Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2025-06-23 10:22:56.211033 daemon-err , cfgd[1453]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-23 10:22:56.211058 daemon-err , cfgd[1453]: \"U2FsdGVkX1+DRk1vNKrfZh824Lq2+aBGXFeLyx1Qo3w=\" strong-password: score is too weak 2025-06-23 10:22:56.211077 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:22:56.212787 daemon-err , cfgd[1453]: [392564]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+DRk1vNKrfZh824Lq2+aBGXFeLyx1Qo3w=\" strong-password: score is too weak Commit validation failed 2025-06-23 10:22:56.856015 daemon-err , ntpd[394483]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-23 10:22:56.856233 daemon-err , ntpd[394483]: AUTH: authreadkeys: added 1 keys 2025-06-23 10:23:02.213921 daemon-err , cfgd[1453]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19FW3vMqJnS5mGWDfLp7XhZNnqW5TCqwGo=] finished with status 2 2025-06-23 10:23:02.214059 daemon-err , cfgd[1453]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-23 10:23:02.214096 daemon-err , cfgd[1453]: \"U2FsdGVkX19FW3vMqJnS5mGWDfLp7XhZNnqW5TCqwGo=\" strong-password: not long enough 2025-06-23 10:23:02.214142 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:23:02.215673 daemon-err , cfgd[1453]: [392564]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX19FW3vMqJnS5mGWDfLp7XhZNnqW5TCqwGo=\" strong-password: not long enough Commit validation failed 2025-06-23 10:23:02.929634 daemon-err , ntpd[394646]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-23 10:23:02.929654 daemon-err , ntpd[394646]: AUTH: authreadkeys: added 1 keys 2025-06-23 10:23:07.234048 daemon-err , cfgd[1453]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+q3OMfV+YM0awtvpw02nyekhBCyq/t2rs=] finished with status 3 2025-06-23 10:23:07.234093 daemon-err , cfgd[1453]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-23 10:23:07.234115 daemon-err , cfgd[1453]: \"U2FsdGVkX1+q3OMfV+YM0awtvpw02nyekhBCyq/t2rs=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2025-06-23 10:23:07.234130 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:23:07.235443 daemon-err , cfgd[1453]: [392564]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+q3OMfV+YM0awtvpw02nyekhBCyq/t2rs=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed 2025-06-23 10:23:07.777914 daemon-err , cfgd[1453]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1//KYb3MeySR+UydDEa8O6HigibpjgtzKE=] finished with status 3 2025-06-23 10:23:07.777965 daemon-err , cfgd[1453]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-23 10:23:07.777981 daemon-err , cfgd[1453]: \"U2FsdGVkX1//KYb3MeySR+UydDEa8O6HigibpjgtzKE=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2025-06-23 10:23:07.777997 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:23:07.779631 daemon-err , cfgd[1453]: [392564]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1//KYb3MeySR+UydDEa8O6HigibpjgtzKE=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed 2025-06-23 10:23:08.319046 daemon-err , cfgd[1453]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/PS/6KfquP2nj/iRQkYdIIS1q7kWvZm7I=] finished with status 3 2025-06-23 10:23:08.319106 daemon-err , cfgd[1453]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-23 10:23:08.319130 daemon-err , cfgd[1453]: \"U2FsdGVkX1/PS/6KfquP2nj/iRQkYdIIS1q7kWvZm7I=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2025-06-23 10:23:08.319151 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:23:08.320370 daemon-err , cfgd[1453]: [392564]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/PS/6KfquP2nj/iRQkYdIIS1q7kWvZm7I=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed 2025-06-23 10:23:08.953496 daemon-err , cfgd[1453]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/Tm6vbVEQ1QtKQvMDUzGh3+dcH7owBiN8=] finished with status 1 2025-06-23 10:23:08.953525 daemon-err , cfgd[1453]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-23 10:23:08.953549 daemon-err , cfgd[1453]: \"U2FsdGVkX1/Tm6vbVEQ1QtKQvMDUzGh3+dcH7owBiN8=\" strong-password: score is too weak 2025-06-23 10:23:08.953569 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:23:08.954994 daemon-err , cfgd[1453]: [392564]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/Tm6vbVEQ1QtKQvMDUzGh3+dcH7owBiN8=\" strong-password: score is too weak Commit validation failed 2025-06-23 10:23:09.548184 daemon-err , ntpd[394850]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-23 10:23:09.548198 daemon-err , ntpd[394850]: AUTH: authreadkeys: added 1 keys 2025-06-23 10:23:09.895657 daemon-err , cfgd[1453]: [392564]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-06-23 10:23:10.247479 daemon-err , cfgd[1453]: [392564]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-06-23 10:23:10.677471 daemon-err , cfgd[1453]: [392564]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-06-23 10:23:11.065061 daemon-err , cfgd[1453]: [392564]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-06-23 10:23:17.507885 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:23:19.949523 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:23:26.722176 daemon-err , cfgd[1453]: External python command [cfg.security check_passwd] finished with status 1 2025-06-23 10:23:26.724146 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:23:26.725755 daemon-err , cfgd[1453]: [395280]Command output: [ system security medium ] You must delete all users except yours in the system. If your user belongs to a tacacs or radius system, you must keep only local admin user Commit validation failed 2025-06-23 10:23:31.085550 daemon-err , cfgd[1453]: External python command [cfg.security check_passwd] finished with status 1 2025-06-23 10:23:31.085599 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:23:31.086992 daemon-err , cfgd[1453]: [395280]Command output: [ system login user admin ] Password does not meet the criteria for secure mode. The criteria are: Must include uppercase, lowercase, numbers, one of these special characters '!, @, #, $, %, ^, &, *, (, )' and must be at least 12 characters long. Commit validation failed 2025-06-23 10:23:31.591142 daemon-err , cfgd[1453]: Cannot be set manually in secure mode 2025-06-23 10:23:31.591186 daemon-err , cfgd[1453]: [395280]Command output: Cannot be set manually in secure mode 2025-06-23 10:23:38.976135 daemon-err , cfgd[1453]: Only max level users can enable this mode 2025-06-23 10:23:38.976188 daemon-err , cfgd[1453]: [395789]Command output: Only max level users can enable this mode 2025-06-23 10:23:46.138117 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:23:46.138175 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:23:46.139436 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] ssh keepalive-interval or keepalive-count-max must be deleted first Commit validation failed 2025-06-23 10:23:49.884939 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:23:49.887126 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:23:49.889041 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] ssh cipher must be deleted first Commit validation failed 2025-06-23 10:23:53.577584 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:23:53.577638 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:23:53.579254 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] ssh mac must be deleted first Commit validation failed 2025-06-23 10:23:57.318365 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:23:57.319618 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:23:57.320946 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] ssh key-exchange must be deleted first Commit validation failed 2025-06-23 10:24:01.120226 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:24:01.122321 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:24:01.124000 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] ssh pubkey-accepted-algorithms must be deleted first Commit validation failed 2025-06-23 10:24:04.807597 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:24:04.809548 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:24:04.810961 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] ssh host-key-algorithms must be deleted first Commit validation failed 2025-06-23 10:24:08.623750 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:24:08.625538 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:24:08.627130 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] ssh host-key must be deleted first Commit validation failed 2025-06-23 10:24:12.361220 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:24:12.361261 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:24:12.362433 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] ssh login-grace-time must be deleted first Commit validation failed 2025-06-23 10:24:16.164043 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:24:16.164087 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:24:16.165182 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] dns cipher must be deleted first Commit validation failed 2025-06-23 10:24:19.885593 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:24:19.887290 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:24:19.888624 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] ipsec auth-profile must be deleted first Commit validation failed 2025-06-23 10:24:23.748295 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:24:23.748333 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:24:23.749610 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] ipsec esp-group must be deleted first Commit validation failed 2025-06-23 10:24:27.639186 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:24:27.639255 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:24:27.641016 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] ipsec ike-group must be deleted first Commit validation failed 2025-06-23 10:24:31.347358 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:24:31.347414 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:24:31.348958 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] ipsec logging must be deleted first Commit validation failed 2025-06-23 10:24:35.016317 