Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2025-01-10 13:57:20.793374 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:20.873472 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-01-10 13:57:20.930403 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:20.930762 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:22.628900 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:24.075436 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:24.444479 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:24.500423 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:24.562804 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:24.611051 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:24.708671 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:28.107518 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:28.190722 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:28.650689 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:29.501593 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:29.833100 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:29.888356 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:30.000724 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:30.067454 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:30.279099 user-err , OSDxCLI:  Unable to open config file /etc/aaa/tacacs/acct-tacgroup1: No such file or directory
2025-01-10 13:57:30.279144 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:33.877656 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 13:57:35.927897 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 13:57:42.211088 daemon-err , cfgd[1450]:  External python command [cfg.security check_passwd] finished with status 1
2025-01-10 13:57:42.213459 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:57:42.214837 daemon-err , cfgd[1450]:  [7262]Command output: [ system security medium ] You must delete all users except yours in the system.                   If your user belongs to a tacacs or radius system, you must keep only local admin user Commit validation failed
2025-01-10 13:57:47.419839 daemon-err , cfgd[1450]:  External python command [cfg.security check_passwd] finished with status 1
2025-01-10 13:57:47.422288 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:57:47.423680 daemon-err , cfgd[1450]:  [7262]Command output: [ system security medium ] Password does not meet the criteria for secure mode. The criteria are: Must include uppercase, lowercase, numbers, one of these special characters '!, @, #, $, %, ^, &, *, (, )' and must be at least 12 characters long. Commit validation failed
2025-01-10 13:57:47.830969 daemon-err , cfgd[1450]:  Cannot be set manually in secure mode
2025-01-10 13:57:47.831014 daemon-err , cfgd[1450]:  [7262]Command output: Cannot be set manually in secure mode
2025-01-10 13:57:54.287000 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:57:54.346214 daemon-err , cfgd[1450]:  Only max level users can enable this mode
2025-01-10 13:57:54.346252 daemon-err , cfgd[1450]:  [7824]Command output: Only max level users can enable this mode
2025-01-10 13:57:54.346489 user-err , OSDxCLI:  libtacplus_map unable to open tacacs client_map_file /var/run/tacacs_client_map: No such file or directory
2025-01-10 13:58:02.720309 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:02.722446 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:02.723772 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] ssh keepalive-interval or keepalive-count-max must be deleted first Commit validation failed
2025-01-10 13:58:06.355570 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:06.358020 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:06.359781 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] ssh cipher must be deleted first Commit validation failed
2025-01-10 13:58:09.998473 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:09.998522 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:09.999875 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] ssh mac must be deleted first Commit validation failed
2025-01-10 13:58:13.658334 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:13.660389 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:13.661692 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] ssh key-exchange must be deleted first Commit validation failed
2025-01-10 13:58:17.350636 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:17.352825 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:17.354167 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] ssh pubkey-accepted-algorithms must be deleted first Commit validation failed
2025-01-10 13:58:20.995758 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:20.997982 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:20.999255 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] ssh host-key-algorithms must be deleted first Commit validation failed
2025-01-10 13:58:24.731071 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:24.731113 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:24.732336 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] ssh host-key must be deleted first Commit validation failed
