Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2025-04-10 16:25:49.264127 daemon-err , modulelauncher[98733]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-04-10 16:25:49.264170 daemon-err , modulelauncher[98733]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-04-10 16:25:49.266109 daemon-err , modulelauncher[98733]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-04-10 16:25:49.266142 daemon-err , modulelauncher[98733]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-04-10 16:25:49.268568 daemon-err , modulelauncher[98733]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-04-10 16:25:49.268598 daemon-err , modulelauncher[98733]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-04-10 16:25:49.270452 daemon-err , modulelauncher[98733]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-04-10 16:25:49.270483 daemon-err , modulelauncher[98733]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-04-10 16:25:49.272285 daemon-err , modulelauncher[98733]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-04-10 16:25:49.272314 daemon-err , modulelauncher[98733]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-04-10 16:26:13.994578 daemon-err , modulelauncher[98823]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:26:13.994618 daemon-err , modulelauncher[98823]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:26:13.997929 daemon-err , modulelauncher[98823]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:26:13.997975 daemon-err , modulelauncher[98823]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:26:40.376521 daemon-err , modulelauncher[99003]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:26:40.376558 daemon-err , modulelauncher[99003]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:26:40.378239 daemon-err , modulelauncher[99003]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:26:40.378261 daemon-err , modulelauncher[99003]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:26:40.380835 daemon-err , modulelauncher[99003]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:26:40.380866 daemon-err , modulelauncher[99003]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:26:40.383180 daemon-err , modulelauncher[99003]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:26:40.383200 daemon-err , modulelauncher[99003]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:27:08.023441 daemon-err , modulelauncher[99095]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:27:08.023502 daemon-err , modulelauncher[99095]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:27:08.025614 daemon-err , modulelauncher[99095]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:27:08.025665 daemon-err , modulelauncher[99095]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:27:08.027713 daemon-err , modulelauncher[99095]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:27:08.027758 daemon-err , modulelauncher[99095]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:27:08.030266 daemon-err , modulelauncher[99095]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:27:08.030310 daemon-err , modulelauncher[99095]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:27:34.813281 daemon-err , modulelauncher[99241]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:27:34.813356 daemon-err , modulelauncher[99241]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:27:34.815859 daemon-err , modulelauncher[99241]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:27:34.815903 daemon-err , modulelauncher[99241]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:27:34.818012 daemon-err , modulelauncher[99241]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:27:34.818059 daemon-err , modulelauncher[99241]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:27:34.819948 daemon-err , modulelauncher[99241]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:27:34.819987 daemon-err , modulelauncher[99241]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:28:02.748693 daemon-err , modulelauncher[99331]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-04-10 16:28:02.748730 daemon-err , modulelauncher[99331]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-04-10 16:28:02.750356 daemon-err , modulelauncher[99331]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-04-10 16:28:02.750391 daemon-err , modulelauncher[99331]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-04-10 16:28:02.754211 daemon-err , modulelauncher[99331]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-04-10 16:28:02.754238 daemon-err , modulelauncher[99331]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-04-10 16:28:03.268042 auth-err , sshd[99460]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-04-10 16:28:03.268136 auth-err , sshd[99460]: connection to srv[0] 1.2.3.4:49 failed: Network is unreachable 2025-04-10 16:28:03.276652 auth-err , sshd[99460]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-04-10 16:28:03.276712 auth-err , sshd[99460]: connection to srv[0] 1.2.3.4:49 failed: Network is unreachable 2025-04-10 16:28:03.689620 authpriv-err , login[99502]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-04-10 