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:24:35.018468 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:24:35.020315 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] login max-sessions must be deleted first Commit validation failed 2025-06-23 10:24:38.663332 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:24:38.664998 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:24:38.666320 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] login password-prompt-delay must be deleted first Commit validation failed 2025-06-23 10:24:41.730258 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.730319 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.730409 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.730440 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.730521 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.730561 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.730646 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.730676 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.730754 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.730783 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.730858 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.730888 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.730962 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.730991 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.731067 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.731098 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.731173 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.731207 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.731301 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:41.731333 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-06-23 10:24:42.260856 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:24:42.260911 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:24:42.262234 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] syslog host must be deleted first Commit validation failed 2025-06-23 10:24:45.445293 daemon-err , ntpd[397829]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-23 10:24:45.445407 daemon-err , ntpd[397829]: AUTH: authreadkeys: added 1 keys 2025-06-23 10:24:46.000248 daemon-err , cfgd[1453]: External python command [cfg.security validate] finished with status 1 2025-06-23 10:24:46.000295 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:24:46.001513 daemon-err , cfgd[1453]: [395835]Command output: [ system security medium ] ntp authentication-key must be deleted first Commit validation failed 2025-06-23 10:24:54.564885 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:24:56.082742 user-err , file_operation: Secure mode activated. ftp, tftp and http connections not allowed 2025-06-23 10:24:56.199777 user-err , file_operation: Secure mode activated. ftp, tftp and http connections not allowed 2025-06-23 10:24:57.048511 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:25:03.647424 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:25:09.990540 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:25:17.636931 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:25:19.394111 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:25:19.396111 daemon-err , cfgd[1453]: [399028]Command output: [ service telnet ] Secure mode is activated Commit validation failed 2025-06-23 10:25:19.845598 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:25:19.847622 daemon-err , cfgd[1453]: [399028]Command output: [ service snmp ] Secure mode is activated Commit validation failed 2025-06-23 10:25:20.358435 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:25:20.360236 daemon-err , cfgd[1453]: [399028]Command output: [ system certificate scep ] Secure mode is activated Commit validation failed 2025-06-23 10:25:20.726688 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:25:20.728561 daemon-err , cfgd[1453]: [399028]Command output: [ system strong-password ] Secure mode is activated Commit validation failed 2025-06-23 10:25:21.099511 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:25:21.101269 daemon-err , cfgd[1453]: [399028]Command output: [ user-level 5 ] Secure mode is activated Commit validation failed 2025-06-23 10:25:22.113179 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:25:28.523526 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:25:30.129397 daemon-err , cfgd[1453]: [399423]Command output: Password does not meet the criteria for secure mode. The criteria are: Must include uppercase, lowercase, numbers, one of these special characters '!, @, #, $, %, ^, &, *, (, )' and must be at least 12 characters long. Value validation failed 2025-06-23 10:25:31.754363 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:25:41.362915 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:25:46.002470 syslog-err , rsyslogd: not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0] 2025-06-23 10:25:46.002525 syslog-err , rsyslogd: invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Wed May 21 08:43:05 2025 to Sat May 19 08:43:05 