2025-01-10 13:58:28.383298 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:28.383339 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:28.384506 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] ssh login-grace-time must be deleted first Commit validation failed
2025-01-10 13:58:32.077847 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:32.079838 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:32.081131 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] dns cipher must be deleted first Commit validation failed
2025-01-10 13:58:36.221517 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:36.223582 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:36.224984 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] ipsec auth-profile must be deleted first Commit validation failed
2025-01-10 13:58:40.071449 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:40.076877 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:40.079580 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] ipsec esp-group must be deleted first Commit validation failed
2025-01-10 13:58:43.894840 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:43.896863 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:43.898987 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] ipsec ike-group must be deleted first Commit validation failed
2025-01-10 13:58:47.509147 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:47.509192 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:47.510324 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] ipsec logging must be deleted first Commit validation failed
2025-01-10 13:58:51.109006 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:51.109070 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:51.110528 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] login max-sessions must be deleted first Commit validation failed
2025-01-10 13:58:54.770511 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:54.770556 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:54.771750 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] login password-prompt-delay must be deleted first Commit validation failed
2025-01-10 13:58:57.851681 syslog-err , rsyslogd:  omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.851712 syslog-err , rsyslogd:  omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.851788 syslog-err , rsyslogd:  omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.851818 syslog-err , rsyslogd:  omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.851890 syslog-err , rsyslogd:  omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.851909 syslog-err , rsyslogd:  omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.851975 syslog-err , rsyslogd:  omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.852009 syslog-err , rsyslogd:  omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.852061 syslog-err , rsyslogd:  omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.852095 syslog-err , rsyslogd:  omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.852168 syslog-err , rsyslogd:  omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.852184 syslog-err , rsyslogd:  omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.852255 syslog-err , rsyslogd:  omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.852272 syslog-err , rsyslogd:  omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.852328 syslog-err , rsyslogd:  omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.852363 syslog-err , rsyslogd:  omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.852413 syslog-err , rsyslogd:  omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.852447 syslog-err , rsyslogd:  omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.852497 syslog-err , rsyslogd:  omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:57.852534 syslog-err , rsyslogd:  omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ]
2025-01-10 13:58:58.380992 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:58:58.381054 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:58:58.382613 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] syslog host must be deleted first Commit validation failed
2025-01-10 13:59:01.589129 daemon-err , ntpd[10152]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-01-10 13:59:01.589148 daemon-err , ntpd[10152]:  AUTH: authreadkeys: added 1 keys
2025-01-10 13:59:02.133024 daemon-err , cfgd[1450]:  External python command [cfg.security validate] finished with status 1
2025-01-10 13:59:02.133079 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:59:02.134142 daemon-err , cfgd[1450]:  [7870]Command output: [ system security medium ] ntp authentication-key must be deleted first Commit validation failed
2025-01-10 13:59:20.747253 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 13:59:22.204540 user-err , file_operation:  Secure mode activated. ftp, tftp and http connections not allowed
2025-01-10 13:59:22.322954 user-err , file_operation:  Secure mode activated. ftp, tftp and http connections not allowed
