Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2025-03-21 22:30:37.104909 daemon-err , modulelauncher[162044]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-03-21 22:30:38.269188 authpriv-err , sshd[162139]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-03-21 22:30:38.269314 authpriv-err , sshd[162139]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-03-21 22:30:38.860829 authpriv-err , login[162181]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-03-21 22:30:38.860916 authpriv-err , login[162181]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-03-21 22:30:41.911148 daemon-err , modulelauncher[162267]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-03-21 22:30:41.911253 daemon-err , modulelauncher[162267]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-03-21 22:30:41.915460 daemon-err , modulelauncher[162267]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-03-21 22:30:41.915600 daemon-err , modulelauncher[162267]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-03-21 22:30:41.919481 daemon-err , modulelauncher[162267]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-03-21 22:30:41.920194 daemon-err , modulelauncher[162267]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-03-21 22:30:41.924235 daemon-err , modulelauncher[162267]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-03-21 22:30:41.924323 daemon-err , modulelauncher[162267]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-03-21 22:30:43.263381 authpriv-err , sshd[162302]:  pam_radius_auth(sshd:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-03-21 22:30:43.263863 authpriv-err , sshd[162302]:  pam_radius_auth(sshd:auth): All RADIUS servers failed to respond
2025-03-21 22:31:03.892911 authpriv-err , login[162314]:  pam_radius_auth(login:auth): Error sending packet to server 1.2.3.4:1812: No route to host
2025-03-21 22:31:03.893014 authpriv-err , login[162314]:  pam_radius_auth(login:auth): All RADIUS servers failed to respond
2025-03-21 22:31:10.999915 user-err , ERROR:  Dissociating VRF from service: cnm
2025-03-21 22:31:11.110645 daemon-err , staticd[70818]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF test in VRF 247
2025-03-21 22:31:34.243782 daemon-err , modulelauncher[163358]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-03-21 22:31:34.243933 daemon-err , modulelauncher[163358]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-03-21 22:31:34.247783 daemon-err , modulelauncher[163358]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-03-21 22:31:34.247924 daemon-err , modulelauncher[163358]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-03-21 22:31:34.252239 daemon-err , modulelauncher[163358]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-03-21 22:31:34.252373 daemon-err , modulelauncher[163358]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-03-21 22:31:47.021684 daemon-err , modulelauncher[163807]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-03-21 22:31:47.021737 daemon-err , modulelauncher[163807]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-03-21 22:31:47.024677 daemon-err , modulelauncher[163807]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-03-21 22:31:47.024713 daemon-err , modulelauncher[163807]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-03-21 22:31:47.027607 daemon-err , modulelauncher[163807]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-03-21 22:31:47.027665 daemon-err , modulelauncher[163807]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-03-21 22:31:49.882116 daemon-err , modulelauncher[164001]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-03-21 22:31:49.882180 daemon-err , modulelauncher[164001]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-03-21 22:31:49.889493 daemon-err , modulelauncher[164001]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-03-21 22:31:49.889573 daemon-err , modulelauncher[164001]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-03-21 22:31:49.896722 daemon-err , modulelauncher[164001]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-03-21 22:31:49.896765 daemon-err , modulelauncher[164001]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-03-21 22:33:27.907553 daemon-err , modulelauncher[166818]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-03-21 22:33:27.907706 daemon-err , modulelauncher[166818]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-03-21 22:33:27.912490 daemon-err , modulelauncher[166818]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-03-21 22:33:27.912648 daemon-err , modulelauncher[166818]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-03-21 22:33:42.250643 daemon-err , modulelauncher[167257]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-03-21 22:33:42.250790 daemon-err , modulelauncher[167257]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-03-21 22:33:42.256449 daemon-err , modulelauncher[167257]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-03-21 22:33:42.256519 daemon-err , modulelauncher[167257]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-03-21 22:33:45.128815 daemon-err , modulelauncher[167443]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-03-21 22:33:45.129108 daemon-err , modulelauncher[167443]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-03-21 22:33:45.141277 daemon-err , modulelauncher[167443]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-03-21 22:33:45.141399 daemon-err , modulelauncher[167443]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-03-21 22:37:09.273275 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-03-21 22:37:11.771131 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-03-21 22:37:28.586206 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-03-21 22:37:30.594676 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-03-21 22:37:49.865187 daemon-err , modulelauncher[174377]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-03-21 22:37:49.865262 daemon-err , modulelauncher[174377]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-03-21 22:37:49.876367 daemon-err , modulelauncher[174377]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-03-21 22:37:49.876453 daemon-err , modulelauncher[174377]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-03-21 22:37:49.882608 daemon-err , modulelauncher[174377]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-03-21 22:37:49.882693 daemon-err , modulelauncher[174377]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-03-21 22:37:51.974263 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-03-21 22:37:53.665780 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-03-21 22:38:16.537030 daemon-err , cfgd[1728]:  [174539]Command output: File name reserved Value validation failed
2025-03-21 22:38:27.285177 daemon-notice , cfgd[1728]:  [174539]Completed change to active configuration
2025-03-21 22:38:27.288894 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-03-21 22:38:27.338187 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2025-03-21 22:38:27.557629 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2025-03-21 22:38:40.560071 daemon-info , systemd[1]:  Created slice system-dhcpd.slice - Slice /system/dhcpd.