2035; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA; [v8.2302.0] 2025-06-23 10:25:46.374779 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:25:46.435125 syslog-err , rsyslogd: not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0] 2025-06-23 10:25:46.435223 syslog-err , rsyslogd: invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Wed May 21 08:43:05 2025 to Sat May 19 08:43:05 2035; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA; [v8.2302.0] 2025-06-23 10:25:46.531535 syslog-err , rsyslogd: not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0] 2025-06-23 10:25:46.531634 syslog-err , rsyslogd: invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Wed May 21 08:43:05 2025 to Sat May 19 08:43:05 2035; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA; [v8.2302.0] 2025-06-23 10:25:46.709217 syslog-err , rsyslogd: not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0] 2025-06-23 10:25:46.709331 syslog-err , rsyslogd: invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Wed May 21 08:43:05 2025 to Sat May 19 08:43:05 2035; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA; [v8.2302.0] 2025-06-23 10:25:53.474339 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:25:55.137243 daemon-err , cfgd[1453]: [400571]Command output: Unknown cipher "********" Value validation failed 2025-06-23 10:25:55.404047 daemon-err , cfgd[1453]: [400571]Command output: Unknown MAC "*********" Value validation failed 2025-06-23 10:25:55.654526 daemon-err , cfgd[1453]: [400571]Command output: Unknown KEX "**************************" Value validation failed 2025-06-23 10:25:55.902322 daemon-err , cfgd[1453]: [400571]Command output: Unknown key "***********" Value validation failed 2025-06-23 10:25:56.179961 daemon-err , cfgd[1453]: [400571]Command output: Unknown key "*******" Value validation failed 2025-06-23 10:25:57.040282 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:26:04.521723 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:26:08.918974 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:26:15.703924 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:26:17.283912 daemon-err , cfgd[1453]: [401485]Command output: Invalid dh-group Value validation failed 2025-06-23 10:26:17.534466 daemon-err , cfgd[1453]: [401485]Command output: must be a valid encryption algorithm Value validation failed 2025-06-23 10:26:17.795297 daemon-err , cfgd[1453]: [401485]Command output: Invalid hash Value validation failed 2025-06-23 10:26:18.047986 daemon-err , cfgd[1453]: [401485]Command output: Invalid mode Value validation failed 2025-06-23 10:26:18.294276 daemon-err , cfgd[1453]: [401485]Command output: Invalid dh-group Value validation failed 2025-06-23 10:26:18.598904 daemon-err , cfgd[1453]: [401485]Command output: must be a valid encryption algorithm Value validation failed 2025-06-23 10:26:18.872273 daemon-err , cfgd[1453]: [401485]Command output: Invalid hash Value validation failed 2025-06-23 10:26:19.921823 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:26:26.491109 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:26:28.381394 daemon-err , cfgd[1453]: External python command [cfg.vpn check_secure_mode AUTH] finished with status 1 2025-06-23 10:26:28.381452 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:26:28.383275 daemon-err , cfgd[1453]: [401863]Command output: [ vpn ipsec auth-profile AUTH ] PSK, RADIUS, MD5 and MSCHAPV2 methods are not available in secure mode Commit validation failed 2025-06-23 10:26:28.918455 daemon-err , cfgd[1453]: External python command [cfg.vpn check_secure_mode AUTH] finished with status 1 2025-06-23 10:26:28.918519 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:26:28.920001 daemon-err , cfgd[1453]: [401863]Command output: [ vpn ipsec auth-profile AUTH ] PSK, RADIUS, MD5 and MSCHAPV2 methods are not available in secure mode Commit validation failed 2025-06-23 10:26:29.428781 daemon-err , cfgd[1453]: External python command [cfg.vpn check_secure_mode AUTH] finished with status 1 2025-06-23 10:26:29.428825 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:26:29.430167 daemon-err , cfgd[1453]: [401863]Command output: [ vpn ipsec auth-profile AUTH ] PSK, RADIUS, MD5 and MSCHAPV2 methods are not available in secure mode Commit validation failed 2025-06-23 10:26:29.877461 daemon-err , cfgd[1453]: External python command [cfg.vpn proposal_parameters ESP 1] finished with status 1 2025-06-23 10:26:29.877684 daemon-err , cfgd[1453]: Commit validation failed 2025-06-23 10:26:29.879355 daemon-err , cfgd[1453]: [401863]Command output: [ vpn ipsec esp-group ESP proposal 1 ] pfs and hash must be configured in esp-group ESP proposal 1 when secure mode is enabled Commit validation failed 2025-06-23 10:26:30.845273 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:26:37.597568 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:26:40.732452 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:26:47.207108 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:26:50.618579 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:26:57.526980 