Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2025-05-14 07:51:16.736564 daemon-err , zebra[41462]: [HSYZM-HV7HF] Extended Error: Invalid device index 2025-05-14 07:51:16.736622 daemon-err , zebra[41462]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Invalid argument, type=RTM_NEWNEXTHOP(104), seq=5711, pid=2756624788 2025-05-14 07:51:16.736647 daemon-err , zebra[41462]: [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1211[if 194 vrfid 0]) into the kernel 2025-05-14 07:51:16.748085 daemon-err , zebra[41462]: [HSYZM-HV7HF] Extended Error: Invalid device index 2025-05-14 07:51:16.748146 daemon-err , zebra[41462]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Invalid argument, type=RTM_NEWNEXTHOP(104), seq=5714, pid=2756624788 2025-05-14 07:51:16.748180 daemon-err , zebra[41462]: [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1215[if 195 vrfid 0]) into the kernel 2025-05-14 07:51:16.788754 daemon-err , zebra[41462]: [HSYZM-HV7HF] Extended Error: Invalid device index 2025-05-14 07:51:16.788805 daemon-err , zebra[41462]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Invalid argument, type=RTM_NEWNEXTHOP(104), seq=5728, pid=2756624788 2025-05-14 07:51:16.788826 daemon-err , zebra[41462]: [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1215[if 195 vrfid 0]) into the kernel 2025-05-14 07:51:16.959912 daemon-err , zebra[41462]: [HSYZM-HV7HF] Extended Error: Invalid device index 2025-05-14 07:51:16.959982 daemon-err , zebra[41462]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Invalid argument, type=RTM_NEWNEXTHOP(104), seq=5732, pid=2756624788 2025-05-14 07:51:16.960010 daemon-err , zebra[41462]: [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1215[if 195 vrfid 0]) into the kernel 2025-05-14 07:51:16.990007 daemon-err , zebra[41462]: [HSYZM-HV7HF] Extended Error: Invalid device index 2025-05-14 07:51:16.990056 daemon-err , zebra[41462]: [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Invalid argument, type=RTM_NEWNEXTHOP(104), seq=5734, pid=2756624788 2025-05-14 07:51:16.990076 daemon-err , zebra[41462]: [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1211[if 194 vrfid 0]) into the kernel 2025-05-14 07:51:30.874760 user-err , ERROR: Dissociating VRF from service: cnm 2025-05-14 07:51:30.941961 daemon-err , staticd[41469]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 197 2025-05-14 07:51:30.942129 daemon-err , nhrpd[100240]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 197 2025-05-14 07:51:31.029779 daemon-err , nhrpd[100240]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 196 2025-05-14 07:51:31.029854 daemon-err , staticd[41469]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 196 2025-05-14 07:52:07.613383 user-err , ERROR: Dissociating VRF from service: cnm 2025-05-14 07:52:07.698652 daemon-err , staticd[41469]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 202 2025-05-14 07:52:07.794678 daemon-err , staticd[41469]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL1 in VRF 201 2025-05-14 07:52:24.222129 user-err , ERROR: Dissociating VRF from service: cnm 2025-05-14 07:52:24.307606 daemon-err , staticd[41469]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL2 in VRF 205 2025-05-14 07:52:24.391596 daemon-err , staticd[41469]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL1 in VRF 204 2025-05-14 07:52:24.471774 daemon-err , staticd[41469]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 206 2025-05-14 07:52:40.031058 user-err , ERROR: Dissociating VRF from service: cnm 2025-05-14 07:52:57.435832 user-err , ERROR: Dissociating VRF from service: cnm 2025-05-14 07:52:57.552786 daemon-err , staticd[41469]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 210 2025-05-14 07:52:57.624568 daemon-err , staticd[41469]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 211 2025-05-14 07:53:23.593063 user-err , ERROR: Dissociating VRF from service: cnm 2025-05-14 07:56:53.695776 user-err , ERROR: Dissociating VRF from service: cnm 2025-05-14 07:56:53.785270 daemon-err , staticd[41469]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF SEG in VRF 229 2025-05-14 07:56:53.873220 daemon-err , staticd[41469]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 228 2025-05-14 07:56:53.969330 daemon-err , staticd[41469]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF AP in VRF 227 2025-05-14 07:58:18.659876 daemon-err , cfgd[1669]: External python command [cfg.vpn validate ike-group IKE-SA] finished with status 1 2025-05-14 07:58:18.662556 daemon-err , cfgd[1669]: External python command [cfg.vpn validate_auth_ike_compat auth-profile AUTH-SA] finished with status 1 2025-05-14 07:58:18.663315 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 07:58:18.665157 daemon-err , cfgd[1669]: [2231]Command output: [ vpn