Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2025-01-10 13:57:20.793374 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:20.873472 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2025-01-10 13:57:20.930403 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:20.930762 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:22.628900 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:24.075436 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:24.444479 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:24.500423 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:24.562804 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:24.611051 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:24.708671 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:28.107518 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:28.190722 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:28.650689 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:29.501593 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:29.833100 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:29.888356 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:30.000724 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:30.067454 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:30.279099 user-err , OSDxCLI: Unable to open config file /etc/aaa/tacacs/acct-tacgroup1: No such file or directory 2025-01-10 13:57:30.279144 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:33.877656 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 13:57:35.927897 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 13:57:42.211088 daemon-err , cfgd[1450]: External python command [cfg.security check_passwd] finished with status 1 2025-01-10 13:57:42.213459 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:57:42.214837 daemon-err , cfgd[1450]: [7262]Command output: [ system security medium ] You must delete all users except yours in the system. If your user belongs to a tacacs or radius system, you must keep only local admin user Commit validation failed 2025-01-10 13:57:47.419839 daemon-err , cfgd[1450]: External python command [cfg.security check_passwd] finished with status 1 2025-01-10 13:57:47.422288 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:57:47.423680 daemon-err , cfgd[1450]: [7262]Command output: [ system security medium ] Password does not meet the criteria for secure mode. The criteria are: Must include uppercase, lowercase, numbers, one of these special characters '!, @, #, $, %, ^, &, *, (, )' and must be at least 12 characters long. Commit validation failed 2025-01-10 13:57:47.830969 daemon-err , cfgd[1450]: Cannot be set manually in secure mode 2025-01-10 13:57:47.831014 daemon-err , cfgd[1450]: [7262]Command output: Cannot be set manually in secure mode 2025-01-10 13:57:54.287000 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:57:54.346214 daemon-err , cfgd[1450]: Only max level users can enable this mode 2025-01-10 13:57:54.346252 daemon-err , cfgd[1450]: [7824]Command output: Only max level users can enable this mode 2025-01-10 13:57:54.346489 user-err , OSDxCLI: libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory 2025-01-10 13:58:02.720309 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:02.722446 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:02.723772 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] ssh keepalive-interval or keepalive-count-max must be deleted first Commit validation failed 2025-01-10 13:58:06.355570 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:06.358020 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:06.359781 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] ssh cipher must be deleted first Commit validation failed 2025-01-10 13:58:09.998473 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:09.998522 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:09.999875 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] ssh mac must be deleted first Commit validation failed 2025-01-10 13:58:13.658334 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:13.660389 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:13.661692 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] ssh key-exchange must be deleted first Commit validation failed 2025-01-10 13:58:17.350636 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:17.352825 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:17.354167 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] ssh pubkey-accepted-algorithms must be deleted first Commit validation failed 2025-01-10 13:58:20.995758 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:20.997982 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:20.999255 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] ssh host-key-algorithms must be deleted first Commit validation failed 2025-01-10 13:58:24.731071 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:24.731113 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:24.732336 