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:27:01.429326 user-err , file_operation.py: osdx.utils.xos cmd error: hexdump -C /opt/vyatta/etc/config/log/user/audit_file/audit_file 2025-06-23 10:27:01.429388 user-err , file_operation.py: 2025-06-23 10:27:04.116824 daemon-err , cfgd[1453]: Exception processing normal request: write: Broken pipe 2025-06-23 10:27:25.812587 daemon-err , cfgd[1453]: [403397]Command output: File name reserved Value validation failed 2025-06-23 10:27:31.001264 daemon-notice , cfgd[1453]: [403397]Completed change to active configuration 2025-06-23 10:27:31.002541 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2025-06-23 10:27:31.030748 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2025-06-23 10:27:31.159686 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.Show output
2025-06-23 10:27:36.934081 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
Started.*"DHCP Server Service instance main"\.Show output
2025-06-23 10:27:43.060838 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.176 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.176/0.176/0.176/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-06-23T10:27:51.016814+00:00 10.215.168.64 2025-06-23T10:27:50.554070+00:00 daemon-notice osdx cfgd[1453]: [403397]Completed change to active configuration 2025-06-23T10:27:51.049259+00:00 10.215.168.64 2025-06-23T10:27:50.586589+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-06-23T10:27:51.066516+00:00 10.215.168.64 2025-06-23T10:27:50.603898+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-06-23T10:27:51.215628+00:00 10.215.168.64 2025-06-23T10:27:50.752995+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-06-23T10:27:51.276226+00:00 10.215.168.64 2025-06-23T10:27:50.813573+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.116 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.116/0.116/0.116/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-06-23T10:27:51.710218+00:00 10.215.168.64 2025-06-23T10:27:51.247486+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-06-23T10:27:51.960523+00:00 10.215.168.64 2025-06-23T10:27:51.497841+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-06-23T10:27:51.975875+00:00 10.215.168.64 2025-06-23T10:27:51.513213+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-06-23T10:27:52.883666+00:00 10.215.168.64 2025-06-23T10:27:52.420962+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-06-23T10:27:52.960822+00:00 10.215.168.64 2025-06-23T10:27:52.498102+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-06-23T10:27:53.086012+00:00 10.215.168.64 2025-06-23T10:27:52.623263+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-06-23T10:27:53.152743+00:00 10.215.168.64 2025-06-23T10:27:52.690001+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-06-23T10:27:56.928056+00:00 10.215.168.64 2025-06-23T10:27:56.756492+00:00 daemon-notice osdx cfgd[1453]: [403397]Completed change to active configuration 2025-06-23T10:27:56.966134+00:00 10.215.168.64 2025-06-23T10:27:56.794604+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-06-23T10:27:56.995446+00:00 10.215.168.64 2025-06-23T10:27:56.824052+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-06-23T10:27:57.268431+00:00 10.215.168.64 2025-06-23T10:27:57.097049+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-06-23T10:27:57.338779+00:00 10.215.168.64 2025-06-23T10:27:57.167217+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-interface eth0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.153 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.153/0.153/0.153/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-06-23T10:27:57.787869+00:00 10.215.168.64 2025-06-23T10:27:57.616428+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-06-23T10:27:58.051067+00:00 10.215.168.64 2025-06-23T10:27:57.879644+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-06-23T10:27:58.064448+00:00 10.215.168.64 2025-06-23T10:27:57.893030+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-06-23T10:27:58.974769+00:00 10.215.168.64 2025-06-23T10:27:58.803267+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-06-23T10:27:59.035178+00:00 10.215.168.64 2025-06-23T10:27:58.863581+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-06-23T10:27:59.148910+00:00 10.215.168.64 2025-06-23T10:27:58.977283+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-06-23T10:27:59.219109+00:00 10.215.168.64 2025-06-23T10:27:59.047567+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-06-23T10:28:02.840465+00:00 10.215.168.64 2025-06-23T10:28:02.531394+00:00 daemon-notice osdx cfgd[1453]: [403397]Completed change to active configuration 2025-06-23T10:28:02.868890+00:00 10.215.168.64 2025-06-23T10:28:02.560274+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-06-23T10:28:02.890933+00:00 10.215.168.64 2025-06-23T10:28:02.582347+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-06-23T10:28:03.040374+00:00 10.215.168.64 2025-06-23T10:28:02.731780+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-06-23T10:28:03.100038+00:00 10.215.168.64 2025-06-23T10:28:02.791419+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and UDP
