Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2025-06-20 12:52:09.168005 daemon-err , modulelauncher[150343]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-06-20 12:52:09.170072 daemon-err , modulelauncher[150343]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-06-20 12:52:09.170094 daemon-err , modulelauncher[150343]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-06-20 12:52:09.171728 daemon-err , modulelauncher[150343]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-06-20 12:52:09.171752 daemon-err , modulelauncher[150343]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-06-20 12:52:35.452034 daemon-err , modulelauncher[150430]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-06-20 12:52:35.452073 daemon-err , modulelauncher[150430]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-06-20 12:52:35.454546 daemon-err , modulelauncher[150430]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-06-20 12:52:35.454587 daemon-err , modulelauncher[150430]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-06-20 12:52:35.458525 daemon-err , modulelauncher[150430]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-06-20 12:52:35.458563 daemon-err , modulelauncher[150430]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-06-20 12:52:35.927192 auth-err , sshd[150559]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-06-20 12:52:35.927250 auth-err , sshd[150559]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-06-20 12:52:35.935122 auth-err , sshd[150559]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-06-20 12:52:35.935166 auth-err , sshd[150559]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-06-20 12:52:36.327819 authpriv-err , login[150601]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-06-20 12:52:36.327963 authpriv-err , login[150601]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-06-20 12:52:36.328591 authpriv-err , login[150601]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-06-20 12:52:36.328695 authpriv-err , login[150601]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-06-20 12:52:36.334918 authpriv-err , login[150601]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-06-20 12:52:36.334979 authpriv-err , login[150601]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-06-20 12:52:37.745653 daemon-err , modulelauncher[150672]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-06-20 12:52:37.745720 daemon-err , modulelauncher[150672]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-06-20 12:52:37.747685 daemon-err , modulelauncher[150672]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-06-20 12:52:37.747731 daemon-err , modulelauncher[150672]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-06-20 12:52:37.749606 daemon-err , modulelauncher[150672]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-06-20 12:52:37.749631 daemon-err , modulelauncher[150672]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-06-20 12:52:37.751493 daemon-err , modulelauncher[150672]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-06-20 12:52:37.751518 daemon-err , modulelauncher[150672]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-06-20 12:52:37.753492 daemon-err , modulelauncher[150672]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-06-20 12:52:37.753521 daemon-err , modulelauncher[150672]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-06-20 12:52:37.755315 daemon-err , modulelauncher[150672]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-06-20 12:52:37.755336 daemon-err , modulelauncher[150672]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-06-20 12:52:38.183749 auth-err , sshd[150708]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-06-20 12:52:38.183800 auth-err , sshd[150708]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-06-20 12:52:58.595445 authpriv-err , login[150717]:  tac_connect_single: connection to 1.2.3.4:49 failed: Network is unreachable
2025-06-20 12:52:58.595501 authpriv-err , login[150717]:  connection to srv[0] 1.2.3.4:49 failed: Network is unreachable
2025-06-20 12:53:03.359993 daemon-err , modulelauncher[150766]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-06-20 12:53:03.360028 daemon-err , modulelauncher[150766]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-06-20 12:53:03.361744 daemon-err , modulelauncher[150766]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-06-20 12:53:03.361771 daemon-err , modulelauncher[150766]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-06-20 12:53:03.363893 daemon-err , modulelauncher[150766]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-06-20 12:53:03.363922 daemon-err , modulelauncher[150766]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-06-20 12:53:03.366652 daemon-err , modulelauncher[150766]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-06-20 12:53:03.366684 daemon-err , modulelauncher[150766]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-06-20 