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] ssh host-key must be deleted first Commit validation failed 2025-01-10 13:58:28.383298 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:28.383339 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:28.384506 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] ssh login-grace-time must be deleted first Commit validation failed 2025-01-10 13:58:32.077847 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:32.079838 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:32.081131 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] dns cipher must be deleted first Commit validation failed 2025-01-10 13:58:36.221517 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:36.223582 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:36.224984 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] ipsec auth-profile must be deleted first Commit validation failed 2025-01-10 13:58:40.071449 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:40.076877 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:40.079580 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] ipsec esp-group must be deleted first Commit validation failed 2025-01-10 13:58:43.894840 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:43.896863 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:43.898987 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] ipsec ike-group must be deleted first Commit validation failed 2025-01-10 13:58:47.509147 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:47.509192 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:47.510324 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] ipsec logging must be deleted first Commit validation failed 2025-01-10 13:58:51.109006 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:51.109070 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:51.110528 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] login max-sessions must be deleted first Commit validation failed 2025-01-10 13:58:54.770511 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:54.770556 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:54.771750 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] login password-prompt-delay must be deleted first Commit validation failed 2025-01-10 13:58:57.851681 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.851712 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.851788 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.851818 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.851890 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.851909 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.851975 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.852009 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.852061 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.852095 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.852168 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.852184 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.852255 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.852272 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.852328 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.852363 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.852413 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.852447 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.852497 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:57.852534 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-01-10 13:58:58.380992 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:58:58.381054 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:58:58.382613 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] syslog host must be deleted first Commit validation failed 2025-01-10 13:59:01.589129 daemon-err , ntpd[10152]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-01-10 13:59:01.589148 daemon-err , ntpd[10152]: AUTH: authreadkeys: added 1 keys 2025-01-10 13:59:02.133024 daemon-err , cfgd[1450]: External python command [cfg.security validate] finished with status 1 2025-01-10 13:59:02.133079 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:59:02.134142 daemon-err , cfgd[1450]: [7870]Command output: [ system security medium ] ntp authentication-key must be deleted first Commit validation failed 2025-01-10 13:59:20.747253 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 13:59:22.204540 user-err , file_operation: Secure mode activated. ftp, tftp and http connections not allowed 2025-01-10 13:59:22.322954 user-err , file_operation: Secure mode activated. ftp, tftp and http connections not allowed 2025-01-10 13:59:23.152143 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 13:59:29.808030 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 13:59:36.040981 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 13:59:42.821820 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 13:59:44.610364 