-10T16:35:42.370680+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-04-10T16:35:43.230067+00:00 33.33.33.33  2025-04-10T16:35:42.400402+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-04-10T16:35:43.370404+00:00 33.33.33.33  2025-04-10T16:35:42.567570+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.