12:53:03.369288 daemon-err , modulelauncher[150766]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-06-20 12:53:03.369323 daemon-err , modulelauncher[150766]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-06-20 12:53:03.371902 daemon-err , modulelauncher[150766]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-06-20 12:53:03.371931 daemon-err , modulelauncher[150766]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-06-20 12:53:03.885467 auth-err , sshd[150859]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-06-20 12:53:03.885528 auth-err , sshd[150859]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-06-20 12:53:03.893461 auth-err , sshd[150859]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-06-20 12:53:03.893512 auth-err , sshd[150859]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-06-20 12:53:04.308905 authpriv-err , login[150901]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-06-20 12:53:04.308987 authpriv-err , login[150901]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-06-20 12:53:04.309593 authpriv-err , login[150901]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-06-20 12:53:04.309673 authpriv-err , login[150901]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-06-20 12:53:04.315883 authpriv-err , login[150901]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-06-20 12:53:04.315925 authpriv-err , login[150901]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-06-20 12:53:05.882590 daemon-err , modulelauncher[150979]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-06-20 12:53:05.882642 daemon-err , modulelauncher[150979]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-06-20 12:53:05.884638 daemon-err , modulelauncher[150979]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-06-20 12:53:05.884680 daemon-err , modulelauncher[150979]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-06-20 12:53:05.886545 daemon-err , modulelauncher[150979]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-06-20 12:53:05.886577 daemon-err , modulelauncher[150979]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-06-20 12:53:05.888737 daemon-err , modulelauncher[150979]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-06-20 12:53:05.888786 daemon-err , modulelauncher[150979]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-06-20 12:53:05.890718 daemon-err , modulelauncher[150979]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-06-20 12:53:05.890751 daemon-err , modulelauncher[150979]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-06-20 12:53:05.892604 daemon-err , modulelauncher[150979]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-06-20 12:53:05.892643 daemon-err , modulelauncher[150979]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-06-20 12:53:06.390000 auth-err , sshd[151015]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-06-20 12:53:06.390068 auth-err , sshd[151015]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-06-20 12:53:26.740548 authpriv-err , login[151024]:  tac_connect_single: connection to 1.2.3.4:49 failed: No route to host
2025-06-20 12:53:26.740623 authpriv-err , login[151024]:  connection to srv[0] 1.2.3.4:49 failed: No route to host
2025-06-20 12:53:30.894749 daemon-err , modulelauncher[151066]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-06-20 12:53:30.894803 daemon-err , modulelauncher[151066]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-06-20 12:53:30.898159 daemon-err , modulelauncher[151066]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-06-20 12:53:30.898199 daemon-err , modulelauncher[151066]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-06-20 12:53:31.416862 authpriv-err , sshd[151197]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-06-20 12:53:31.416943 authpriv-err , sshd[151197]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-06-20 12:53:31.900905 authpriv-err , login[151239]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-06-20 12:53:31.901023 authpriv-err , login[151239]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-06-20 12:53:33.554442 daemon-err , modulelauncher[151311]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-06-20 12:53:33.554493 daemon-err , modulelauncher[151311]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-06-20 12:53:33.556423 daemon-err , modulelauncher[151311]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-06-20 12:53:33.556456 daemon-err , modulelauncher[151311]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-06-20 12:53:33.558463 daemon-err , modulelauncher[151311]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-06-20 12:53:33.558515 daemon-err , modulelauncher[151311]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-06-20 12:53:33.560430 daemon-err , modulelauncher[151311]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-06-20 12:53:33.560472 daemon-err , modulelauncher[151311]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-06-20 12:53:34.043747 authpriv-err , sshd[151345]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-06-20 12:53:34.043831 authpriv-err , sshd[151345]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-06-20 12:53:54.402773 authpriv-err , login[151356]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: Network is unreachable