2025-03-21 22:38:40.596072 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2025-03-21 22:38:53.771953 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.607 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.607/0.607/0.607/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-03-21T22:39:07.767615+00:00 10.215.168.64  2025-03-21T22:39:07.062891+00:00 daemon-notice osdx cfgd[1728]:  [174539]Completed change to active configuration
2025-03-21T22:39:07.807858+00:00 10.215.168.64  2025-03-21T22:39:07.104148+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-03-21T22:39:07.888867+00:00 10.215.168.64  2025-03-21T22:39:07.185318+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-03-21T22:39:08.278661+00:00 10.215.168.64  2025-03-21T22:39:07.575081+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-03-21T22:39:08.474000+00:00 10.215.168.64  2025-03-21T22:39:07.770428+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.214 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.214/0.214/0.214/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-03-21T22:39:09.270825+00:00 10.215.168.64  2025-03-21T22:39:08.567238+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-03-21T22:39:09.485960+00:00 10.215.168.64  2025-03-21T22:39:08.771629+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-03-21T22:39:09.492465+00:00 10.215.168.64  2025-03-21T22:39:08.788699+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-03-21T22:39:10.108109+00:00 10.215.168.64  2025-03-21T22:39:09.404429+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-03-21T22:39:10.147975+00:00 10.215.168.64  2025-03-21T22:39:09.436769+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-03-21T22:39:12.956973+00:00 10.215.168.64  2025-03-21T22:39:12.253278+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-03-21T22:39:13.089763+00:00 10.215.168.64  2025-03-21T22:39:12.386222+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-03-21T22:39:13.294809+00:00 10.215.168.64  2025-03-21T22:39:12.590883+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-03-21T22:39:13.440049+00:00 10.215.168.64  2025-03-21T22:39:12.729631+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-03-21T22:39:13.621550+00:00 10.215.168.64  2025-03-21T22:39:12.917959+00:00 daemon-info osdx ubnt-cfgd[176343]:  inactive
2025-03-21T22:39:22.116673+00:00 10.215.168.64  2025-03-21T22:39:21.566880+00:00 daemon-notice osdx cfgd[1728]:  [174539]Completed change to active configuration
2025-03-21T22:39:22.139717+00:00 10.215.168.64  2025-03-21T22:39:21.586051+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-03-21T22:39:22.170307+00:00 10.215.168.64  2025-03-21T22:39:21.620741+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-03-21T22:39:22.633867+00:00 10.215.168.64  2025-03-21T22:39:22.084315+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-03-21T22:39:22.753679+00:00 10.215.168.64  2025-03-21T22:39:22.204063+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.199 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.199/0.199/0.199/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-03-21T22:39:23.455060+00:00 10.215.168.64  2025-03-21T22:39:22.905516+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-03-21T22:39:23.564732+00:00 10.215.168.64  2025-03-21T22:39:23.015100+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-03-21T22:39:23.582189+00:00 10.215.168.64  2025-03-21T22:39:23.032519+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-03-21T22:39:23.862354+00:00 10.215.168.64  2025-03-21T22:39:23.312553+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-03-21T22:39:23.933891+00:00 10.215.168.64  2025-03-21T22:39:23.384139+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-03-21T22:39:25.733234+00:00 10.215.168.64  2025-03-21T22:39:25.183717+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-03-21T22:39:25.848350+00:00 10.215.168.64  2025-03-21T22:39:25.298853+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-03-21T22:39:26.099462+00:00 10.215.168.64  2025-03-21T22:39:25.542975+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-03-21T22:39:26.255599+00:00 10.215.168.64  2025-03-21T22:39:25.702492+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-03-21T22:39:26.423972+00:00 10.215.168.64  2025-03-21T22:39:25.874439+00:00 daemon-info osdx ubnt-cfgd[176709]:  inactive
2025-03-21T22:39:35.293081+00:00 10.215.168.64  2025-03-21T22:39:34.244424+00:00 daemon-notice osdx cfgd[1728]:  [174539]Completed change to active configuration
2025-03-21T22:39:35.326254+00:00 10.215.168.64  2025-03-21T22:39:34.277935+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-03-21T22:39:35.384454+00:00 10.215.168.64  2025-03-21T22:39:34.336315+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-03-21T22:39:35.623684+00:00 10.215.168.64  2025-03-21T22:39:34.575543+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-03-21T22:39:35.743046+00:00 10.215.168.64  2025-03-21T22:39:34.694911+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=6.17 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 6.171/6.171/6.171/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-03-21T22:39:47.313799+00:00 33.33.33.33  2025-03-21T22:39:47.115835+00:00 daemon-notice osdx cfgd[1728]:  [174539]Completed change to active configuration