2025-01-10 13:59:23.152143 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 13:59:29.808030 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 13:59:36.040981 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 13:59:42.821820 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 13:59:44.610364 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:59:44.611696 daemon-err , cfgd[1450]:  [11726]Command output: [ service telnet ] Secure mode is activated  Commit validation failed
2025-01-10 13:59:45.070092 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:59:45.071960 daemon-err , cfgd[1450]:  [11726]Command output: [ service snmp ] Secure mode is activated  Commit validation failed
2025-01-10 13:59:45.540587 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:59:45.542428 daemon-err , cfgd[1450]:  [11726]Command output: [ system certificate scep ] Secure mode is activated  Commit validation failed
2025-01-10 13:59:45.898988 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:59:45.900782 daemon-err , cfgd[1450]:  [11726]Command output: [ system strong-password ] Secure mode is activated  Commit validation failed
2025-01-10 13:59:46.264969 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 13:59:46.266526 daemon-err , cfgd[1450]:  [11726]Command output: [ user-level 5 ] Secure mode is activated  Commit validation failed
2025-01-10 13:59:47.262586 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 13:59:53.897597 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 13:59:55.495472 daemon-err , cfgd[1450]:  [12148]Command output: Password does not meet the criteria for secure mode. The criteria are: Must include uppercase, lowercase, numbers, one of these special characters '!, @, #, $, %, ^, &, *, (, )' and must be at least 12 characters long. Value validation failed
2025-01-10 13:59:57.014342 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:00:04.851724 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:00:06.488128 daemon-err , cfgd[1450]:  External python command [cfg.strong_password check_password system aaa server tacacs SERVER encrypted-key U2FsdGVkX1/Zwp1nEMKd8BJMBuZEWyiTAjT8b8yMoU8=] finished with status 2
2025-01-10 14:00:06.488173 daemon-err , cfgd[1450]:  [ system aaa server tacacs SERVER encrypted-key ]
2025-01-10 14:00:06.488196 daemon-err , cfgd[1450]:  \"U2FsdGVkX1/Zwp1nEMKd8BJMBuZEWyiTAjT8b8yMoU8=\" strong-password: not long enough
2025-01-10 14:00:06.488214 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 14:00:06.489595 daemon-err , cfgd[1450]:  [12658]Command output: [ system aaa server tacacs SERVER encrypted-key ] \"U2FsdGVkX1/Zwp1nEMKd8BJMBuZEWyiTAjT8b8yMoU8=\" strong-password: not long enough Commit validation failed
2025-01-10 14:00:06.967290 daemon-err , cfgd[1450]:  External python command [cfg.strong_password check_password system aaa server tacacs SERVER encrypted-key U2FsdGVkX1/0XbuZ1m7BcTGg1FdbLtmZEyDu/69e9JI=] finished with status 3
2025-01-10 14:00:06.967342 daemon-err , cfgd[1450]:  [ system aaa server tacacs SERVER encrypted-key ]
2025-01-10 14:00:06.967358 daemon-err , cfgd[1450]:  \"U2FsdGVkX1/0XbuZ1m7BcTGg1FdbLtmZEyDu/69e9JI=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2025-01-10 14:00:06.967377 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 14:00:06.968854 daemon-err , cfgd[1450]:  [12658]Command output: [ system aaa server tacacs SERVER encrypted-key ] \"U2FsdGVkX1/0XbuZ1m7BcTGg1FdbLtmZEyDu/69e9JI=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed
2025-01-10 14:00:07.484943 daemon-err , cfgd[1450]:  External python command [cfg.strong_password check_password system aaa server tacacs SERVER encrypted-key U2FsdGVkX18XMKtK4rTl3ZefFATi5e0Hgk9xhR8kG3U=] finished with status 4
2025-01-10 14:00:07.484994 daemon-err , cfgd[1450]:  [ system aaa server tacacs SERVER encrypted-key ]
2025-01-10 14:00:07.485014 daemon-err , cfgd[1450]:  \"U2FsdGVkX18XMKtK4rTl3ZefFATi5e0Hgk9xhR8kG3U=\" strong-password: must contain at least one of these special characters: '!, @, #, $, %, ^, &, *, (, )'
2025-01-10 14:00:07.485028 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 14:00:07.486444 daemon-err , cfgd[1450]:  [12658]Command output: [ system aaa server tacacs SERVER encrypted-key ] \"U2FsdGVkX18XMKtK4rTl3ZefFATi5e0Hgk9xhR8kG3U=\" strong-password: must contain at least one of these special characters: '!, @, #, $, %, ^, &, *, (, )' Commit validation failed
2025-01-10 14:00:08.406711 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:00:18.683208 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:00:23.254825 syslog-err , rsyslogd:  not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0]
2025-01-10 14:00:23.254897 syslog-err , rsyslogd:  invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Mon Dec  2 10:27:12 2024 to Thu Nov 30 10:27:12 2034; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA;  [v8.2302.0]
2025-01-10 14:00:23.427164 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:00:23.584581 syslog-err , rsyslogd:  not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0]
2025-01-10 14:00:23.584666 syslog-err , rsyslogd:  invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Mon Dec  2 10:27:12 2024 to Thu Nov 30 10:27:12 2034; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA;  [v8.2302.0]
2025-01-10 14:00:23.623209 syslog-err , rsyslogd:  not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0]