2025-06-20 12:53:54.402845 authpriv-err , login[151356]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-06-20 12:53:59.615345 daemon-err , modulelauncher[151402]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-06-20 12:53:59.615380 daemon-err , modulelauncher[151402]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-06-20 12:53:59.617767 daemon-err , modulelauncher[151402]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-06-20 12:53:59.617793 daemon-err , modulelauncher[151402]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-06-20 12:53:59.620518 daemon-err , modulelauncher[151402]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-06-20 12:53:59.620542 daemon-err , modulelauncher[151402]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-06-20 12:53:59.623661 daemon-err , modulelauncher[151402]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-06-20 12:53:59.623692 daemon-err , modulelauncher[151402]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-06-20 12:54:00.193672 authpriv-err , sshd[151494]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-06-20 12:54:00.193750 authpriv-err , sshd[151494]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-06-20 12:54:00.625181 authpriv-err , login[151536]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-06-20 12:54:00.625264 authpriv-err , login[151536]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-06-20 12:54:02.315277 daemon-err , modulelauncher[151617]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-06-20 12:54:02.315326 daemon-err , modulelauncher[151617]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-06-20 12:54:02.317881 daemon-err , modulelauncher[151617]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-06-20 12:54:02.317912 daemon-err , modulelauncher[151617]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-06-20 12:54:02.320491 daemon-err , modulelauncher[151617]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-06-20 12:54:02.320534 daemon-err , modulelauncher[151617]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-06-20 12:54:02.322362 daemon-err , modulelauncher[151617]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-06-20 12:54:02.322399 daemon-err , modulelauncher[151617]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-06-20 12:54:02.829606 authpriv-err , sshd[151651]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-06-20 12:54:02.829668 authpriv-err , sshd[151651]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-06-20 12:54:23.225449 authpriv-err , login[151661]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-06-20 12:54:23.225511 authpriv-err , login[151661]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-06-20 12:54:29.043139 user-err , ERROR:  Dissociating VRF from service: cnm
2025-06-20 12:54:29.116198 daemon-err , staticd[1408]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 326
2025-06-20 12:54:41.673831 daemon-err , modulelauncher[152645]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-06-20 12:54:41.673869 daemon-err , modulelauncher[152645]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-06-20 12:54:41.675581 daemon-err , modulelauncher[152645]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-06-20 12:54:41.675606 daemon-err , modulelauncher[152645]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-06-20 12:54:41.677395 daemon-err , modulelauncher[152645]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-06-20 12:54:41.677421 daemon-err , modulelauncher[152645]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-06-20 12:54:51.490243 daemon-err , modulelauncher[153067]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-06-20 12:54:51.490293 daemon-err , modulelauncher[153067]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-06-20 12:54:51.492840 daemon-err , modulelauncher[153067]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-06-20 12:54:51.492877 daemon-err , modulelauncher[153067]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-06-20 12:54:51.495587 daemon-err , modulelauncher[153067]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-06-20 12:54:51.495635 daemon-err , modulelauncher[153067]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-06-20 12:54:53.491226 daemon-err , modulelauncher[153253]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-06-20 12:54:53.491256 daemon-err , modulelauncher[153253]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-06-20 12:54:53.493432 daemon-err , modulelauncher[153253]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-06-20 