Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2025-05-14 07:51:16.736564 daemon-err , zebra[41462]:  [HSYZM-HV7HF] Extended Error: Invalid device index
2025-05-14 07:51:16.736622 daemon-err , zebra[41462]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Invalid argument, type=RTM_NEWNEXTHOP(104), seq=5711, pid=2756624788
2025-05-14 07:51:16.736647 daemon-err , zebra[41462]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1211[if 194 vrfid 0]) into the kernel
2025-05-14 07:51:16.748085 daemon-err , zebra[41462]:  [HSYZM-HV7HF] Extended Error: Invalid device index
2025-05-14 07:51:16.748146 daemon-err , zebra[41462]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Invalid argument, type=RTM_NEWNEXTHOP(104), seq=5714, pid=2756624788
2025-05-14 07:51:16.748180 daemon-err , zebra[41462]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1215[if 195 vrfid 0]) into the kernel
2025-05-14 07:51:16.788754 daemon-err , zebra[41462]:  [HSYZM-HV7HF] Extended Error: Invalid device index
2025-05-14 07:51:16.788805 daemon-err , zebra[41462]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Invalid argument, type=RTM_NEWNEXTHOP(104), seq=5728, pid=2756624788
2025-05-14 07:51:16.788826 daemon-err , zebra[41462]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1215[if 195 vrfid 0]) into the kernel
2025-05-14 07:51:16.959912 daemon-err , zebra[41462]:  [HSYZM-HV7HF] Extended Error: Invalid device index
2025-05-14 07:51:16.959982 daemon-err , zebra[41462]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Invalid argument, type=RTM_NEWNEXTHOP(104), seq=5732, pid=2756624788
2025-05-14 07:51:16.960010 daemon-err , zebra[41462]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1215[if 195 vrfid 0]) into the kernel
2025-05-14 07:51:16.990007 daemon-err , zebra[41462]:  [HSYZM-HV7HF] Extended Error: Invalid device index
2025-05-14 07:51:16.990056 daemon-err , zebra[41462]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: Invalid argument, type=RTM_NEWNEXTHOP(104), seq=5734, pid=2756624788
2025-05-14 07:51:16.990076 daemon-err , zebra[41462]:  [X5XE1-RS0SW][EC 4043309074] Failed to install Nexthop (1211[if 194 vrfid 0]) into the kernel
2025-05-14 07:51:30.874760 user-err , ERROR:  Dissociating VRF from service: cnm
2025-05-14 07:51:30.941961 daemon-err , staticd[41469]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 197
2025-05-14 07:51:30.942129 daemon-err , nhrpd[100240]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN2 in VRF 197
2025-05-14 07:51:31.029779 daemon-err , nhrpd[100240]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 196
2025-05-14 07:51:31.029854 daemon-err , staticd[41469]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN1 in VRF 196
2025-05-14 07:52:07.613383 user-err , ERROR:  Dissociating VRF from service: cnm
2025-05-14 07:52:07.698652 daemon-err , staticd[41469]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 202
2025-05-14 07:52:07.794678 daemon-err , staticd[41469]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL1 in VRF 201
2025-05-14 07:52:24.222129 user-err , ERROR:  Dissociating VRF from service: cnm
2025-05-14 07:52:24.307606 daemon-err , staticd[41469]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL2 in VRF 205
2025-05-14 07:52:24.391596 daemon-err , staticd[41469]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF TUNNEL1 in VRF 204
2025-05-14 07:52:24.471774 daemon-err , staticd[41469]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 206
2025-05-14 07:52:40.031058 user-err , ERROR:  Dissociating VRF from service: cnm
2025-05-14 07:52:57.435832 user-err , ERROR:  Dissociating VRF from service: cnm
2025-05-14 07:52:57.552786 daemon-err , staticd[41469]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF LAN in VRF 210
2025-05-14 07:52:57.624568 daemon-err , staticd[41469]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 211
2025-05-14 07:53:23.593063 user-err , ERROR:  Dissociating VRF from service: cnm
2025-05-14 07:56:53.695776 user-err , ERROR:  Dissociating VRF from service: cnm
2025-05-14 07:56:53.785270 daemon-err , staticd[41469]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF SEG in VRF 229
2025-05-14 07:56:53.873220 daemon-err , staticd[41469]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF WAN in VRF 228
2025-05-14 07:56:53.969330 daemon-err , staticd[41469]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF AP in VRF 227
2025-05-14 07:58:18.659876 daemon-err , cfgd[1669]:  External python command [cfg.vpn validate ike-group IKE-SA] finished with status 1
2025-05-14 07:58:18.662556 daemon-err , cfgd[1669]:  External python command [cfg.vpn validate_auth_ike_compat auth-profile AUTH-SA] finished with status 1