ipsec ike-group IKE-SA ] PPK is not supported with ikev1 [ vpn ipsec ike-group IKE-SA ] Cannot use ikev1 and ChaCha20-Poly1305 as Phase 2 encryption algorithm at the same time [ vpn ipsec auth-profile AUTH-SA ] Both PPK-IKEv1 and XAUTH-IKEv2 cannot be used together Commit validation failed 2025-05-14 07:58:21.298888 user-crit , CRITICAL: No local or remote authentications are defined for profile "AUTH-SA" 2025-05-14 07:58:21.304834 daemon-err , cfgd[1669]: External python command [cfg.vpn configure] finished with status 1 2025-05-14 07:58:21.304872 daemon-err , cfgd[1669]: Commit failed 2025-05-14 07:58:21.315512 daemon-err , cfgd[1669]: [2231]Command output: [ vpn ipsec ] Profile "AUTH-SA" must have at least "local" or "remote" key-pair cerificates or auth configured Commit failed 2025-05-14 07:58:25.422775 user-crit , CRITICAL: Duplicated PPK IDs found: ['carol@teldat.org', 'dave@teldat.org'] 2025-05-14 07:58:25.429658 daemon-err , cfgd[1669]: External python command [cfg.vpn configure] finished with status 1 2025-05-14 07:58:25.429696 daemon-err , cfgd[1669]: Commit failed 2025-05-14 07:58:25.440358 daemon-err , cfgd[1669]: [2231]Command output: [ vpn ipsec ] Duplicated PPK IDs found in use profiles: ['carol@teldat.org', 'dave@teldat.org'] Commit failed 2025-05-14 07:58:25.711663 daemon-err , cfgd[1669]: [2231]Command output: Invalid PPK format, must be a valid hex, base64 or ascii string with a minimum entropy of 256 bits and up to 512 bits, which is equivalent to 64/128 characters in hex, 43/86 characters in base64 or 32/64 characters in ascii. Hexadecimal strings must start with '0x', base64 strings must start with '0s'. Invalid secret "weakp pk" Only these characters are allowed to be used for setting the secret: alphanumeric characters a-z A-Z 0-9 special characters - + & ! @ # $ % ^ * ( ) , . : _ Use of s 2025-05-14 08:02:17.135787 user-err , ERROR: Traceback (most recent call last): File "osdx/bin/op/pki.py", line 337, in handle File "osdx/bin/op/pki.py", line 301, in generate File "osdx/bin/op/pki.py", line 369, in passphrase AttributeError: passphrase option requires cipher to encrypt with 2025-05-14 08:02:17.136265 daemon-err , cfgd[1669]: External python command [op.pki generate private-key running://priv.pem rsa passphrase 420XD] finished with status 1 2025-05-14 08:02:17.363802 user-err , ERROR: Traceback (most recent call last): File "osdx/bin/op/pki.py", line 337, in handle File "osdx/bin/op/pki.py", line 299, in generate File "osdx/bin/op/pki.py", line 287, in check_passphrase AttributeError: cipher option requires a passphrase 2025-05-14 08:02:17.364186 daemon-err , cfgd[1669]: External python command [op.pki generate private-key running://priv.pem rsa cipher AES-256-CBC] finished with status 1 2025-05-14 08:03:18.704679 daemon-err , ntpd[124732]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:18.704831 daemon-err , ntpd[124732]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:19.273265 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1++U4Z+aumf3yP6U5bm4EaGJLyoeJfDCKs=] finished with status 1 2025-05-14 08:03:19.273336 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:03:19.273367 daemon-err , cfgd[1669]: \"U2FsdGVkX1++U4Z+aumf3yP6U5bm4EaGJLyoeJfDCKs=\" strong-password: score is too weak 2025-05-14 08:03:19.273396 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:03:19.274833 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1++U4Z+aumf3yP6U5bm4EaGJLyoeJfDCKs=\" strong-password: score is too weak Commit validation failed 2025-05-14 08:03:24.681398 daemon-err , ntpd[124895]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:24.681417 daemon-err , ntpd[124895]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:25.402075 daemon-err , ntpd[124935]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:25.402089 daemon-err , ntpd[124935]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:26.006529 daemon-err , ntpd[124974]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:26.006550 daemon-err , ntpd[124974]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:26.706279 daemon-err , ntpd[125013]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:26.706443 daemon-err , ntpd[125013]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:27.348329 daemon-err , ntpd[125053]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:27.348343 daemon-err , ntpd[125053]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:27.910714 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=] finished with status 1 2025-05-14 08:03:27.910774 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:03:27.910793 daemon-err , cfgd[1669]: \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak 2025-05-14 08:03:27.910807 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:03:27.912223 