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:59:44.611696 daemon-err , cfgd[1450]: [11726]Command output: [ service telnet ] Secure mode is activated Commit validation failed 2025-01-10 13:59:45.070092 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:59:45.071960 daemon-err , cfgd[1450]: [11726]Command output: [ service snmp ] Secure mode is activated Commit validation failed 2025-01-10 13:59:45.540587 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:59:45.542428 daemon-err , cfgd[1450]: [11726]Command output: [ system certificate scep ] Secure mode is activated Commit validation failed 2025-01-10 13:59:45.898988 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:59:45.900782 daemon-err , cfgd[1450]: [11726]Command output: [ system strong-password ] Secure mode is activated Commit validation failed 2025-01-10 13:59:46.264969 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 13:59:46.266526 daemon-err , cfgd[1450]: [11726]Command output: [ user-level 5 ] Secure mode is activated Commit validation failed 2025-01-10 13:59:47.262586 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 13:59:53.897597 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 13:59:55.495472 daemon-err , cfgd[1450]: [12148]Command output: Password does not meet the criteria for secure mode. The criteria are: Must include uppercase, lowercase, numbers, one of these special characters '!, @, #, $, %, ^, &, *, (, )' and must be at least 12 characters long. Value validation failed 2025-01-10 13:59:57.014342 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:00:04.851724 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:00:06.488128 daemon-err , cfgd[1450]: External python command [cfg.strong_password check_password system aaa server tacacs SERVER encrypted-key U2FsdGVkX1/Zwp1nEMKd8BJMBuZEWyiTAjT8b8yMoU8=] finished with status 2 2025-01-10 14:00:06.488173 daemon-err , cfgd[1450]: [ system aaa server tacacs SERVER encrypted-key ] 2025-01-10 14:00:06.488196 daemon-err , cfgd[1450]: \"U2FsdGVkX1/Zwp1nEMKd8BJMBuZEWyiTAjT8b8yMoU8=\" strong-password: not long enough 2025-01-10 14:00:06.488214 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 14:00:06.489595 daemon-err , cfgd[1450]: [12658]Command output: [ system aaa server tacacs SERVER encrypted-key ] \"U2FsdGVkX1/Zwp1nEMKd8BJMBuZEWyiTAjT8b8yMoU8=\" strong-password: not long enough Commit validation failed 2025-01-10 14:00:06.967290 daemon-err , cfgd[1450]: External python command [cfg.strong_password check_password system aaa server tacacs SERVER encrypted-key U2FsdGVkX1/0XbuZ1m7BcTGg1FdbLtmZEyDu/69e9JI=] finished with status 3 2025-01-10 14:00:06.967342 daemon-err , cfgd[1450]: [ system aaa server tacacs SERVER encrypted-key ] 2025-01-10 14:00:06.967358 daemon-err , cfgd[1450]: \"U2FsdGVkX1/0XbuZ1m7BcTGg1FdbLtmZEyDu/69e9JI=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2025-01-10 14:00:06.967377 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 14:00:06.968854 daemon-err , cfgd[1450]: [12658]Command output: [ system aaa server tacacs SERVER encrypted-key ] \"U2FsdGVkX1/0XbuZ1m7BcTGg1FdbLtmZEyDu/69e9JI=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed 2025-01-10 14:00:07.484943 daemon-err , cfgd[1450]: External python command [cfg.strong_password check_password system aaa server tacacs SERVER encrypted-key U2FsdGVkX18XMKtK4rTl3ZefFATi5e0Hgk9xhR8kG3U=] finished with status 4 2025-01-10 14:00:07.484994 daemon-err , cfgd[1450]: [ system aaa server tacacs SERVER encrypted-key ] 2025-01-10 14:00:07.485014 daemon-err , cfgd[1450]: \"U2FsdGVkX18XMKtK4rTl3ZefFATi5e0Hgk9xhR8kG3U=\" strong-password: must contain at least one of these special characters: '!, @, #, $, %, ^, &, *, (, )' 2025-01-10 14:00:07.485028 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 14:00:07.486444 daemon-err , cfgd[1450]: [12658]Command output: [ system aaa server tacacs SERVER encrypted-key ] \"U2FsdGVkX18XMKtK4rTl3ZefFATi5e0Hgk9xhR8kG3U=\" strong-password: must contain at least one of these special characters: '!, @, #, $, %, ^, &, *, (, )' Commit validation failed 2025-01-10 14:00:08.406711 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:00:18.683208 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:00:23.254825 syslog-err , rsyslogd: not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0] 2025-01-10 14:00:23.254897 syslog-err , rsyslogd: invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Mon Dec 2 10:27:12 2024 to Thu Nov 30 10:27:12 2034; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA; [v8.2302.0] 2025-01-10 14:00:23.427164 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:00:23.584581 syslog-err , rsyslogd: not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0] 2025-01-10 14:00:23.584666 syslog-err , rsyslogd: invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Mon Dec 2 10:27:12 2024 to Thu Nov 30 10:27:12 2034; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA; [v8.2302.0] 2025-01-10 14:00:23.623209 syslog-err , rsyslogd: not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0] 2025-01-10 14:00:23.623272 syslog-err , rsyslogd: invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Mon Dec 2 10:27:12 2024 to Thu Nov 30 10:27:12 2034; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA; [v8.2302.0] 2025-01-10 14:00:23.770663 syslog-err , rsyslogd: not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0] 2025-01-10 14:00:23.770730 syslog-err , rsyslogd: invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Mon Dec 2 10:27:12 2024 to Thu Nov 30 10:27:12 2034; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA; [v8.2302.0] 2025-01-10 14:00:29.926742 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:00:31.329434 daemon-err , cfgd[1450]: [13803]Command output: Unknown cipher "********" Value validation failed 2025-01-10 14:00:31.577365 daemon-err , cfgd[1450]: [13803]Command output: Unknown MAC "*********" Value validation failed 2025-01-10 14:00:31.821232 daemon-err , cfgd[1450]: [13803]Command output: Unknown KEX "**************************" Value validation failed 2025-01-10 14:00:32.064013 daemon-err , cfgd[1450]: [13803]Command output: Unknown key "***********" Value validation failed 2025-01-10 14:00:32.305970 daemon-err , cfgd[1450]: [13803]Command output: Unknown key "*******" Value validation failed 2025-01-10 14:00:33.237437 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:00:39.790895 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:00:43.900604 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:00:50.905757 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:00:52.479028 daemon-err , cfgd[1450]: [14772]Command output: Invalid dh-group Value validation failed 2025-01-10 14:00:52.723167 daemon-err , cfgd[1450]: [14772]Command output: must be a valid encryption algorithm Value validation failed 2025-01-10 14:00:52.966135 daemon-err , cfgd[1450]: [14772]Command output: Invalid hash Value validation failed 2025-01-10 14:00:53.257043 daemon-err , cfgd[1450]: [14772]Command output: Invalid mode Value validation failed 2025-01-10 14:00:53.509266 daemon-err , cfgd[1450]: [14772]Command output: Invalid dh-group Value validation failed 2025-01-10 14:00:53.764633 daemon-err , cfgd[1450]: [14772]Command output: must be a valid encryption algorithm Value validation failed 2025-01-10 14:00:54.012989 daemon-err , cfgd[1450]: [14772]Command output: Invalid hash Value validation failed 2025-01-10 14:00:54.903658 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:01:02.011045 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:01:03.728545 daemon-err , cfgd[1450]: External python command [cfg.vpn configure] finished with status 1 2025-01-10 14:01:03.728579 daemon-err , cfgd[1450]: Commit failed 2025-01-10 14:01:03.729885 daemon-err , cfgd[1450]: [15183]Command output: [ vpn ipsec ] PSK, RADIUS, MD5 and MSCHAPV2 methods are not available in secure mode Commit failed 2025-01-10 14:01:04.256235 daemon-err , cfgd[1450]: External python command [cfg.vpn configure] finished with status 1 2025-01-10 14:01:04.256275 daemon-err , cfgd[1450]: Commit failed 2025-01-10 14:01:04.257899 daemon-err , cfgd[1450]: [15183]Command output: [ vpn ipsec ] PSK, RADIUS, MD5 and MSCHAPV2 methods are not available in secure mode Commit failed 2025-01-10 14:01:04.705386 daemon-err , cfgd[1450]: External python command [cfg.vpn configure] finished with status 1 2025-01-10 14:01:04.705423 daemon-err , cfgd[1450]: Commit failed 2025-01-10 14:01:04.706852 daemon-err , cfgd[1450]: [15183]Command output: [ vpn ipsec ] PSK, RADIUS, MD5 and MSCHAPV2 methods are not available in secure mode Commit failed 2025-01-10 14:01:05.134756 daemon-err , cfgd[1450]: External python command [cfg.vpn proposal_parameters ESP 1] finished with status 1 2025-01-10 14:01:05.134948 daemon-err , cfgd[1450]: Commit validation failed 2025-01-10 14:01:05.136383 daemon-err , cfgd[1450]: [15183]Command output: [ vpn ipsec esp-group ESP proposal 1 ] pfs and hash must be configured in esp-group ESP proposal 1 when secure mode is enabled Commit validation failed 2025-01-10 14:01:06.031292 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:01:12.781268 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:01:16.010082 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:01:22.568574 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:01:25.755295 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:01:32.779054 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:01:36.509438 user-err , file_operation.py: osdx.utils.xos cmd error: hexdump -C /opt/vyatta/etc/config/log/user/audit_file/audit_file 2025-01-10 14:01:36.509486 user-err , file_operation.py: 2025-01-10 14:01:38.999033 daemon-err , cfgd[1450]: Exception processing normal request: write: Broken pipe 2025-01-10 14:01:48.332334 daemon-notice , cfgd[1450]: [16822]Completed change to active configuration 2025-01-10 14:01:48.334488 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2025-01-10 14:01:48.361336 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2025-01-10 14:01:48.494637 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.Show output