12:54:53.493458 daemon-err , modulelauncher[153253]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-06-20 12:54:53.495706 daemon-err , modulelauncher[153253]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-06-20 12:54:53.495730 daemon-err , modulelauncher[153253]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-06-20 12:56:34.869380 daemon-err , modulelauncher[155916]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-06-20 12:56:34.869410 daemon-err , modulelauncher[155916]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-06-20 12:56:34.871175 daemon-err , modulelauncher[155916]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-06-20 12:56:34.871195 daemon-err , modulelauncher[155916]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-06-20 12:56:44.624152 daemon-err , modulelauncher[156328]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-06-20 12:56:44.624191 daemon-err , modulelauncher[156328]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-06-20 12:56:44.626566 daemon-err , modulelauncher[156328]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-06-20 12:56:44.626589 daemon-err , modulelauncher[156328]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-06-20 12:56:47.014196 daemon-err , modulelauncher[156506]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-06-20 12:56:47.014270 daemon-err , modulelauncher[156506]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-06-20 12:56:47.016784 daemon-err , modulelauncher[156506]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-06-20 12:56:47.016837 daemon-err , modulelauncher[156506]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-06-20 12:58:56.244805 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-06-20 12:58:58.153105 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-06-20 12:59:06.889939 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-06-20 12:59:08.402414 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-06-20 12:59:17.460570 daemon-err , modulelauncher[162990]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-06-20 12:59:17.460613 daemon-err , modulelauncher[162990]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-06-20 12:59:17.462287 daemon-err , modulelauncher[162990]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-06-20 12:59:17.462324 daemon-err , modulelauncher[162990]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-06-20 12:59:17.466286 daemon-err , modulelauncher[162990]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-06-20 12:59:17.466315 daemon-err , modulelauncher[162990]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-06-20 12:59:18.198634 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-06-20 12:59:18.814109 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-06-20 12:59:55.268044 daemon-err , zebra[1401]:  [HSYZM-HV7HF] Extended Error: Nexthop has invalid gateway
2025-06-20 12:59:55.268089 daemon-err , zebra[1401]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is unreachable, type=RTM_NEWNEXTHOP(104), seq=13868, pid=3362845821
2025-06-20 12:59:55.268106 daemon-err , zebra[1401]:  [HSYZM-HV7HF] Extended Error: Nexthop has invalid gateway
2025-06-20 12:59:55.268120 daemon-err , zebra[1401]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is unreachable, type=RTM_NEWNEXTHOP(104), seq=13869, pid=3362845821
2025-06-20 12:59:55.268161 daemon-err , zebra[1401]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (2776[10.215.200.100 if 2 vrfid 0]) into the kernel
2025-06-20 12:59:55.268177 daemon-err , zebra[1401]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (2777[10.215.200.200 if 2 vrfid 0]) into the kernel
2025-06-20 12:59:56.646200 daemon-err , zebra[1401]:  [HSYZM-HV7HF] Extended Error: Nexthop has invalid gateway
2025-06-20 12:59:56.646235 daemon-err , zebra[1401]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is unreachable, type=RTM_NEWNEXTHOP(104), seq=13870, pid=3362845821
2025-06-20 12:59:56.646253 daemon-err , zebra[1401]:  [HSYZM-HV7HF] Extended Error: Nexthop has invalid gateway
2025-06-20 12:59:56.646266 daemon-err , zebra[1401]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is unreachable, type=RTM_NEWNEXTHOP(104), seq=13871, pid=3362845821
2025-06-20 12:59:56.646279 daemon-err , zebra[1401]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (2776[10.215.200.100 if 2 vrfid 0]) into the kernel
2025-06-20 12:59:56.646299 daemon-err , zebra[1401]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (2777[10.215.200.200 if 2 vrfid 0]) into the kernel
2025-06-20 12:59:58.641019 daemon-err , zebra[1401]:  [HSYZM-HV7HF] Extended Error: Nexthop has invalid gateway
2025-06-20 12:59:58.641058 daemon-err , zebra[1401]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is unreachable, type=RTM_NEWNEXTHOP(104), seq=13875, pid=3362845821
2025-06-20 12:59:58.641075 daemon-err , zebra[1401]:  [HSYZM-HV7HF] Extended Error: Nexthop has invalid gateway