16:28:03.689704 authpriv-err , login[99502]: connection to srv[0] 1.2.3.4:49 failed: Network is unreachable 2025-04-10 16:28:03.690346 authpriv-err , login[99502]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-04-10 16:28:03.690431 authpriv-err , login[99502]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-04-10 16:28:03.696376 authpriv-err , login[99502]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-04-10 16:28:03.696438 authpriv-err , login[99502]: connection to srv[0] 1.2.3.4:49 failed: Network is unreachable 2025-04-10 16:28:05.110402 daemon-err , modulelauncher[99573]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-04-10 16:28:05.110462 daemon-err , modulelauncher[99573]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-04-10 16:28:05.112509 daemon-err , modulelauncher[99573]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-04-10 16:28:05.112549 daemon-err , modulelauncher[99573]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-04-10 16:28:05.114575 daemon-err , modulelauncher[99573]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-04-10 16:28:05.114616 daemon-err , modulelauncher[99573]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-04-10 16:28:05.116855 daemon-err , modulelauncher[99573]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-04-10 16:28:05.116910 daemon-err , modulelauncher[99573]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-04-10 16:28:05.118977 daemon-err , modulelauncher[99573]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-04-10 16:28:05.119035 daemon-err , modulelauncher[99573]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-04-10 16:28:05.120960 daemon-err , modulelauncher[99573]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-04-10 16:28:05.121005 daemon-err , modulelauncher[99573]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-04-10 16:28:05.543744 auth-err , sshd[99609]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-04-10 16:28:05.543804 auth-err , sshd[99609]: connection to srv[0] 1.2.3.4:49 failed: Network is unreachable 2025-04-10 16:28:25.882014 authpriv-err , login[99618]: tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable 2025-04-10 16:28:25.882095 authpriv-err , login[99618]: connection to srv[0] 1.2.3.4:49 failed: Network is unreachable 2025-04-10 16:28:31.075428 daemon-err , modulelauncher[99665]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-04-10 16:28:31.075525 daemon-err , modulelauncher[99665]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-04-10 16:28:31.077632 daemon-err , modulelauncher[99665]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-04-10 16:28:31.077703 daemon-err , modulelauncher[99665]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-04-10 16:28:31.079686 daemon-err , modulelauncher[99665]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-04-10 16:28:31.079739 daemon-err , modulelauncher[99665]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-04-10 16:28:31.081837 daemon-err , modulelauncher[99665]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-04-10 16:28:31.081884 daemon-err , modulelauncher[99665]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-04-10 16:28:31.083761 daemon-err , modulelauncher[99665]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-04-10 16:28:31.083806 daemon-err , modulelauncher[99665]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-04-10 16:28:31.085680 daemon-err , modulelauncher[99665]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-04-10 16:28:31.085741 daemon-err , modulelauncher[99665]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-04-10 16:28:31.593248 auth-err , sshd[99758]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2025-04-10 16:28:31.593322 auth-err , sshd[99758]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2025-04-10 16:28:31.601859 auth-err , sshd[99758]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2025-04-10 16:28:31.601912 auth-err , sshd[99758]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2025-04-10 16:28:32.006117 authpriv-err , login[99800]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2025-04-10 16:28:32.006188 authpriv-err , login[99800]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2025-04-10 16:28:32.006683 authpriv-err , login[99800]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2025-04-10 16:28:32.006752 authpriv-err , login[99800]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2025-04-10 16:28:32.010016 authpriv-err , login[99800]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2025-04-10 16:28:32.010051 authpriv-err , login[99800]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2025-04-10 16:28:33.678697 daemon-err , modulelauncher[99877]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-04-10 16:28:33.678732 daemon-err , modulelauncher[99877]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-04-10 16:28:33.680729 daemon-err , modulelauncher[99877]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-04-10 16:28:33.680755 daemon-err , modulelauncher[99877]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-04-10 16:28:33.682631 daemon-err , modulelauncher[99877]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-04-10 16:28:33.682663 daemon-err , modulelauncher[99877]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-04-10 16:28:33.685565 daemon-err , modulelauncher[99877]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-04-10 16:28:33.685599 daemon-err , modulelauncher[99877]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-04-10 16:28:33.687466 daemon-err , modulelauncher[99877]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-04-10 16:28:33.687498 daemon-err , modulelauncher[99877]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-04-10 16:28:33.690215 daemon-err , modulelauncher[99877]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-04-10 16:28:33.690237 daemon-err , modulelauncher[99877]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-04-10 16:28:34.143464 auth-err , sshd[99913]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2025-04-10 16:28:34.143533 auth-err , sshd[99913]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2025-04-10 16:28:54.535686 authpriv-err , login[99922]: tac_connect_single: connection to 1.2.3.4:49 failed: No route to host 2025-04-10 16:28:54.535754 authpriv-err , login[99922]: connection to srv[0] 1.2.3.4:49 failed: No route to host 2025-04-10 16:28:59.529025 daemon-err , modulelauncher[99964]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:28:59.529076 daemon-err , modulelauncher[99964]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:28:59.534243 daemon-err , modulelauncher[99964]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:28:59.534286 daemon-err , modulelauncher[99964]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:29:00.090406 authpriv-err , sshd[100094]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2025-04-10 16:29:00.090466 authpriv-err , sshd[100094]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2025-04-10 16:29:00.520737 authpriv-err , login[100136]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2025-04-10 16:29:00.520794 authpriv-err , login[100136]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2025-04-10 16:29:02.098046 daemon-err , modulelauncher[100211]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:29:02.098070 daemon-err , modulelauncher[100211]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:29:02.100569 daemon-err , modulelauncher[100211]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:29:02.100593 daemon-err , modulelauncher[100211]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:29:02.102958 daemon-err , modulelauncher[100211]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:29:02.102982 daemon-err , modulelauncher[100211]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:29:02.105428 daemon-err , modulelauncher[100211]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:29:02.105448 daemon-err , modulelauncher[100211]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:29:02.540470 authpriv-err , sshd[100245]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2025-04-10 16:29:02.540512 authpriv-err , sshd[100245]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2025-04-10 16:29:22.831314 authpriv-err , login[100255]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable 2025-04-10 16:29:22.831375 authpriv-err , login[100255]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2025-04-10 16:29:26.688860 daemon-err , modulelauncher[100303]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:29:26.688946 daemon-err , modulelauncher[100303]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:29:26.690915 daemon-err , modulelauncher[100303]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:29:26.690958 daemon-err , modulelauncher[100303]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:29:26.692944 daemon-err , modulelauncher[100303]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:29:26.692986 daemon-err , modulelauncher[100303]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:29:26.694829 daemon-err , modulelauncher[100303]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:29:26.694870 daemon-err , modulelauncher[100303]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:29:27.180382 authpriv-err , sshd[100394]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2025-04-10 16:29:27.180480 authpriv-err , sshd[100394]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2025-04-10 16:29:27.584455 authpriv-err , login[100436]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2025-04-10 16:29:27.584533 authpriv-err , login[100436]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2025-04-10 16:29:29.234105 daemon-err , modulelauncher[100514]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:29:29.234160 daemon-err , modulelauncher[100514]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:29:29.236250 daemon-err , modulelauncher[100514]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:29:29.236286 daemon-err , modulelauncher[100514]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:29:29.238406 daemon-err , modulelauncher[100514]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:29:29.238440 daemon-err , modulelauncher[100514]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:29:29.240922 daemon-err , modulelauncher[100514]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:29:29.240955 daemon-err , modulelauncher[100514]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:29:29.706665 authpriv-err , sshd[100548]: pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2025-04-10 16:29:29.706727 authpriv-err , sshd[100548]: pam_radius_auth(sshd:auth): All RADIUS servers failed to respond 2025-04-10 16:29:50.072691 authpriv-err , login[100557]: pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host 2025-04-10 16:29:50.072746 authpriv-err , login[100557]: pam_radius_auth(login:auth): All RADIUS servers failed to respond 2025-04-10 16:29:55.102346 user-err , ERROR: Dissociating VRF from service: cnm 2025-04-10 16:29:55.182586 daemon-err , staticd[11820]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 126 2025-04-10 16:30:08.180934 daemon-err , modulelauncher[101536]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:30:08.181009 daemon-err , modulelauncher[101536]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:30:08.183118 daemon-err , modulelauncher[101536]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:30:08.183168 daemon-err , modulelauncher[101536]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:30:15.464962 daemon-err , modulelauncher[101956]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:30:15.464991 daemon-err , modulelauncher[101956]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:30:15.467142 daemon-err , modulelauncher[101956]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:30:15.467167 daemon-err , modulelauncher[101956]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:30:17.028108 daemon-err , modulelauncher[102134]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-04-10 16:30:17.028165 daemon-err , modulelauncher[102134]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-04-10 16:30:17.030345 daemon-err , modulelauncher[102134]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-04-10 16:30:17.030388 daemon-err , modulelauncher[102134]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-04-10 16:31:00.457577 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2025-04-10 16:31:02.177340 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2025-04-10 16:31:11.182507 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2025-04-10 16:31:12.676709 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2025-04-10 16:31:21.507977 daemon-err , modulelauncher[104695]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-04-10 16:31:21.508007 daemon-err , modulelauncher[104695]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-04-10 16:31:21.509779 daemon-err , modulelauncher[104695]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-04-10 16:31:21.509801 daemon-err , modulelauncher[104695]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-04-10 16:31:21.512355 daemon-err , modulelauncher[104695]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-04-10 16:31:21.512390 daemon-err , modulelauncher[104695]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-04-10 16:31:22.223555 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2025-04-10 16:31:22.841939 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2025-04-10 16:32:20.762245 daemon-err , cfgd[1673]: External python command [op.pki scep info CSR] finished with status 1 2025-04-10 16:32:40.845308 daemon-err , cfgd[1673]: External python command [op.pki scep info CSR] finished with status 1 2025-04-10 16:32:46.352231 user-err , scep_controller: Failed to get CA certificate for CSR 'CSR' libcurl request failed [28]: Operation timed out after 30001 milliseconds with 0 bytes received did not receive a valid SCEP response: HTTP 0 2025-04-10 16:33:07.470985 daemon-err , cfgd[1673]: External python command [op.pki scep info CSR] finished with status 1 2025-04-10 16:33:07.713970 daemon-err , modulelauncher[106483]: osdx.utils.xos cmd error: swanctl -q 2025-04-10 16:33:07.714018 daemon-err , modulelauncher[106483]: Command 'swanctl -q' returned non-zero exit status 22. 2025-04-10 16:34:18.972334 user-err , ERROR: `system script SCRIPT_1` validation error 2025-04-10 16:34:18.972426 user-err , ERROR: 0 2025-04-10 16:34:18.972960 daemon-err , cfgd[1673]: [104854]Command output: Value validation failed 2025-04-10 16:34:19.306367 user-err , ERROR: `system script SCRIPT_1` validation error 2025-04-10 16:34:19.306473 user-err , ERROR: system potato: Invalid operational command. 2025-04-10 16:34:19.306752 daemon-err , cfgd[1673]: [104854]Command output: Value validation failed 2025-04-10 16:34:24.979811 daemon-err , cfgd[1673]: [ service dhcp-server ] 2025-04-10 16:34:24.979845 daemon-err , cfgd[1673]: \"shared-network\" configuration is required 2025-04-10 16:34:24.979883 daemon-err , cfgd[1673]: Commit validation failed 2025-04-10 16:34:24.981680 daemon-err , cfgd[1673]: [108735]Command output: [ service dhcp-server ] \"shared-network\" configuration is required Commit validation failed 2025-04-10 16:34:24.986663 daemon-err , cfgd[1673]: External python command [cfg.auto_scripts execute_script SCRIPT_1] finished with status 1 2025-04-10 16:34:35.270182 daemon-err , cfgd[1673]: [104854]Command output: File name reserved Value validation failed 2025-04-10 16:34:40.552703 daemon-notice , cfgd[1673]: [104854]Completed change to active configuration 2025-04-10 16:34:40.554312 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2025-04-10 16:34:40.570804 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2025-04-10 16:34:40.700605 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.Show output