2025-01-10 14:00:23.623272 syslog-err , rsyslogd:  invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Mon Dec  2 10:27:12 2024 to Thu Nov 30 10:27:12 2034; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA;  [v8.2302.0]
2025-01-10 14:00:23.770663 syslog-err , rsyslogd:  not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0]
2025-01-10 14:00:23.770730 syslog-err , rsyslogd:  invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Mon Dec  2 10:27:12 2024 to Thu Nov 30 10:27:12 2034; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA;  [v8.2302.0]
2025-01-10 14:00:29.926742 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:00:31.329434 daemon-err , cfgd[1450]:  [13803]Command output: Unknown cipher "********" Value validation failed
2025-01-10 14:00:31.577365 daemon-err , cfgd[1450]:  [13803]Command output: Unknown MAC "*********" Value validation failed
2025-01-10 14:00:31.821232 daemon-err , cfgd[1450]:  [13803]Command output: Unknown KEX "**************************" Value validation failed
2025-01-10 14:00:32.064013 daemon-err , cfgd[1450]:  [13803]Command output: Unknown key "***********" Value validation failed
2025-01-10 14:00:32.305970 daemon-err , cfgd[1450]:  [13803]Command output: Unknown key "*******" Value validation failed
2025-01-10 14:00:33.237437 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:00:39.790895 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:00:43.900604 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:00:50.905757 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:00:52.479028 daemon-err , cfgd[1450]:  [14772]Command output: Invalid dh-group Value validation failed
2025-01-10 14:00:52.723167 daemon-err , cfgd[1450]:  [14772]Command output: must be a valid encryption algorithm Value validation failed
2025-01-10 14:00:52.966135 daemon-err , cfgd[1450]:  [14772]Command output: Invalid hash Value validation failed
2025-01-10 14:00:53.257043 daemon-err , cfgd[1450]:  [14772]Command output: Invalid mode Value validation failed
2025-01-10 14:00:53.509266 daemon-err , cfgd[1450]:  [14772]Command output: Invalid dh-group Value validation failed
2025-01-10 14:00:53.764633 daemon-err , cfgd[1450]:  [14772]Command output: must be a valid encryption algorithm Value validation failed
2025-01-10 14:00:54.012989 daemon-err , cfgd[1450]:  [14772]Command output: Invalid hash Value validation failed
2025-01-10 14:00:54.903658 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:01:02.011045 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:01:03.728545 daemon-err , cfgd[1450]:  External python command [cfg.vpn configure] finished with status 1
2025-01-10 14:01:03.728579 daemon-err , cfgd[1450]:  Commit failed
2025-01-10 14:01:03.729885 daemon-err , cfgd[1450]:  [15183]Command output: [ vpn ipsec ] PSK, RADIUS, MD5 and MSCHAPV2 methods are not available in secure mode Commit failed
2025-01-10 14:01:04.256235 daemon-err , cfgd[1450]:  External python command [cfg.vpn configure] finished with status 1
2025-01-10 14:01:04.256275 daemon-err , cfgd[1450]:  Commit failed
2025-01-10 14:01:04.257899 daemon-err , cfgd[1450]:  [15183]Command output: [ vpn ipsec ] PSK, RADIUS, MD5 and MSCHAPV2 methods are not available in secure mode Commit failed
2025-01-10 14:01:04.705386 daemon-err , cfgd[1450]:  External python command [cfg.vpn configure] finished with status 1
2025-01-10 14:01:04.705423 daemon-err , cfgd[1450]:  Commit failed
2025-01-10 14:01:04.706852 daemon-err , cfgd[1450]:  [15183]Command output: [ vpn ipsec ] PSK, RADIUS, MD5 and MSCHAPV2 methods are not available in secure mode Commit failed
2025-01-10 14:01:05.134756 daemon-err , cfgd[1450]:  External python command [cfg.vpn proposal_parameters ESP 1] finished with status 1
2025-01-10 14:01:05.134948 daemon-err , cfgd[1450]:  Commit validation failed
2025-01-10 14:01:05.136383 daemon-err , cfgd[1450]:  [15183]Command output: [ vpn ipsec esp-group ESP proposal 1 ] pfs and hash must be configured in esp-group ESP proposal 1 when secure mode is enabled  Commit validation failed
2025-01-10 14:01:06.031292 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:01:12.781268 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:01:16.010082 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:01:22.568574 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:01:25.755295 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:01:32.779054 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:01:36.509438 user-err , file_operation.py:  osdx.utils.xos cmd error: hexdump -C /opt/vyatta/etc/config/log/user/audit_file/audit_file
2025-01-10 14:01:36.509486 user-err , file_operation.py:
2025-01-10 14:01:38.999033 daemon-err , cfgd[1450]:  Exception processing normal request: write: Broken pipe
2025-01-10 14:01:48.332334 daemon-notice , cfgd[1450]:  [16822]Completed change to active configuration
2025-01-10 14:01:48.334488 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-01-10 14:01:48.361336 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2025-01-10 14:01:48.494637 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2025-01-10 14:01:55.194879 daemon-info , systemd[1]:  Created slice system-dhcpd.slice - Slice /system/dhcpd.