2025-03-21T22:39:47.330275+00:00 33.33.33.33  2025-03-21T22:39:47.132453+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-03-21T22:39:47.390795+00:00 33.33.33.33  2025-03-21T22:39:47.193342+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-03-21T22:39:47.667790+00:00 33.33.33.33  2025-03-21T22:39:47.463210+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-03-21T22:39:47.797351+00:00 33.33.33.33  2025-03-21T22:39:47.599929+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=3.98 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 3.978/3.978/3.978/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-03-21T22:39:48.526211+00:00 33.33.33.33  2025-03-21T22:39:48.323028+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-03-21T22:39:48.618665+00:00 33.33.33.33  2025-03-21T22:39:48.421445+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-03-21T22:39:48.629046+00:00 33.33.33.33  2025-03-21T22:39:48.431837+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-03-21T22:39:48.906286+00:00 33.33.33.33  2025-03-21T22:39:48.708945+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-03-21T22:39:48.954283+00:00 33.33.33.33  2025-03-21T22:39:48.756884+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-03-21T22:39:50.599037+00:00 33.33.33.33  2025-03-21T22:39:50.401174+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-03-21T22:39:50.787684+00:00 33.33.33.33  2025-03-21T22:39:50.587878+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-03-21T22:39:51.017806+00:00 33.33.33.33  2025-03-21T22:39:50.819711+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-03-21T22:39:51.176394+00:00 33.33.33.33  2025-03-21T22:39:50.976774+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-03-21T22:39:51.317771+00:00 33.33.33.33  2025-03-21T22:39:51.120550+00:00 daemon-info osdx ubnt-cfgd[177432]:  inactive
2025-03-21T22:39:59.661808+00:00 33.33.33.33  2025-03-21T22:39:59.417734+00:00 daemon-notice osdx cfgd[1728]:  [174539]Completed change to active configuration
2025-03-21T22:39:59.661808+00:00 33.33.33.33  2025-03-21T22:39:59.417992+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2025-03-21T22:39:59.681470+00:00 33.33.33.33  2025-03-21T22:39:59.437700+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-03-21T22:39:59.716175+00:00 33.33.33.33  2025-03-21T22:39:59.471989+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-03-21T22:40:00.151660+00:00 33.33.33.33  2025-03-21T22:39:59.904980+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-03-21T22:40:00.271693+00:00 33.33.33.33  2025-03-21T22:40:00.024771+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.386 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.386/0.386/0.386/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-03-21T22:40:13.642075+00:00 10.215.168.64  2025-03-21T22:40:12.320952+00:00 daemon-notice osdx cfgd[1728]:  [174539]Completed change to active configuration
2025-03-21T22:40:13.687815+00:00 10.215.168.64  2025-03-21T22:40:12.343345+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-03-21T22:40:13.687815+00:00 10.215.168.64  2025-03-21T22:40:12.418805+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-03-21T22:40:13.687815+00:00 10.215.168.64  2025-03-21T22:40:12.713588+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-03-21T22:40:13.687815+00:00 10.215.168.64  2025-03-21T22:40:13.103823+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-03-21T22:40:13.687815+00:00 10.215.168.64  2025-03-21T22:40:13.104052+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-03-21T22:40:15.750366+00:00 10.215.168.64  2025-03-21T22:40:15.227525+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.341 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.341/0.341/0.341/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-03-21T22:40:30.543070+00:00 33.33.33.33  2025-03-21T22:40:28.713880+00:00 daemon-notice osdx cfgd[1728]:  [174539]Completed change to active configuration
2025-03-21T22:40:30.583814+00:00 33.33.33.33  2025-03-21T22:40:28.760043+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-03-21T22:40:30.583814+00:00 33.33.33.33  2025-03-21T22:40:29.025267+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-03-21T22:40:30.583814+00:00 33.33.33.33  2025-03-21T22:40:29.376276+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-03-21T22:40:30.583814+00:00 33.33.33.33  2025-03-21T22:40:30.150569+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-03-21T22:40:30.583814+00:00 33.33.33.33  2025-03-21T22:40:30.150662+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-03-21T22:40:32.389459+00:00 33.33.33.33  2025-03-21T22:40:32.009809+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.