2025-04-10 16:34:48.479669 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
Started.*"DHCP Server Service instance main"\.Show output
2025-04-10 16:34:54.646106 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.108 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.108/0.108/0.108/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-04-10T16:35:01.589034+00:00 10.215.168.64 2025-04-10T16:35:00.827839+00:00 daemon-notice osdx cfgd[1673]: [104854]Completed change to active configuration 2025-04-10T16:35:01.600579+00:00 10.215.168.64 2025-04-10T16:35:00.839300+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-04-10T16:35:01.624915+00:00 10.215.168.64 2025-04-10T16:35:00.863856+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-04-10T16:35:01.774071+00:00 10.215.168.64 2025-04-10T16:35:01.013048+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-04-10T16:35:01.843251+00:00 10.215.168.64 2025-04-10T16:35:01.082190+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.129 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.129/0.129/0.129/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-04-10T16:35:02.226556+00:00 10.215.168.64 2025-04-10T16:35:01.465471+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-04-10T16:35:02.498465+00:00 10.215.168.64 2025-04-10T16:35:01.737390+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-04-10T16:35:02.512600+00:00 10.215.168.64 2025-04-10T16:35:01.751323+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-04-10T16:35:03.417483+00:00 10.215.168.64 2025-04-10T16:35:02.656328+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-04-10T16:35:03.476533+00:00 10.215.168.64 2025-04-10T16:35:02.715356+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-04-10T16:35:03.639058+00:00 10.215.168.64 2025-04-10T16:35:02.877868+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-04-10T16:35:03.700741+00:00 10.215.168.64 2025-04-10T16:35:02.939590+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-04-10T16:35:03.814929+00:00 10.215.168.64 2025-04-10T16:35:03.053798+00:00 daemon-info osdx ubnt-cfgd[110245]: inactive 2025-04-10T16:35:07.969850+00:00 10.215.168.64 2025-04-10T16:35:07.165525+00:00 daemon-notice osdx cfgd[1673]: [104854]Completed change to active configuration 2025-04-10T16:35:07.983373+00:00 10.215.168.64 2025-04-10T16:35:07.179205+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-04-10T16:35:08.026839+00:00 10.215.168.64 2025-04-10T16:35:07.222694+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-04-10T16:35:08.235455+00:00 10.215.168.64 2025-04-10T16:35:07.431312+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-04-10T16:35:08.303852+00:00 10.215.168.64 2025-04-10T16:35:07.499671+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-interface eth0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.146 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.146/0.146/0.146/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-04-10T16:35:08.673129+00:00 10.215.168.64 2025-04-10T16:35:07.868924+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-04-10T16:35:08.921282+00:00 10.215.168.64 2025-04-10T16:35:08.117005+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-04-10T16:35:08.941534+00:00 10.215.168.64 2025-04-10T16:35:08.137347+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-04-10T16:35:09.805154+00:00 10.215.168.64 2025-04-10T16:35:09.000928+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-04-10T16:35:09.862859+00:00 10.215.168.64 2025-04-10T16:35:09.058651+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-04-10T16:35:09.971470+00:00 10.215.168.64 2025-04-10T16:35:09.167268+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-04-10T16:35:10.035568+00:00 10.215.168.64 2025-04-10T16:35:09.231323+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-04-10T16:35:10.130569+00:00 10.215.168.64 2025-04-10T16:35:09.326366+00:00 daemon-info osdx ubnt-cfgd[110590]: inactive 2025-04-10T16:35:14.341486+00:00 10.215.168.64 2025-04-10T16:35:13.964015+00:00 daemon-notice osdx cfgd[1673]: [104854]Completed change to active configuration 2025-04-10T16:35:14.354983+00:00 10.215.168.64 2025-04-10T16:35:13.977604+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-04-10T16:35:14.377405+00:00 10.215.168.64 2025-04-10T16:35:14.000110+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-04-10T16:35:14.541172+00:00 10.215.168.64 2025-04-10T16:35:14.163875+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-04-10T16:35:14.642543+00:00 10.215.168.64 2025-04-10T16:35:14.265199+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and UDP
Description