2025-01-10 14:01:55.194879 daemon-info , systemd[1]: Created slice system-dhcpd.slice - Slice /system/dhcpd. 2025-01-10 14:01:55.232023 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
Started.*"DHCP Server Service instance main"\.Show output
2025-01-10 14:02:01.371274 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.132 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.132/0.132/0.132/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-01-10T14:02:07.354274+00:00 10.215.168.64 2025-01-10T14:02:06.681263+00:00 daemon-notice osdx cfgd[1450]: [16822]Completed change to active configuration 2025-01-10T14:02:07.400644+00:00 10.215.168.64 2025-01-10T14:02:06.728042+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-01-10T14:02:07.416373+00:00 10.215.168.64 2025-01-10T14:02:06.744074+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-01-10T14:02:07.566514+00:00 10.215.168.64 2025-01-10T14:02:06.894174+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-01-10T14:02:07.620758+00:00 10.215.168.64 2025-01-10T14:02:06.948431+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.134 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.134/0.134/0.134/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-01-10T14:02:08.025202+00:00 10.215.168.64 2025-01-10T14:02:07.352828+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-01-10T14:02:08.162626+00:00 10.215.168.64 2025-01-10T14:02:07.490267+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-01-10T14:02:08.179677+00:00 10.215.168.64 2025-01-10T14:02:07.507334+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-01-10T14:02:08.910069+00:00 10.215.168.64 2025-01-10T14:02:08.237669+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2025-01-10T14:02:09.241708+00:00 10.215.168.64 2025-01-10T14:02:08.569333+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-01-10T14:02:09.305771+00:00 10.215.168.64 2025-01-10T14:02:08.633292+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-01-10T14:02:09.414353+00:00 10.215.168.64 2025-01-10T14:02:08.741904+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-01-10T14:02:09.476062+00:00 10.215.168.64 2025-01-10T14:02:08.803636+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-01-10T14:02:13.134884+00:00 10.215.168.64 2025-01-10T14:02:12.998926+00:00 daemon-notice osdx cfgd[1450]: [16822]Completed change to active configuration 2025-01-10T14:02:13.160808+00:00 10.215.168.64 2025-01-10T14:02:13.024608+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-01-10T14:02:13.177268+00:00 10.215.168.64 2025-01-10T14:02:13.041540+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-01-10T14:02:13.331478+00:00 10.215.168.64 2025-01-10T14:02:13.195730+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-01-10T14:02:13.385375+00:00 10.215.168.64 2025-01-10T14:02:13.249650+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-interface eth0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.137 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.137/0.137/0.137/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-01-10T14:02:13.785763+00:00 10.215.168.64 2025-01-10T14:02:13.649956+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-01-10T14:02:13.942251+00:00 10.215.168.64 2025-01-10T14:02:13.806452+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-01-10T14:02:13.955112+00:00 10.215.168.64 2025-01-10T14:02:13.819322+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-01-10T14:02:14.664438+00:00 10.215.168.64 2025-01-10T14:02:14.528553+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2025-01-10T14:02:14.984484+00:00 10.215.168.64 2025-01-10T14:02:14.848611+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-01-10T14:02:15.049026+00:00 10.215.168.64 2025-01-10T14:02:14.913132+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-01-10T14:02:15.150088+00:00 10.215.168.64 2025-01-10T14:02:15.014198+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-01-10T14:02:15.212819+00:00 10.215.168.64 2025-01-10T14:02:15.076913+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-01-10T14:02:18.755142+00:00 10.215.168.64 2025-01-10T14:02:17.742832+00:00 daemon-notice osdx cfgd[1450]: [16822]Completed change to active configuration 2025-01-10T14:02:18.780521+00:00 10.215.168.64 2025-01-10T14:02:17.768248+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-01-10T14:02:18.797342+00:00 10.215.168.64 2025-01-10T14:02:17.785241+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-01-10T14:02:18.953701+00:00 10.215.168.64 2025-01-10T14:02:17.941529+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-01-10T14:02:19.010121+00:00 10.215.168.64 2025-01-10T14:02:17.997945+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and UDP
Description