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak Commit validation failed 2025-05-14 08:03:28.535161 daemon-err , ntpd[125123]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:28.535186 daemon-err , ntpd[125123]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:29.268653 daemon-err , ntpd[125162]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:29.268678 daemon-err , ntpd[125162]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:29.994398 daemon-err , ntpd[125202]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:29.994777 daemon-err , ntpd[125202]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:30.653924 daemon-err , ntpd[125241]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:30.654556 daemon-err , ntpd[125241]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:31.276046 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=] finished with status 1 2025-05-14 08:03:31.276102 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:03:31.276124 daemon-err , cfgd[1669]: \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak 2025-05-14 08:03:31.276145 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:03:31.277990 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak Commit validation failed 2025-05-14 08:03:31.879233 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=] finished with status 1 2025-05-14 08:03:31.879279 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:03:31.879294 daemon-err , cfgd[1669]: \"U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=\" strong-password: score is too weak 2025-05-14 08:03:31.879312 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:03:31.880831 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=\" strong-password: score is too weak Commit validation failed 2025-05-14 08:03:32.558482 daemon-err , ntpd[125338]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:32.558505 daemon-err , ntpd[125338]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:33.212237 daemon-err , ntpd[125377]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:33.212257 daemon-err , ntpd[125377]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:33.816143 daemon-err , ntpd[125416]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:33.816157 daemon-err , ntpd[125416]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:34.402705 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=] finished with status 1 2025-05-14 08:03:34.402769 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:03:34.402793 daemon-err , cfgd[1669]: \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak 2025-05-14 08:03:34.402817 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:03:34.404538 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak Commit validation failed 2025-05-14 08:03:35.003448 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=] finished with status 1 2025-05-14 08:03:35.003495 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:03:35.003511 daemon-err , cfgd[1669]: \"U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=\" strong-password: score is too weak 2025-05-14 08:03:35.003527 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:03:35.005030 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=\" strong-password: score is too weak Commit validation failed 2025-05-14 08:03:35.725798 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7ycWtonQSHOfe+KnM+S0qE1k=] finished with status 1 2025-05-14 08:03:35.725848 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:03:35.725864 daemon-err , cfgd[1669]: \"U2FsdGVkX1+dYZUYi4E7ycWtonQSHOfe+KnM+S0qE1k=\" strong-password: score is too weak 2025-05-14 08:03:35.725886 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:03:35.727399 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7ycWtonQSHOfe+KnM+S0qE1k=\" strong-password: score is too weak Commit validation failed 2025-05-14 08:03:36.407636 daemon-err , ntpd[125540]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:36.407655 daemon-err , ntpd[125540]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:37.072718 daemon-err , ntpd[125579]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:37.072740 daemon-err , ntpd[125579]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:37.631644 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=] finished with status 1 2025-05-14 08:03:37.631682 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:03:37.631701 daemon-err , cfgd[1669]: \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak 2025-05-14 08:03:37.631724 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:03:37.632997 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak Commit validation failed 2025-05-14 08:03:38.231077 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=] finished with status 1 2025-05-14 