Add a remote host to send syslog messages through a specific local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.130 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.130/0.130/0.130/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-04-10T16:35:20.905665+00:00 33.33.33.33 2025-04-10T16:35:20.208064+00:00 daemon-notice osdx cfgd[1673]: [104854]Completed change to active configuration 2025-04-10T16:35:20.916969+00:00 33.33.33.33 2025-04-10T16:35:20.219492+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-04-10T16:35:20.935031+00:00 33.33.33.33 2025-04-10T16:35:20.237599+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-04-10T16:35:21.088194+00:00 33.33.33.33 2025-04-10T16:35:20.390670+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-04-10T16:35:21.151598+00:00 33.33.33.33 2025-04-10T16:35:20.454037+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and VRF
Description
Add a remote host to send syslog messages through a VRF and a local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.141 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.141/0.141/0.141/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-04-10T16:35:21.567085+00:00 33.33.33.33 2025-04-10T16:35:20.869449+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-04-10T16:35:21.794931+00:00 33.33.33.33 2025-04-10T16:35:21.097376+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-04-10T16:35:21.809056+00:00 33.33.33.33 2025-04-10T16:35:21.111420+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-04-10T16:35:22.638507+00:00 33.33.33.33 2025-04-10T16:35:21.940941+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-04-10T16:35:22.696721+00:00 33.33.33.33 2025-04-10T16:35:21.999202+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-04-10T16:35:22.828924+00:00 33.33.33.33 2025-04-10T16:35:22.131378+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-04-10T16:35:22.894064+00:00 33.33.33.33 2025-04-10T16:35:22.196441+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-04-10T16:35:22.993347+00:00 33.33.33.33 2025-04-10T16:35:22.295779+00:00 daemon-info osdx ubnt-cfgd[111266]: inactive 2025-04-10T16:35:27.634116+00:00 33.33.33.33 2025-04-10T16:35:27.465360+00:00 daemon-notice osdx cfgd[1673]: [104854]Completed change to active configuration 2025-04-10T16:35:27.634116+00:00 33.33.33.33 2025-04-10T16:35:27.465635+00:00 syslog-warning osdx rsyslogd: bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ] 2025-04-10T16:35:27.645525+00:00 33.33.33.33 2025-04-10T16:35:27.477007+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-04-10T16:35:27.661199+00:00 33.33.33.33 2025-04-10T16:35:27.492721+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-04-10T16:35:27.871115+00:00 33.33.33.33 2025-04-10T16:35:27.702624+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-04-10T16:35:27.942460+00:00 33.33.33.33 2025-04-10T16:35:27.773914+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.199 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.199/0.199/0.199/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-04-10T16:35:35.007889+00:00 10.215.168.64 2025-04-10T16:35:33.969506+00:00 daemon-notice osdx cfgd[1673]: [104854]Completed change to active configuration 2025-04-10T16:35:35.050070+00:00 10.215.168.64 2025-04-10T16:35:33.984328+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-04-10T16:35:35.050070+00:00 10.215.168.64 2025-04-10T16:35:34.008002+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-04-10T16:35:35.050070+00:00 10.215.168.64 2025-04-10T16:35:34.178919+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-04-10T16:35:35.050070+00:00 10.215.168.64 2025-04-10T16:35:34.575473+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-04-10T16:35:35.050070+00:00 10.215.168.64 2025-04-10T16:35:34.575628+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-04-10T16:35:36.912455+00:00 10.215.168.64 2025-04-10T16:35:36.487858+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Local Address Single TLS
Description
Add a secured remote host to send syslog messages and show the host name from a fiven local-address
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.097 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.097/0.097/0.097/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-04-10T16:35:43.182038+00:00 33.33.33.33 2025-04-10T16:35:42.235724+00:00 daemon-notice osdx cfgd[1673]: [104854]Completed change to active configuration 2025-04-10T16:35:43.230047+00:00 33.33.33.33 2025-04-10T16:35:42.248166+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-04-10T16:35:43.230047+00:00 33.33.33.33 2025-04-10T16:35:42.264697+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-04-10T16:35:43.230047+00:00 33.33.33.33 2025-04-10T16:35:42.370589+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-04-10T16:35:43.230047+00:00 33.33.33.33 2025-04-10T16:35:42.370680+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-04-10T16:35:43.230067+00:00 33.33.33.33 2025-04-10T16:35:42.400402+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-04-10T16:35:43.370404+00:00 33.33.33.33 2025-04-10T16:35:42.567570+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.