2025-05-14 07:58:18.663315 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 07:58:18.665157 daemon-err , cfgd[1669]:  [2231]Command output: [ vpn ipsec ike-group IKE-SA ] PPK is not supported with ikev1 [ vpn ipsec ike-group IKE-SA ] Cannot use ikev1 and ChaCha20-Poly1305 as Phase 2 encryption algorithm at the same time  [ vpn ipsec auth-profile AUTH-SA ] Both PPK-IKEv1 and XAUTH-IKEv2 cannot be used together  Commit validation failed
2025-05-14 07:58:21.298888 user-crit , CRITICAL:  No local or remote authentications are defined for profile "AUTH-SA"
2025-05-14 07:58:21.304834 daemon-err , cfgd[1669]:  External python command [cfg.vpn configure] finished with status 1
2025-05-14 07:58:21.304872 daemon-err , cfgd[1669]:  Commit failed
2025-05-14 07:58:21.315512 daemon-err , cfgd[1669]:  [2231]Command output: [ vpn ipsec ] Profile "AUTH-SA" must have at least "local" or "remote" key-pair cerificates or auth configured Commit failed
2025-05-14 07:58:25.422775 user-crit , CRITICAL:  Duplicated PPK IDs found: ['carol@teldat.org', 'dave@teldat.org']
2025-05-14 07:58:25.429658 daemon-err , cfgd[1669]:  External python command [cfg.vpn configure] finished with status 1
2025-05-14 07:58:25.429696 daemon-err , cfgd[1669]:  Commit failed
2025-05-14 07:58:25.440358 daemon-err , cfgd[1669]:  [2231]Command output: [ vpn ipsec ] Duplicated PPK IDs found in use profiles: ['carol@teldat.org', 'dave@teldat.org'] Commit failed
2025-05-14 07:58:25.711663 daemon-err , cfgd[1669]:  [2231]Command output: Invalid PPK format, must be a valid hex, base64 or ascii string with a minimum entropy of 256 bits and up to 512 bits, which is equivalent to 64/128 characters in hex, 43/86 characters in base64 or 32/64 characters in ascii. Hexadecimal strings must start with '0x', base64 strings must start with '0s'. Invalid secret "weakp
pk" Only these characters are allowed to be used for setting the secret:  alphanumeric characters      a-z A-Z 0-9  special characters           - + & ! @ # $ % ^ * ( ) , . : _  Use of s
2025-05-14 08:02:17.135787 user-err , ERROR:  Traceback (most recent call last):   File "osdx/bin/op/pki.py", line 337, in handle   File "osdx/bin/op/pki.py", line 301, in generate   File "osdx/bin/op/pki.py", line 369, in passphrase AttributeError: passphrase option requires cipher to encrypt with
2025-05-14 08:02:17.136265 daemon-err , cfgd[1669]:  External python command [op.pki generate private-key running://priv.pem rsa passphrase 420XD] finished with status 1
2025-05-14 08:02:17.363802 user-err , ERROR:  Traceback (most recent call last):   File "osdx/bin/op/pki.py", line 337, in handle   File "osdx/bin/op/pki.py", line 299, in generate   File "osdx/bin/op/pki.py", line 287, in check_passphrase AttributeError: cipher option requires a passphrase
2025-05-14 08:02:17.364186 daemon-err , cfgd[1669]:  External python command [op.pki generate private-key running://priv.pem rsa cipher AES-256-CBC] finished with status 1
2025-05-14 08:03:18.704679 daemon-err , ntpd[124732]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:18.704831 daemon-err , ntpd[124732]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:19.273265 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1++U4Z+aumf3yP6U5bm4EaGJLyoeJfDCKs=] finished with status 1
2025-05-14 08:03:19.273336 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:03:19.273367 daemon-err , cfgd[1669]:  \"U2FsdGVkX1++U4Z+aumf3yP6U5bm4EaGJLyoeJfDCKs=\" strong-password: score is too weak
2025-05-14 08:03:19.273396 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:03:19.274833 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1++U4Z+aumf3yP6U5bm4EaGJLyoeJfDCKs=\" strong-password: score is too weak Commit validation failed
2025-05-14 08:03:24.681398 daemon-err , ntpd[124895]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:24.681417 daemon-err , ntpd[124895]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:25.402075 daemon-err , ntpd[124935]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:25.402089 daemon-err , ntpd[124935]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:26.006529 daemon-err , ntpd[124974]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:26.006550 daemon-err , ntpd[124974]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:26.706279 daemon-err , ntpd[125013]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:26.706443 daemon-err , ntpd[125013]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:27.348329 daemon-err , ntpd[125053]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:27.348343 daemon-err , ntpd[125053]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:27.910714 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=] finished with status 1
2025-05-14 08:03:27.910774 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:03:27.910793 daemon-err , cfgd[1669]:  \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak
2025-05-14 08:03:27.910807 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:03:27.912223 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak Commit validation failed
2025-05-14 08:03:28.535161 daemon-err , ntpd[125123]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:28.535186 daemon-err , ntpd[125123]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:29.268653 daemon-err , ntpd[125162]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:29.268678 daemon-err , ntpd[125162]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:29.994398 daemon-err , ntpd[125202]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:29.994777 daemon-err , ntpd[125202]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:30.653924 daemon-err , ntpd[125241]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:30.654556 daemon-err , ntpd[125241]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:31.276046 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=] finished with status 1
2025-05-14 08:03:31.276102 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:03:31.276124 daemon-err , cfgd[1669]:  \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak
2025-05-14 08:03:31.276145 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:03:31.277990 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak Commit validation failed
2025-05-14 08:03:31.879233 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=] finished with status 1
2025-05-14 08:03:31.879279 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:03:31.879294 daemon-err , cfgd[1669]:  \"U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=\" strong-password: score is too weak
2025-05-14 08:03:31.879312 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:03:31.880831 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=\" strong-password: score is too weak Commit validation failed
2025-05-14 08:03:32.558482 daemon-err , ntpd[125338]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:32.558505 daemon-err , ntpd[125338]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:33.212237 daemon-err , ntpd[125377]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:33.212257 daemon-err , ntpd[125377]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:33.816143 daemon-err , ntpd[125416]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:33.816157 daemon-err , ntpd[125416]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:34.402705 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=] finished with status 1
2025-05-14 08:03:34.402769 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:03:34.402793 daemon-err , cfgd[1669]:  \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak
2025-05-14 08:03:34.402817 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:03:34.404538 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak Commit validation failed
2025-05-14 08:03:35.003448 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=] finished with status 1
2025-05-14 08:03:35.003495 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:03:35.003511 daemon-err , cfgd[1669]:  \"U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=\" strong-password: score is too weak
2025-05-14 08:03:35.003527 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:03:35.005030 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=\" strong-password: score is too weak Commit validation failed
2025-05-14 08:03:35.725798 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7ycWtonQSHOfe+KnM+S0qE1k=] finished with status 1
2025-05-14 08:03:35.725848 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:03:35.725864 daemon-err , cfgd[1669]:  \"U2FsdGVkX1+dYZUYi4E7ycWtonQSHOfe+KnM+S0qE1k=\" strong-password: score is too weak
2025-05-14 08:03:35.725886 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:03:35.727399 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7ycWtonQSHOfe+KnM+S0qE1k=\" strong-password: score is too weak Commit validation failed
2025-05-14 08:03:36.407636 daemon-err , ntpd[125540]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:36.407655 daemon-err , ntpd[125540]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:37.072718 daemon-err , ntpd[125579]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:37.072740 daemon-err , ntpd[125579]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:37.631644 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=] finished with status 1
2025-05-14 08:03:37.631682 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:03:37.631701 daemon-err , cfgd[1669]:  \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak
2025-05-14 08:03:37.631724 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:03:37.632997 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7ycnxmSl8NtdwZXK81xxz3qU=\" strong-password: score is too weak Commit validation failed
2025-05-14 08:03:38.231077 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=] finished with status 1