08:03:38.231135 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:03:38.231158 daemon-err , cfgd[1669]: \"U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=\" strong-password: score is too weak 2025-05-14 08:03:38.231176 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:03:38.232737 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=\" strong-password: score is too weak Commit validation failed 2025-05-14 08:03:38.812761 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7ycWtonQSHOfe+KnM+S0qE1k=] finished with status 1 2025-05-14 08:03:38.812807 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:03:38.812832 daemon-err , cfgd[1669]: \"U2FsdGVkX1+dYZUYi4E7ycWtonQSHOfe+KnM+S0qE1k=\" strong-password: score is too weak 2025-05-14 08:03:38.812847 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:03:38.814119 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7ycWtonQSHOfe+KnM+S0qE1k=\" strong-password: score is too weak Commit validation failed 2025-05-14 08:03:39.432547 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7ybVd7dFAeN+nFCK2sNI68JI=] finished with status 1 2025-05-14 08:03:39.432615 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:03:39.432638 daemon-err , cfgd[1669]: \"U2FsdGVkX1+dYZUYi4E7ybVd7dFAeN+nFCK2sNI68JI=\" strong-password: score is too weak 2025-05-14 08:03:39.432659 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:03:39.434192 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7ybVd7dFAeN+nFCK2sNI68JI=\" strong-password: score is too weak Commit validation failed 2025-05-14 08:03:45.595868 daemon-err , ntpd[125862]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:45.596055 daemon-err , ntpd[125862]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:52.190465 daemon-err , ntpd[126061]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:52.190571 daemon-err , ntpd[126061]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:03:57.945177 daemon-err , cfgd[1669]: [2231]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-05-14 08:03:58.344776 daemon-err , cfgd[1669]: [2231]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-05-14 08:03:59.643471 daemon-err , ntpd[126314]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:03:59.643626 daemon-err , ntpd[126314]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:04:00.504298 daemon-err , ntpd[126353]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:04:00.504484 daemon-err , ntpd[126353]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:04:01.123806 daemon-err , ntpd[126395]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:04:01.123995 daemon-err , ntpd[126395]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:04:09.178083 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/c63bnIFp/cJZub82LEklqVwQ7oHAg+hQ=] finished with status 1 2025-05-14 08:04:09.178146 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:04:09.178173 daemon-err , cfgd[1669]: \"U2FsdGVkX1/c63bnIFp/cJZub82LEklqVwQ7oHAg+hQ=\" strong-password: score is too weak 2025-05-14 08:04:09.178201 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:04:09.179950 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/c63bnIFp/cJZub82LEklqVwQ7oHAg+hQ=\" strong-password: score is too weak Commit validation failed 2025-05-14 08:04:09.752062 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/0S6Dluhc8vEvWkdaHGii0tfboX4ROjj8=] finished with status 1 2025-05-14 08:04:09.752117 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:04:09.752133 daemon-err , cfgd[1669]: \"U2FsdGVkX1/0S6Dluhc8vEvWkdaHGii0tfboX4ROjj8=\" strong-password: score is too weak 2025-05-14 08:04:09.752147 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:04:09.753474 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/0S6Dluhc8vEvWkdaHGii0tfboX4ROjj8=\" strong-password: score is too weak Commit validation failed 2025-05-14 08:04:10.407702 daemon-err , ntpd[126797]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:04:10.407857 daemon-err , ntpd[126797]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:04:16.617612 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/K7ERELouZbC3vboGIWGaIdC1C+nejcGc=] finished with status 2 2025-05-14 08:04:16.617682 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:04:16.617714 daemon-err , cfgd[1669]: \"U2FsdGVkX1/K7ERELouZbC3vboGIWGaIdC1C+nejcGc=\" strong-password: not long enough 2025-05-14 08:04:16.617741 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:04:16.619802 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/K7ERELouZbC3vboGIWGaIdC1C+nejcGc=\" strong-password: not long enough Commit validation failed 2025-05-14 08:04:17.383725 daemon-err , ntpd[126985]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:04:17.383744 daemon-err , ntpd[126985]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:04:23.702100 