2025-01-10 14:01:55.232023 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2025-01-10 14:02:01.371274 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.132 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.132/0.132/0.132/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-01-10T14:02:07.354274+00:00 10.215.168.64  2025-01-10T14:02:06.681263+00:00 daemon-notice osdx cfgd[1450]:  [16822]Completed change to active configuration
2025-01-10T14:02:07.400644+00:00 10.215.168.64  2025-01-10T14:02:06.728042+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-01-10T14:02:07.416373+00:00 10.215.168.64  2025-01-10T14:02:06.744074+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-01-10T14:02:07.566514+00:00 10.215.168.64  2025-01-10T14:02:06.894174+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-01-10T14:02:07.620758+00:00 10.215.168.64  2025-01-10T14:02:06.948431+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.134 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.134/0.134/0.134/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-01-10T14:02:08.025202+00:00 10.215.168.64  2025-01-10T14:02:07.352828+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-01-10T14:02:08.162626+00:00 10.215.168.64  2025-01-10T14:02:07.490267+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-01-10T14:02:08.179677+00:00 10.215.168.64  2025-01-10T14:02:07.507334+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-01-10T14:02:08.910069+00:00 10.215.168.64  2025-01-10T14:02:08.237669+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2025-01-10T14:02:09.241708+00:00 10.215.168.64  2025-01-10T14:02:08.569333+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-01-10T14:02:09.305771+00:00 10.215.168.64  2025-01-10T14:02:08.633292+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-01-10T14:02:09.414353+00:00 10.215.168.64  2025-01-10T14:02:08.741904+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-01-10T14:02:09.476062+00:00 10.215.168.64  2025-01-10T14:02:08.803636+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-01-10T14:02:13.134884+00:00 10.215.168.64  2025-01-10T14:02:12.998926+00:00 daemon-notice osdx cfgd[1450]:  [16822]Completed change to active configuration
2025-01-10T14:02:13.160808+00:00 10.215.168.64  2025-01-10T14:02:13.024608+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-01-10T14:02:13.177268+00:00 10.215.168.64  2025-01-10T14:02:13.041540+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-01-10T14:02:13.331478+00:00 10.215.168.64  2025-01-10T14:02:13.195730+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-01-10T14:02:13.385375+00:00 10.215.168.64  2025-01-10T14:02:13.249650+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.137 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.137/0.137/0.137/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-01-10T14:02:13.785763+00:00 10.215.168.64  2025-01-10T14:02:13.649956+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-01-10T14:02:13.942251+00:00 10.215.168.64  2025-01-10T14:02:13.806452+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-01-10T14:02:13.955112+00:00 10.215.168.64  2025-01-10T14:02:13.819322+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-01-10T14:02:14.664438+00:00 10.215.168.64  2025-01-10T14:02:14.528553+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2025-01-10T14:02:14.984484+00:00 10.215.168.64  2025-01-10T14:02:14.848611+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-01-10T14:02:15.049026+00:00 10.215.168.64  2025-01-10T14:02:14.913132+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-01-10T14:02:15.150088+00:00 10.215.168.64  2025-01-10T14:02:15.014198+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-01-10T14:02:15.212819+00:00 10.215.168.64  2025-01-10T14:02:15.076913+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-01-10T14:02:18.755142+00:00 10.215.168.64  2025-01-10T14:02:17.742832+00:00 daemon-notice osdx cfgd[1450]:  [16822]Completed change to active configuration
2025-01-10T14:02:18.780521+00:00 10.215.168.64  2025-01-10T14:02:17.768248+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-01-10T14:02:18.797342+00:00 10.215.168.64  2025-01-10T14:02:17.785241+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-01-10T14:02:18.953701+00:00 10.215.168.64  2025-01-10T14:02:17.941529+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-01-10T14:02:19.010121+00:00 10.215.168.64  2025-01-10T14:02:17.997945+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.139 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.139/0.139/0.139/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-01-10T14:02:24.396001+00:00 33.33.33.33  2025-01-10T14:02:23.876425+00:00 daemon-notice osdx cfgd[1450]:  [16822]Completed change to active configuration
2025-01-10T14:02:24.424513+00:00 33.33.33.33  2025-01-10T14:02:23.905101+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-01-10T14:02:24.441446+00:00 33.33.33.33  2025-01-10T14:02:23.922075+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-01-10T14:02:24.589475+00:00 33.33.33.33  2025-01-10T14:02:24.070047+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-01-10T14:02:24.646483+00:00 33.33.33.33  2025-01-10T14:02:24.127053+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.145 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.145/0.145/0.145/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-01-10T14:02:25.042416+00:00 33.33.33.33  2025-01-10T14:02:24.522952+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-01-10T14:02:25.194528+00:00 33.33.33.33  2025-01-10T14:02:24.675044+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-01-10T14:02:25.208360+00:00 33.33.33.33  2025-01-10T14:02:24.688860+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-01-10T14:02:25.913745+00:00 33.33.33.33  2025-01-10T14:02:25.394205+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'system coredump show'.