2025-06-20 12:59:58.641095 daemon-err , zebra[1401]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is unreachable, type=RTM_NEWNEXTHOP(104), seq=13876, pid=3362845821
2025-06-20 12:59:58.641162 daemon-err , zebra[1401]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (2776[10.215.200.100 if 2 vrfid 0]) into the kernel
2025-06-20 12:59:58.641178 daemon-err , zebra[1401]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (2777[10.215.200.200 if 2 vrfid 0]) into the kernel
2025-06-20 13:00:01.063948 daemon-err , zebra[1401]:  [HSYZM-HV7HF] Extended Error: Nexthop has invalid gateway
2025-06-20 13:00:01.063987 daemon-err , zebra[1401]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is unreachable, type=RTM_NEWNEXTHOP(104), seq=13879, pid=3362845821
2025-06-20 13:00:01.064006 daemon-err , zebra[1401]:  [HSYZM-HV7HF] Extended Error: Nexthop has invalid gateway
2025-06-20 13:00:01.064019 daemon-err , zebra[1401]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is unreachable, type=RTM_NEWNEXTHOP(104), seq=13880, pid=3362845821
2025-06-20 13:00:01.064034 daemon-err , zebra[1401]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (2776[10.215.200.100 if 2 vrfid 0]) into the kernel
2025-06-20 13:00:01.064047 daemon-err , zebra[1401]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (2777[10.215.200.200 if 2 vrfid 0]) into the kernel
2025-06-20 13:00:07.691697 daemon-err , bgpd[164993]:  [TXY0T-CYY6F][EC 100663299] Can't get remote address and port: Transport endpoint is not connected
2025-06-20 13:00:18.244000 daemon-err , zebra[1401]:  [KQB7H-NPVW9] ../zebra/zebra_ptm.c:1285 failed to find process pid registration
2025-06-20 13:00:23.155979 daemon-err , zebra[1401]:  [HSYZM-HV7HF] Extended Error: Nexthop has invalid gateway
2025-06-20 13:00:23.156017 daemon-err , zebra[1401]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is unreachable, type=RTM_NEWNEXTHOP(104), seq=13911, pid=3362845821
2025-06-20 13:00:23.156034 daemon-err , zebra[1401]:  [HSYZM-HV7HF] Extended Error: Nexthop has invalid gateway
2025-06-20 13:00:23.156054 daemon-err , zebra[1401]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Network is unreachable, type=RTM_NEWNEXTHOP(104), seq=13912, pid=3362845821
2025-06-20 13:00:23.156068 daemon-err , zebra[1401]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (2776[10.215.200.100 if 2 vrfid 0]) into the kernel
2025-06-20 13:00:23.156081 daemon-err , zebra[1401]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (2777[10.215.200.200 if 2 vrfid 0]) into the kernel
2025-06-20 13:00:27.911315 daemon-err , cfgd[1460]:  [163149]Command output: File name reserved Value validation failed
2025-06-20 13:00:33.118489 daemon-notice , cfgd[1460]:  [163149]Completed change to active configuration
2025-06-20 13:00:33.120644 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-06-20 13:00:33.140191 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2025-06-20 13:00:33.263610 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2025-06-20 13:00:41.215514 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2025-06-20 13:00:47.177653 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Regex

Description

Create a new syslog file and collect all the syslog messages matching a specified regex.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file cli_msg filter CLI app OSDxCLI
set system syslog file cli_msg filter CLI level notice
set system syslog file cli_msg filter CLI regex '(^|[^a-zA-Z0-9_])alert([^a-zA-Z0-9_]|$)'

Step 2: Run command command with alert word at DUT0 and expect this output:

Show output
Command validation failed:
CLI Error: Invalid token [command]
CLI Error: Command error

Step 3: Run command command with alerted word at DUT0 and expect this output:

Show output
Command validation failed:
CLI Error: Invalid token [command]
CLI Error: Command error

Step 4: Run command file show running://log/user/cli_msg/cli_msg | cat at DUT0 and expect this output:

Show output
2025-06-20 13:00:53.691949 auth-notice , OSDxCLI:  User 'admin' entered an invalid command: 'command with alert word'.

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.166 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.166/0.166/0.166/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 4: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-20T13:00:59.302073+00:00 10.215.168.64  2025-06-20T13:00:58.488960+00:00 daemon-notice osdx cfgd[1460]:  [163149]Completed change to active configuration
2025-06-20T13:00:59.312676+00:00 10.215.168.64  2025-06-20T13:00:58.499733+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-20T13:00:59.339582+00:00 10.215.168.64  2025-06-20T13:00:58.526684+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-20T13:00:59.526790+00:00 10.215.168.64  2025-06-20T13:00:58.713858+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-06-20T13:00:59.594899+00:00 10.215.168.64  2025-06-20T13:00:58.781919+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.