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+RlGrYWMhIrm+Oio7ui2KTSI+XYL+Qpjo=] finished with status 3 2025-05-14 08:04:23.702146 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:04:23.702163 daemon-err , cfgd[1669]: \"U2FsdGVkX1+RlGrYWMhIrm+Oio7ui2KTSI+XYL+Qpjo=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2025-05-14 08:04:23.702178 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:04:23.703604 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+RlGrYWMhIrm+Oio7ui2KTSI+XYL+Qpjo=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed 2025-05-14 08:04:24.322548 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+lvbzYVzLV4pKzr2cRI3Gt8pNTQmW7W4s=] finished with status 3 2025-05-14 08:04:24.322610 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:04:24.322631 daemon-err , cfgd[1669]: \"U2FsdGVkX1+lvbzYVzLV4pKzr2cRI3Gt8pNTQmW7W4s=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2025-05-14 08:04:24.322654 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:04:24.324500 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+lvbzYVzLV4pKzr2cRI3Gt8pNTQmW7W4s=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed 2025-05-14 08:04:24.910665 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18NC0IwxUV9BrS3TT3Y0fVEUkPWkHSmNPQ=] finished with status 3 2025-05-14 08:04:24.910720 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:04:24.910742 daemon-err , cfgd[1669]: \"U2FsdGVkX18NC0IwxUV9BrS3TT3Y0fVEUkPWkHSmNPQ=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2025-05-14 08:04:24.910763 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:04:24.912185 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX18NC0IwxUV9BrS3TT3Y0fVEUkPWkHSmNPQ=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed 2025-05-14 08:04:25.493723 daemon-err , cfgd[1669]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+/UKq+Dihb5x/pkTg33LhvrcvpfP8h3f0=] finished with status 1 2025-05-14 08:04:25.493754 daemon-err , cfgd[1669]: [ system ntp authentication-key 1 encrypted-key ] 2025-05-14 08:04:25.493780 daemon-err , cfgd[1669]: \"U2FsdGVkX1+/UKq+Dihb5x/pkTg33LhvrcvpfP8h3f0=\" strong-password: score is too weak 2025-05-14 08:04:25.493799 daemon-err , cfgd[1669]: Commit validation failed 2025-05-14 08:04:25.495448 daemon-err , cfgd[1669]: [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+/UKq+Dihb5x/pkTg33LhvrcvpfP8h3f0=\" strong-password: score is too weak Commit validation failed 2025-05-14 08:04:26.226998 daemon-err , ntpd[127234]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-05-14 08:04:26.227208 daemon-err , ntpd[127234]: AUTH: authreadkeys: added 1 keys 2025-05-14 08:04:26.622520 daemon-err , cfgd[1669]: [2231]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-05-14 08:04:27.035933 daemon-err , cfgd[1669]: [2231]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-05-14 08:04:27.465417 daemon-err , cfgd[1669]: [2231]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-05-14 08:04:27.877603 daemon-err , cfgd[1669]: [2231]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-05-14 08:04:38.307375 daemon-err , cfgd[1669]: [2231]Command output: File name reserved Value validation failed 2025-05-14 08:04:43.570405 daemon-notice , cfgd[1669]: [2231]Completed change to active configuration 2025-05-14 08:04:43.572253 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2025-05-14 08:04:43.590058 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2025-05-14 08:04:43.717403 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.Show output
2025-05-14 08:04:51.339653 daemon-info , systemd[1]: Created slice system-dhcpd.slice - Slice /system/dhcpd. 2025-05-14 08:04:51.376438 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
Started.*"DHCP Server Service instance main"\.Show output
2025-05-14 08:04:57.588041 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog Regex
Description
Create a new syslog file and collect all the syslog messages matching a specified regex.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file cli_msg filter CLI app OSDxCLI set system syslog file cli_msg filter CLI level notice set system syslog file cli_msg filter CLI regex '(^|[^a-zA-Z0-9_])alert([^a-zA-Z0-9_]|$)'
Step 2: Run command command with alert word
at DUT0
and expect this output:
Show output
Command validation failed: CLI Error: Invalid token [command] CLI Error: Command error
Step 3: Run command command with alerted word
at DUT0
and expect this output:
Show output
Command validation failed: CLI Error: Invalid token [command] CLI Error: Command error
Step 4: Run command file show running://log/user/cli_msg/cli_msg | cat
at DUT0
and expect this output:
Show output
2025-05-14 08:05:03.869985 auth-notice , OSDxCLI: User 'admin' entered an invalid command: 'command with alert word'.