2025-05-14 08:03:38.231135 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:03:38.231158 daemon-err , cfgd[1669]:  \"U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=\" strong-password: score is too weak
2025-05-14 08:03:38.231176 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:03:38.232737 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7yQdUBSVT+1ErDg/fN3srY/w=\" strong-password: score is too weak Commit validation failed
2025-05-14 08:03:38.812761 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7ycWtonQSHOfe+KnM+S0qE1k=] finished with status 1
2025-05-14 08:03:38.812807 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:03:38.812832 daemon-err , cfgd[1669]:  \"U2FsdGVkX1+dYZUYi4E7ycWtonQSHOfe+KnM+S0qE1k=\" strong-password: score is too weak
2025-05-14 08:03:38.812847 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:03:38.814119 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7ycWtonQSHOfe+KnM+S0qE1k=\" strong-password: score is too weak Commit validation failed
2025-05-14 08:03:39.432547 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+dYZUYi4E7ybVd7dFAeN+nFCK2sNI68JI=] finished with status 1
2025-05-14 08:03:39.432615 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:03:39.432638 daemon-err , cfgd[1669]:  \"U2FsdGVkX1+dYZUYi4E7ybVd7dFAeN+nFCK2sNI68JI=\" strong-password: score is too weak
2025-05-14 08:03:39.432659 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:03:39.434192 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+dYZUYi4E7ybVd7dFAeN+nFCK2sNI68JI=\" strong-password: score is too weak Commit validation failed
2025-05-14 08:03:45.595868 daemon-err , ntpd[125862]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:45.596055 daemon-err , ntpd[125862]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:52.190465 daemon-err , ntpd[126061]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:52.190571 daemon-err , ntpd[126061]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:03:57.945177 daemon-err , cfgd[1669]:  [2231]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-05-14 08:03:58.344776 daemon-err , cfgd[1669]:  [2231]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-05-14 08:03:59.643471 daemon-err , ntpd[126314]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:03:59.643626 daemon-err , ntpd[126314]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:04:00.504298 daemon-err , ntpd[126353]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:04:00.504484 daemon-err , ntpd[126353]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:04:01.123806 daemon-err , ntpd[126395]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:04:01.123995 daemon-err , ntpd[126395]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:04:09.178083 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/c63bnIFp/cJZub82LEklqVwQ7oHAg+hQ=] finished with status 1
2025-05-14 08:04:09.178146 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:04:09.178173 daemon-err , cfgd[1669]:  \"U2FsdGVkX1/c63bnIFp/cJZub82LEklqVwQ7oHAg+hQ=\" strong-password: score is too weak
2025-05-14 08:04:09.178201 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:04:09.179950 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/c63bnIFp/cJZub82LEklqVwQ7oHAg+hQ=\" strong-password: score is too weak Commit validation failed
2025-05-14 08:04:09.752062 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/0S6Dluhc8vEvWkdaHGii0tfboX4ROjj8=] finished with status 1
2025-05-14 08:04:09.752117 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:04:09.752133 daemon-err , cfgd[1669]:  \"U2FsdGVkX1/0S6Dluhc8vEvWkdaHGii0tfboX4ROjj8=\" strong-password: score is too weak
2025-05-14 08:04:09.752147 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:04:09.753474 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/0S6Dluhc8vEvWkdaHGii0tfboX4ROjj8=\" strong-password: score is too weak Commit validation failed
2025-05-14 08:04:10.407702 daemon-err , ntpd[126797]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:04:10.407857 daemon-err , ntpd[126797]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:04:16.617612 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/K7ERELouZbC3vboGIWGaIdC1C+nejcGc=] finished with status 2
2025-05-14 08:04:16.617682 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:04:16.617714 daemon-err , cfgd[1669]:  \"U2FsdGVkX1/K7ERELouZbC3vboGIWGaIdC1C+nejcGc=\" strong-password: not long enough
2025-05-14 08:04:16.617741 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:04:16.619802 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/K7ERELouZbC3vboGIWGaIdC1C+nejcGc=\" strong-password: not long enough Commit validation failed