2025-06-20T13:01:02.705748+00:00 10.215.168.64  2025-06-20T13:01:01.892664+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.156 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.156/0.156/0.156/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-20T13:01:03.080738+00:00 10.215.168.64  2025-06-20T13:01:02.267641+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-06-20T13:01:03.352039+00:00 10.215.168.64  2025-06-20T13:01:02.538966+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-06-20T13:01:03.367345+00:00 10.215.168.64  2025-06-20T13:01:02.554266+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-06-20T13:01:04.291366+00:00 10.215.168.64  2025-06-20T13:01:03.478262+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-06-20T13:01:04.355816+00:00 10.215.168.64  2025-06-20T13:01:03.542720+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-06-20T13:01:04.470405+00:00 10.215.168.64  2025-06-20T13:01:03.657296+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-06-20T13:01:04.544635+00:00 10.215.168.64  2025-06-20T13:01:03.729837+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-06-20T13:01:04.608506+00:00 10.215.168.64  2025-06-20T13:01:03.795420+00:00 daemon-info osdx ubnt-cfgd[167213]:  inactive
2025-06-20T13:01:08.754528+00:00 10.215.168.64  2025-06-20T13:01:07.982861+00:00 daemon-notice osdx cfgd[1460]:  [163149]Completed change to active configuration
2025-06-20T13:01:08.765823+00:00 10.215.168.64  2025-06-20T13:01:07.994572+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-20T13:01:08.781669+00:00 10.215.168.64  2025-06-20T13:01:08.010492+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-20T13:01:09.027887+00:00 10.215.168.64  2025-06-20T13:01:08.256699+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-06-20T13:01:09.117982+00:00 10.215.168.64  2025-06-20T13:01:08.346769+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.158 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.158/0.158/0.158/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-20T13:01:09.521579+00:00 10.215.168.64  2025-06-20T13:01:08.750182+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-06-20T13:01:09.787735+00:00 10.215.168.64  2025-06-20T13:01:09.016493+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-06-20T13:01:09.805344+00:00 10.215.168.64  2025-06-20T13:01:09.034072+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-06-20T13:01:10.797464+00:00 10.215.168.64  2025-06-20T13:01:10.026137+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-06-20T13:01:10.867185+00:00 10.215.168.64  2025-06-20T13:01:10.095925+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-06-20T13:01:10.990195+00:00 10.215.168.64  2025-06-20T13:01:10.218910+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-06-20T13:01:11.051790+00:00 10.215.168.64  2025-06-20T13:01:10.280485+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-06-20T13:01:11.153008+00:00 10.215.168.64  2025-06-20T13:01:10.381670+00:00 daemon-info osdx ubnt-cfgd[167548]:  inactive
2025-06-20T13:01:15.227122+00:00 10.215.168.64  2025-06-20T13:01:14.917320+00:00 daemon-notice osdx cfgd[1460]:  [163149]Completed change to active configuration
2025-06-20T13:01:15.238526+00:00 10.215.168.64  2025-06-20T13:01:14.928887+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-20T13:01:15.256642+00:00 10.215.168.64  2025-06-20T13:01:14.947022+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-20T13:01:15.415621+00:00 10.215.168.64  2025-06-20T13:01:15.105997+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-06-20T13:01:15.500021+00:00 10.215.168.64  2025-06-20T13:01:15.190399+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.157 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.157/0.157/0.157/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-20T13:01:21.627994+00:00 33.33.33.33  2025-06-20T13:01:20.823223+00:00 daemon-notice osdx cfgd[1460]:  [163149]Completed change to active configuration