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.142 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.142/0.142/0.142/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-05-14T08:05:10.874724+00:00 10.215.168.64 2025-05-14T08:05:09.865461+00:00 daemon-notice osdx cfgd[1669]: [2231]Completed change to active configuration 2025-05-14T08:05:10.885877+00:00 10.215.168.64 2025-05-14T08:05:09.876662+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-05-14T08:05:10.905986+00:00 10.215.168.64 2025-05-14T08:05:09.896906+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-05-14T08:05:11.056478+00:00 10.215.168.64 2025-05-14T08:05:10.047394+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-05-14T08:05:11.117299+00:00 10.215.168.64 2025-05-14T08:05:10.108176+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.136 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.136/0.136/0.136/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-05-14T08:05:11.546996+00:00 10.215.168.64 2025-05-14T08:05:10.537865+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-05-14T08:05:11.807770+00:00 10.215.168.64 2025-05-14T08:05:10.798647+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-05-14T08:05:11.821255+00:00 10.215.168.64 2025-05-14T08:05:10.812137+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-05-14T08:05:12.796649+00:00 10.215.168.64 2025-05-14T08:05:11.787441+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-05-14T08:05:12.918388+00:00 10.215.168.64 2025-05-14T08:05:11.909149+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-05-14T08:05:12.999995+00:00 10.215.168.64 2025-05-14T08:05:11.990787+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-05-14T08:05:13.140241+00:00 10.215.168.64 2025-05-14T08:05:12.130962+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-05-14T08:05:13.204519+00:00 10.215.168.64 2025-05-14T08:05:12.195231+00:00 daemon-info osdx ubnt-cfgd[128969]: inactive 2025-05-14T08:05:17.282887+00:00 10.215.168.64 2025-05-14T08:05:17.005411+00:00 daemon-notice osdx cfgd[1669]: [2231]Completed change to active configuration 2025-05-14T08:05:17.304543+00:00 10.215.168.64 2025-05-14T08:05:17.027321+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-05-14T08:05:17.357570+00:00 10.215.168.64 2025-05-14T08:05:17.080499+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-05-14T08:05:17.596284+00:00 10.215.168.64 2025-05-14T08:05:17.319247+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-05-14T08:05:17.661756+00:00 10.215.168.64 2025-05-14T08:05:17.384678+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-interface eth0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.118 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.118/0.118/0.118/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-05-14T08:05:18.193689+00:00 10.215.168.64 2025-05-14T08:05:17.916618+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-05-14T08:05:18.430259+00:00 10.215.168.64 2025-05-14T08:05:18.153157+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-05-14T08:05:18.445113+00:00 10.215.168.64 2025-05-14T08:05:18.168045+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-05-14T08:05:19.256918+00:00 10.215.168.64 2025-05-14T08:05:18.979810+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-05-14T08:05:19.312598+00:00 10.215.168.64 2025-05-14T08:05:19.035494+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-05-14T08:05:19.432198+00:00 10.215.168.64 2025-05-14T08:05:19.155101+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-05-14T08:05:19.499236+00:00 10.215.168.64 2025-05-14T08:05:19.222107+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-05-14T08:05:19.591871+00:00 10.215.168.64 2025-05-14T08:05:19.314709+00:00 daemon-info osdx ubnt-cfgd[129317]: inactive 2025-05-14T08:05:23.987261+00:00 10.215.168.64 2025-05-14T08:05:23.220287+00:00 daemon-notice osdx cfgd[1669]: [2231]Completed change to active configuration 2025-05-14T08:05:24.001495+00:00 10.215.168.64 2025-05-14T08:05:23.234701+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-05-14T08:05:24.017929+00:00 10.215.168.64 2025-05-14T08:05:23.251177+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-05-14T08:05:24.167247+00:00 10.215.168.64 2025-05-14T08:05:23.400464+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-05-14T08:05:24.225281+00:00 10.215.168.64 2025-05-14T08:05:23.458512+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and UDP
Description