2025-05-14 08:04:17.383725 daemon-err , ntpd[126985]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:04:17.383744 daemon-err , ntpd[126985]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:04:23.702100 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+RlGrYWMhIrm+Oio7ui2KTSI+XYL+Qpjo=] finished with status 3
2025-05-14 08:04:23.702146 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:04:23.702163 daemon-err , cfgd[1669]:  \"U2FsdGVkX1+RlGrYWMhIrm+Oio7ui2KTSI+XYL+Qpjo=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2025-05-14 08:04:23.702178 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:04:23.703604 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+RlGrYWMhIrm+Oio7ui2KTSI+XYL+Qpjo=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed
2025-05-14 08:04:24.322548 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+lvbzYVzLV4pKzr2cRI3Gt8pNTQmW7W4s=] finished with status 3
2025-05-14 08:04:24.322610 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:04:24.322631 daemon-err , cfgd[1669]:  \"U2FsdGVkX1+lvbzYVzLV4pKzr2cRI3Gt8pNTQmW7W4s=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2025-05-14 08:04:24.322654 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:04:24.324500 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+lvbzYVzLV4pKzr2cRI3Gt8pNTQmW7W4s=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed
2025-05-14 08:04:24.910665 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18NC0IwxUV9BrS3TT3Y0fVEUkPWkHSmNPQ=] finished with status 3
2025-05-14 08:04:24.910720 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:04:24.910742 daemon-err , cfgd[1669]:  \"U2FsdGVkX18NC0IwxUV9BrS3TT3Y0fVEUkPWkHSmNPQ=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2025-05-14 08:04:24.910763 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:04:24.912185 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX18NC0IwxUV9BrS3TT3Y0fVEUkPWkHSmNPQ=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed
2025-05-14 08:04:25.493723 daemon-err , cfgd[1669]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+/UKq+Dihb5x/pkTg33LhvrcvpfP8h3f0=] finished with status 1
2025-05-14 08:04:25.493754 daemon-err , cfgd[1669]:  [ system ntp authentication-key 1 encrypted-key ]
2025-05-14 08:04:25.493780 daemon-err , cfgd[1669]:  \"U2FsdGVkX1+/UKq+Dihb5x/pkTg33LhvrcvpfP8h3f0=\" strong-password: score is too weak
2025-05-14 08:04:25.493799 daemon-err , cfgd[1669]:  Commit validation failed
2025-05-14 08:04:25.495448 daemon-err , cfgd[1669]:  [2231]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+/UKq+Dihb5x/pkTg33LhvrcvpfP8h3f0=\" strong-password: score is too weak Commit validation failed
2025-05-14 08:04:26.226998 daemon-err , ntpd[127234]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-05-14 08:04:26.227208 daemon-err , ntpd[127234]:  AUTH: authreadkeys: added 1 keys
2025-05-14 08:04:26.622520 daemon-err , cfgd[1669]:  [2231]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-05-14 08:04:27.035933 daemon-err , cfgd[1669]:  [2231]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-05-14 08:04:27.465417 daemon-err , cfgd[1669]:  [2231]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-05-14 08:04:27.877603 daemon-err , cfgd[1669]:  [2231]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-05-14 08:04:38.307375 daemon-err , cfgd[1669]:  [2231]Command output: File name reserved Value validation failed
2025-05-14 08:04:43.570405 daemon-notice , cfgd[1669]:  [2231]Completed change to active configuration
2025-05-14 08:04:43.572253 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-05-14 08:04:43.590058 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2025-05-14 08:04:43.717403 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2025-05-14 08:04:51.339653 daemon-info , systemd[1]:  Created slice system-dhcpd.slice - Slice /system/dhcpd.
2025-05-14 08:04:51.376438 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2025-05-14 08:04:57.588041 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Regex

Description

Create a new syslog file and collect all the syslog messages matching a specified regex.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file cli_msg filter CLI app OSDxCLI
set system syslog file cli_msg filter CLI level notice
set system syslog file cli_msg filter CLI regex '(^|[^a-zA-Z0-9_])alert([^a-zA-Z0-9_]|$)'

Step 2: Run command command with alert word at DUT0 and expect this output:

Show output
Command validation failed:
CLI Error: Invalid token [command]
CLI Error: Command error

Step 3: Run command command with alerted word at DUT0 and expect this output:

Show output
Command validation failed:
CLI Error: Invalid token [command]
CLI Error: Command error

Step 4: Run command file show running://log/user/cli_msg/cli_msg | cat at DUT0 and expect this output:

Show output
2025-05-14 08:05:03.869985 auth-notice , OSDxCLI:  User 'admin' entered an invalid command: 'command with alert word'.