2025-01-10T14:02:26.234841+00:00 33.33.33.33  2025-01-10T14:02:25.715326+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-01-10T14:02:26.291600+00:00 33.33.33.33  2025-01-10T14:02:25.772108+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-01-10T14:02:26.405609+00:00 33.33.33.33  2025-01-10T14:02:25.886079+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-01-10T14:02:26.473257+00:00 33.33.33.33  2025-01-10T14:02:25.953716+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-01-10T14:02:30.543920+00:00 33.33.33.33  2025-01-10T14:02:30.298335+00:00 daemon-notice osdx cfgd[1450]:  [16822]Completed change to active configuration
2025-01-10T14:02:30.543920+00:00 33.33.33.33  2025-01-10T14:02:30.298499+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2025-01-10T14:02:30.576637+00:00 33.33.33.33  2025-01-10T14:02:30.331207+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-01-10T14:02:30.592767+00:00 33.33.33.33  2025-01-10T14:02:30.347425+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-01-10T14:02:30.747062+00:00 33.33.33.33  2025-01-10T14:02:30.501616+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-01-10T14:02:30.817894+00:00 33.33.33.33  2025-01-10T14:02:30.572478+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.203 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.203/0.203/0.203/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-01-10T14:02:36.882899+00:00 10.215.168.64  2025-01-10T14:02:35.934334+00:00 daemon-notice osdx cfgd[1450]:  [16822]Completed change to active configuration
2025-01-10T14:02:36.924446+00:00 10.215.168.64  2025-01-10T14:02:35.973110+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-01-10T14:02:36.924446+00:00 10.215.168.64  2025-01-10T14:02:36.001212+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-01-10T14:02:36.924446+00:00 10.215.168.64  2025-01-10T14:02:36.147807+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-01-10T14:02:36.924446+00:00 10.215.168.64  2025-01-10T14:02:36.233277+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-01-10T14:02:36.924446+00:00 10.215.168.64  2025-01-10T14:02:36.233343+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-01-10T14:02:38.057156+00:00 10.215.168.64  2025-01-10T14:02:37.415654+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.171 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.171/0.171/0.171/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-01-10T14:02:43.771962+00:00 33.33.33.33  2025-01-10T14:02:43.053460+00:00 daemon-notice osdx cfgd[1450]:  [16822]Completed change to active configuration
2025-01-10T14:02:43.812412+00:00 33.33.33.33  2025-01-10T14:02:43.078686+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-01-10T14:02:43.812412+00:00 33.33.33.33  2025-01-10T14:02:43.096610+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-01-10T14:02:43.812412+00:00 33.33.33.33  2025-01-10T14:02:43.216672+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-01-10T14:02:43.812412+00:00 33.33.33.33  2025-01-10T14:02:43.216738+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-01-10T14:02:43.812439+00:00 33.33.33.33  2025-01-10T14:02:43.240040+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-01-10T14:02:43.948120+00:00 33.33.33.33  2025-01-10T14:02:43.400876+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.