Add a remote host to send syslog messages through a specific local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.145 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.145/0.145/0.145/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-05-14T08:05:30.500058+00:00 33.33.33.33 2025-05-14T08:05:30.102400+00:00 daemon-notice osdx cfgd[1669]: [2231]Completed change to active configuration 2025-05-14T08:05:30.511639+00:00 33.33.33.33 2025-05-14T08:05:30.114036+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-05-14T08:05:30.542488+00:00 33.33.33.33 2025-05-14T08:05:30.144986+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-05-14T08:05:30.696180+00:00 33.33.33.33 2025-05-14T08:05:30.298638+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-05-14T08:05:30.755871+00:00 33.33.33.33 2025-05-14T08:05:30.358374+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and VRF
Description
Add a remote host to send syslog messages through a VRF and a local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.117 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.117/0.117/0.117/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-05-14T08:05:31.189030+00:00 33.33.33.33 2025-05-14T08:05:30.791462+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-05-14T08:05:31.417043+00:00 33.33.33.33 2025-05-14T08:05:31.019522+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-05-14T08:05:31.435083+00:00 33.33.33.33 2025-05-14T08:05:31.037543+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-05-14T08:05:32.314150+00:00 33.33.33.33 2025-05-14T08:05:31.916604+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-05-14T08:05:32.372850+00:00 33.33.33.33 2025-05-14T08:05:31.975309+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-05-14T08:05:32.504126+00:00 33.33.33.33 2025-05-14T08:05:32.106528+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-05-14T08:05:32.566282+00:00 33.33.33.33 2025-05-14T08:05:32.168667+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-05-14T08:05:32.668878+00:00 33.33.33.33 2025-05-14T08:05:32.271192+00:00 daemon-info osdx ubnt-cfgd[129994]: inactive 2025-05-14T08:05:37.235183+00:00 33.33.33.33 2025-05-14T08:05:36.349033+00:00 daemon-notice osdx cfgd[1669]: [2231]Completed change to active configuration 2025-05-14T08:05:37.235183+00:00 33.33.33.33 2025-05-14T08:05:36.349305+00:00 syslog-warning osdx rsyslogd: bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ] 2025-05-14T08:05:37.246211+00:00 33.33.33.33 2025-05-14T08:05:36.360248+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-05-14T08:05:37.265571+00:00 33.33.33.33 2025-05-14T08:05:36.379620+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-05-14T08:05:37.494853+00:00 33.33.33.33 2025-05-14T08:05:36.608950+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-05-14T08:05:37.557332+00:00 33.33.33.33 2025-05-14T08:05:36.671368+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.142 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.142/0.142/0.142/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-05-14T08:05:44.040189+00:00 10.215.168.64 2025-05-14T08:05:43.048077+00:00 daemon-notice osdx cfgd[1669]: [2231]Completed change to active configuration 2025-05-14T08:05:44.082886+00:00 10.215.168.64 2025-05-14T08:05:43.076168+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-05-14T08:05:44.082886+00:00 10.215.168.64 2025-05-14T08:05:43.110416+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-05-14T08:05:44.082886+00:00 10.215.168.64 2025-05-14T08:05:43.174579+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-05-14T08:05:44.082886+00:00 10.215.168.64 2025-05-14T08:05:43.174638+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-05-14T08:05:44.112016+00:00 10.215.168.64 2025-05-14T08:05:43.254430+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-05-14T08:05:46.422814+00:00 10.215.168.64 2025-05-14T08:05:45.565115+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Local Address Single TLS
Description
Add a secured remote host to send syslog messages and show the host name from a fiven local-address
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.188 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.188/0.188/0.188/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-05-14T08:05:53.178886+00:00 33.33.33.33 2025-05-14T08:05:52.435953+00:00 daemon-notice osdx cfgd[1669]: [2231]Completed change to active configuration 2025-05-14T08:05:53.226904+00:00 33.33.33.33 2025-05-14T08:05:52.447757+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-05-14T08:05:53.226904+00:00 33.33.33.33 2025-05-14T08:05:52.464422+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-05-14T08:05:53.226904+00:00 33.33.33.33 2025-05-14T08:05:52.607961+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-05-14T08:05:53.226904+00:00 33.33.33.33 2025-05-14T08:05:52.677769+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-05-14T08:05:53.226904+00:00 33.33.33.33 2025-05-14T08:05:52.677825+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-05-14T08:05:53.270445+00:00 33.33.33.33 2025-05-14T08:05:52.782595+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.