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.142 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.142/0.142/0.142/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-05-14T08:05:10.874724+00:00 10.215.168.64  2025-05-14T08:05:09.865461+00:00 daemon-notice osdx cfgd[1669]:  [2231]Completed change to active configuration
2025-05-14T08:05:10.885877+00:00 10.215.168.64  2025-05-14T08:05:09.876662+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-05-14T08:05:10.905986+00:00 10.215.168.64  2025-05-14T08:05:09.896906+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-05-14T08:05:11.056478+00:00 10.215.168.64  2025-05-14T08:05:10.047394+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-05-14T08:05:11.117299+00:00 10.215.168.64  2025-05-14T08:05:10.108176+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.136 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.136/0.136/0.136/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-05-14T08:05:11.546996+00:00 10.215.168.64  2025-05-14T08:05:10.537865+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-05-14T08:05:11.807770+00:00 10.215.168.64  2025-05-14T08:05:10.798647+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-05-14T08:05:11.821255+00:00 10.215.168.64  2025-05-14T08:05:10.812137+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-05-14T08:05:12.796649+00:00 10.215.168.64  2025-05-14T08:05:11.787441+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-05-14T08:05:12.918388+00:00 10.215.168.64  2025-05-14T08:05:11.909149+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-05-14T08:05:12.999995+00:00 10.215.168.64  2025-05-14T08:05:11.990787+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-05-14T08:05:13.140241+00:00 10.215.168.64  2025-05-14T08:05:12.130962+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-05-14T08:05:13.204519+00:00 10.215.168.64  2025-05-14T08:05:12.195231+00:00 daemon-info osdx ubnt-cfgd[128969]:  inactive
2025-05-14T08:05:17.282887+00:00 10.215.168.64  2025-05-14T08:05:17.005411+00:00 daemon-notice osdx cfgd[1669]:  [2231]Completed change to active configuration
2025-05-14T08:05:17.304543+00:00 10.215.168.64  2025-05-14T08:05:17.027321+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-05-14T08:05:17.357570+00:00 10.215.168.64  2025-05-14T08:05:17.080499+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-05-14T08:05:17.596284+00:00 10.215.168.64  2025-05-14T08:05:17.319247+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-05-14T08:05:17.661756+00:00 10.215.168.64  2025-05-14T08:05:17.384678+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.118 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.118/0.118/0.118/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-05-14T08:05:18.193689+00:00 10.215.168.64  2025-05-14T08:05:17.916618+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-05-14T08:05:18.430259+00:00 10.215.168.64  2025-05-14T08:05:18.153157+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-05-14T08:05:18.445113+00:00 10.215.168.64  2025-05-14T08:05:18.168045+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-05-14T08:05:19.256918+00:00 10.215.168.64  2025-05-14T08:05:18.979810+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-05-14T08:05:19.312598+00:00 10.215.168.64  2025-05-14T08:05:19.035494+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-05-14T08:05:19.432198+00:00 10.215.168.64  2025-05-14T08:05:19.155101+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-05-14T08:05:19.499236+00:00 10.215.168.64  2025-05-14T08:05:19.222107+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-05-14T08:05:19.591871+00:00 10.215.168.64  2025-05-14T08:05:19.314709+00:00 daemon-info osdx ubnt-cfgd[129317]:  inactive
2025-05-14T08:05:23.987261+00:00 10.215.168.64  2025-05-14T08:05:23.220287+00:00 daemon-notice osdx cfgd[1669]:  [2231]Completed change to active configuration
2025-05-14T08:05:24.001495+00:00 10.215.168.64  2025-05-14T08:05:23.234701+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-05-14T08:05:24.017929+00:00 10.215.168.64  2025-05-14T08:05:23.251177+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-05-14T08:05:24.167247+00:00 10.215.168.64  2025-05-14T08:05:23.400464+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-05-14T08:05:24.225281+00:00 10.215.168.64  2025-05-14T08:05:23.458512+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.145 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.145/0.145/0.145/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-05-14T08:05:30.500058+00:00 33.33.33.33  2025-05-14T08:05:30.102400+00:00 daemon-notice osdx cfgd[1669]:  [2231]Completed change to active configuration