Add a remote host to send syslog messages through a specific local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.139 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.139/0.139/0.139/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-01-10T14:02:24.396001+00:00 33.33.33.33 2025-01-10T14:02:23.876425+00:00 daemon-notice osdx cfgd[1450]: [16822]Completed change to active configuration 2025-01-10T14:02:24.424513+00:00 33.33.33.33 2025-01-10T14:02:23.905101+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-01-10T14:02:24.441446+00:00 33.33.33.33 2025-01-10T14:02:23.922075+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-01-10T14:02:24.589475+00:00 33.33.33.33 2025-01-10T14:02:24.070047+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-01-10T14:02:24.646483+00:00 33.33.33.33 2025-01-10T14:02:24.127053+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and VRF
Description
Add a remote host to send syslog messages through a VRF and a local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.145 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.145/0.145/0.145/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-01-10T14:02:25.042416+00:00 33.33.33.33 2025-01-10T14:02:24.522952+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-01-10T14:02:25.194528+00:00 33.33.33.33 2025-01-10T14:02:24.675044+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-01-10T14:02:25.208360+00:00 33.33.33.33 2025-01-10T14:02:24.688860+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-01-10T14:02:25.913745+00:00 33.33.33.33 2025-01-10T14:02:25.394205+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'system coredump show'. 2025-01-10T14:02:26.234841+00:00 33.33.33.33 2025-01-10T14:02:25.715326+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-01-10T14:02:26.291600+00:00 33.33.33.33 2025-01-10T14:02:25.772108+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-01-10T14:02:26.405609+00:00 33.33.33.33 2025-01-10T14:02:25.886079+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-01-10T14:02:26.473257+00:00 33.33.33.33 2025-01-10T14:02:25.953716+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-01-10T14:02:30.543920+00:00 33.33.33.33 2025-01-10T14:02:30.298335+00:00 daemon-notice osdx cfgd[1450]: [16822]Completed change to active configuration 2025-01-10T14:02:30.543920+00:00 33.33.33.33 2025-01-10T14:02:30.298499+00:00 syslog-warning osdx rsyslogd: bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ] 2025-01-10T14:02:30.576637+00:00 33.33.33.33 2025-01-10T14:02:30.331207+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-01-10T14:02:30.592767+00:00 33.33.33.33 2025-01-10T14:02:30.347425+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-01-10T14:02:30.747062+00:00 33.33.33.33 2025-01-10T14:02:30.501616+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-01-10T14:02:30.817894+00:00 33.33.33.33 2025-01-10T14:02:30.572478+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.203 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.203/0.203/0.203/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-01-10T14:02:36.882899+00:00 10.215.168.64 2025-01-10T14:02:35.934334+00:00 daemon-notice osdx cfgd[1450]: [16822]Completed change to active configuration 2025-01-10T14:02:36.924446+00:00 10.215.168.64 2025-01-10T14:02:35.973110+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-01-10T14:02:36.924446+00:00 10.215.168.64 2025-01-10T14:02:36.001212+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-01-10T14:02:36.924446+00:00 10.215.168.64 2025-01-10T14:02:36.147807+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-01-10T14:02:36.924446+00:00 10.215.168.64 2025-01-10T14:02:36.233277+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-01-10T14:02:36.924446+00:00 10.215.168.64 2025-01-10T14:02:36.233343+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-01-10T14:02:38.057156+00:00 10.215.168.64 2025-01-10T14:02:37.415654+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Local Address Single TLS
Description
Add a secured remote host to send syslog messages and show the host name from a fiven local-address
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.171 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.171/0.171/0.171/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-01-10T14:02:43.771962+00:00 33.33.33.33 2025-01-10T14:02:43.053460+00:00 daemon-notice osdx cfgd[1450]: [16822]Completed change to active configuration 2025-01-10T14:02:43.812412+00:00 33.33.33.33 2025-01-10T14:02:43.078686+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-01-10T14:02:43.812412+00:00 33.33.33.33 2025-01-10T14:02:43.096610+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-01-10T14:02:43.812412+00:00 33.33.33.33 2025-01-10T14:02:43.216672+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-01-10T14:02:43.812412+00:00 33.33.33.33 2025-01-10T14:02:43.216738+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-01-10T14:02:43.812439+00:00 33.33.33.33 2025-01-10T14:02:43.240040+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-01-10T14:02:43.948120+00:00 33.33.33.33 2025-01-10T14:02:43.400876+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.