2025-06-20T13:01:21.641579+00:00 33.33.33.33  2025-06-20T13:01:20.836990+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-20T13:01:21.658679+00:00 33.33.33.33  2025-06-20T13:01:20.854121+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-20T13:01:21.853801+00:00 33.33.33.33  2025-06-20T13:01:21.049249+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-06-20T13:01:21.915782+00:00 33.33.33.33  2025-06-20T13:01:21.111128+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.159 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.159/0.159/0.159/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-20T13:01:22.366629+00:00 33.33.33.33  2025-06-20T13:01:21.561882+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-06-20T13:01:22.648403+00:00 33.33.33.33  2025-06-20T13:01:21.843747+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-06-20T13:01:22.661861+00:00 33.33.33.33  2025-06-20T13:01:21.857227+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-06-20T13:01:23.572379+00:00 33.33.33.33  2025-06-20T13:01:22.767718+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-06-20T13:01:23.631933+00:00 33.33.33.33  2025-06-20T13:01:22.827245+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-06-20T13:01:23.751831+00:00 33.33.33.33  2025-06-20T13:01:22.947133+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-06-20T13:01:23.821101+00:00 33.33.33.33  2025-06-20T13:01:23.016440+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-06-20T13:01:23.911052+00:00 33.33.33.33  2025-06-20T13:01:23.106363+00:00 daemon-info osdx ubnt-cfgd[168208]:  inactive
2025-06-20T13:01:28.186555+00:00 33.33.33.33  2025-06-20T13:01:27.211234+00:00 daemon-notice osdx cfgd[1460]:  [163149]Completed change to active configuration
2025-06-20T13:01:28.186831+00:00 33.33.33.33  2025-06-20T13:01:27.211787+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2025-06-20T13:01:28.197715+00:00 33.33.33.33  2025-06-20T13:01:27.222553+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-20T13:01:28.214999+00:00 33.33.33.33  2025-06-20T13:01:27.239876+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-20T13:01:28.474551+00:00 33.33.33.33  2025-06-20T13:01:27.499376+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-06-20T13:01:28.554063+00:00 33.33.33.33  2025-06-20T13:01:27.578869+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.129 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.129/0.129/0.129/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-20T13:01:34.673824+00:00 10.215.168.64  2025-06-20T13:01:33.779203+00:00 daemon-notice osdx cfgd[1460]:  [163149]Completed change to active configuration
2025-06-20T13:01:34.718850+00:00 10.215.168.64  2025-06-20T13:01:33.790223+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-20T13:01:34.718850+00:00 10.215.168.64  2025-06-20T13:01:33.808143+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-20T13:01:34.718850+00:00 10.215.168.64  2025-06-20T13:01:33.865843+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-06-20T13:01:34.718850+00:00 10.215.168.64  2025-06-20T13:01:33.865907+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-06-20T13:01:34.805535+00:00 10.215.168.64  2025-06-20T13:01:34.022593+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-06-20T13:01:35.001631+00:00 10.215.168.64  2025-06-20T13:01:34.218643+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.217 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.217/0.217/0.217/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-20T13:01:41.349921+00:00 33.33.33.33  2025-06-20T13:01:40.828031+00:00 daemon-notice osdx cfgd[1460]:  [163149]Completed change to active configuration
2025-06-20T13:01:41.394829+00:00 33.33.33.33  2025-06-20T13:01:40.839074+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-20T13:01:41.394829+00:00 33.33.33.33  2025-06-20T13:01:40.866683+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-20T13:01:41.394829+00:00 33.33.33.33  2025-06-20T13:01:41.014234+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-06-20T13:01:41.394829+00:00 33.33.33.33  2025-06-20T13:01:41.194376+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-06-20T13:01:41.394829+00:00 33.33.33.33  2025-06-20T13:01:41.194433+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-06-20T13:01:43.439536+00:00 33.33.33.33  2025-06-20T13:01:43.296717+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.