2025-05-14T08:05:30.511639+00:00 33.33.33.33  2025-05-14T08:05:30.114036+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-05-14T08:05:30.542488+00:00 33.33.33.33  2025-05-14T08:05:30.144986+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-05-14T08:05:30.696180+00:00 33.33.33.33  2025-05-14T08:05:30.298638+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-05-14T08:05:30.755871+00:00 33.33.33.33  2025-05-14T08:05:30.358374+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.117 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.117/0.117/0.117/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-05-14T08:05:31.189030+00:00 33.33.33.33  2025-05-14T08:05:30.791462+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-05-14T08:05:31.417043+00:00 33.33.33.33  2025-05-14T08:05:31.019522+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-05-14T08:05:31.435083+00:00 33.33.33.33  2025-05-14T08:05:31.037543+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-05-14T08:05:32.314150+00:00 33.33.33.33  2025-05-14T08:05:31.916604+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-05-14T08:05:32.372850+00:00 33.33.33.33  2025-05-14T08:05:31.975309+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-05-14T08:05:32.504126+00:00 33.33.33.33  2025-05-14T08:05:32.106528+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-05-14T08:05:32.566282+00:00 33.33.33.33  2025-05-14T08:05:32.168667+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-05-14T08:05:32.668878+00:00 33.33.33.33  2025-05-14T08:05:32.271192+00:00 daemon-info osdx ubnt-cfgd[129994]:  inactive
2025-05-14T08:05:37.235183+00:00 33.33.33.33  2025-05-14T08:05:36.349033+00:00 daemon-notice osdx cfgd[1669]:  [2231]Completed change to active configuration
2025-05-14T08:05:37.235183+00:00 33.33.33.33  2025-05-14T08:05:36.349305+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2025-05-14T08:05:37.246211+00:00 33.33.33.33  2025-05-14T08:05:36.360248+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-05-14T08:05:37.265571+00:00 33.33.33.33  2025-05-14T08:05:36.379620+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-05-14T08:05:37.494853+00:00 33.33.33.33  2025-05-14T08:05:36.608950+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-05-14T08:05:37.557332+00:00 33.33.33.33  2025-05-14T08:05:36.671368+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.142 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.142/0.142/0.142/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-05-14T08:05:44.040189+00:00 10.215.168.64  2025-05-14T08:05:43.048077+00:00 daemon-notice osdx cfgd[1669]:  [2231]Completed change to active configuration
2025-05-14T08:05:44.082886+00:00 10.215.168.64  2025-05-14T08:05:43.076168+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-05-14T08:05:44.082886+00:00 10.215.168.64  2025-05-14T08:05:43.110416+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-05-14T08:05:44.082886+00:00 10.215.168.64  2025-05-14T08:05:43.174579+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-05-14T08:05:44.082886+00:00 10.215.168.64  2025-05-14T08:05:43.174638+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-05-14T08:05:44.112016+00:00 10.215.168.64  2025-05-14T08:05:43.254430+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-05-14T08:05:46.422814+00:00 10.215.168.64  2025-05-14T08:05:45.565115+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.188 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.188/0.188/0.188/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-05-14T08:05:53.178886+00:00 33.33.33.33  2025-05-14T08:05:52.435953+00:00 daemon-notice osdx cfgd[1669]:  [2231]Completed change to active configuration
2025-05-14T08:05:53.226904+00:00 33.33.33.33  2025-05-14T08:05:52.447757+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-05-14T08:05:53.226904+00:00 33.33.33.33  2025-05-14T08:05:52.464422+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-05-14T08:05:53.226904+00:00 33.33.33.33  2025-05-14T08:05:52.607961+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-05-14T08:05:53.226904+00:00 33.33.33.33  2025-05-14T08:05:52.677769+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-05-14T08:05:53.226904+00:00 33.33.33.33  2025-05-14T08:05:52.677825+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-05-14T08:05:53.270445+00:00 33.33.33.33  2025-05-14T08:05:52.782595+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.