Description
Add a remote host to send syslog messages through a specific local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.174 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.174/0.174/0.174/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-06-23T10:28:08.508427+00:00 33.33.33.33 2025-06-23T10:28:07.597980+00:00 daemon-notice osdx cfgd[1453]: [403397]Completed change to active configuration 2025-06-23T10:28:08.547074+00:00 33.33.33.33 2025-06-23T10:28:07.636768+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-06-23T10:28:08.562705+00:00 33.33.33.33 2025-06-23T10:28:07.652476+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-06-23T10:28:08.733337+00:00 33.33.33.33 2025-06-23T10:28:07.823088+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-06-23T10:28:08.798951+00:00 33.33.33.33 2025-06-23T10:28:07.888687+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and VRF
Description
Add a remote host to send syslog messages through a VRF and a local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.130 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.130/0.130/0.130/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-06-23T10:28:09.235423+00:00 33.33.33.33 2025-06-23T10:28:08.325175+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-06-23T10:28:09.496865+00:00 33.33.33.33 2025-06-23T10:28:08.586584+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-06-23T10:28:09.512785+00:00 33.33.33.33 2025-06-23T10:28:08.602351+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-06-23T10:28:10.452423+00:00 33.33.33.33 2025-06-23T10:28:09.542108+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-06-23T10:28:10.563707+00:00 33.33.33.33 2025-06-23T10:28:09.653368+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-06-23T10:28:10.654176+00:00 33.33.33.33 2025-06-23T10:28:09.743819+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-06-23T10:28:10.750412+00:00 33.33.33.33 2025-06-23T10:28:09.840066+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-06-23T10:28:14.701202+00:00 33.33.33.33 2025-06-23T10:28:13.883241+00:00 daemon-notice osdx cfgd[1453]: [403397]Completed change to active configuration 2025-06-23T10:28:14.701202+00:00 33.33.33.33 2025-06-23T10:28:13.883739+00:00 syslog-warning osdx rsyslogd: bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ] 2025-06-23T10:28:14.730335+00:00 33.33.33.33 2025-06-23T10:28:13.912851+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-06-23T10:28:14.830348+00:00 33.33.33.33 2025-06-23T10:28:14.012887+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-06-23T10:28:15.144623+00:00 33.33.33.33 2025-06-23T10:28:14.327210+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-06-23T10:28:15.217301+00:00 33.33.33.33 2025-06-23T10:28:14.399845+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.092 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.092/0.092/0.092/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-06-23T10:28:21.802179+00:00 10.215.168.64 2025-06-23T10:28:20.834313+00:00 daemon-notice osdx cfgd[1453]: [403397]Completed change to active configuration 2025-06-23T10:28:21.842982+00:00 10.215.168.64 2025-06-23T10:28:20.873385+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-06-23T10:28:21.842982+00:00 10.215.168.64 2025-06-23T10:28:20.890416+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-06-23T10:28:21.842982+00:00 10.215.168.64 2025-06-23T10:28:21.027282+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-06-23T10:28:21.842982+00:00 10.215.168.64 2025-06-23T10:28:21.027350+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-06-23T10:28:21.843004+00:00 10.215.168.64 2025-06-23T10:28:21.042629+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-06-23T10:28:24.106670+00:00 10.215.168.64 2025-06-23T10:28:23.343521+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Local Address Single TLS
Description
Add a secured remote host to send syslog messages and show the host name from a fiven local-address
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.192 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.192/0.192/0.192/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-06-23T10:28:30.395770+00:00 33.33.33.33 2025-06-23T10:28:28.926743+00:00 daemon-notice osdx cfgd[1453]: [403397]Completed change to active configuration 2025-06-23T10:28:30.442912+00:00 33.33.33.33 2025-06-23T10:28:28.962142+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-06-23T10:28:30.442912+00:00 33.33.33.33 2025-06-23T10:28:28.979095+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-06-23T10:28:30.442912+00:00 33.33.33.33 2025-06-23T10:28:29.136306+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-06-23T10:28:30.442912+00:00 33.33.33.33 2025-06-23T10:28:29.389653+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-06-23T10:28:30.442912+00:00 33.33.33.33 2025-06-23T10:28:29.389704+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-06-23T10:28:32.446872+00:00 33.33.33.33 2025-06-23T10:28:31.448570+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.