Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2025-06-25 12:12:49.448605 daemon-err , modulelauncher[33896]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-06-25 12:12:49.450384 daemon-err , modulelauncher[33896]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-06-25 12:12:49.450400 daemon-err , modulelauncher[33896]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-06-25 12:12:49.452227 daemon-err , modulelauncher[33896]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-06-25 12:12:49.452249 daemon-err , modulelauncher[33896]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-06-25 12:12:56.027293 daemon-err , modulelauncher[34318]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-06-25 12:12:56.027354 daemon-err , modulelauncher[34318]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-06-25 12:12:56.029859 daemon-err , modulelauncher[34318]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-06-25 12:12:56.029904 daemon-err , modulelauncher[34318]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-06-25 12:12:56.035925 daemon-err , modulelauncher[34318]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-06-25 12:12:56.035997 daemon-err , modulelauncher[34318]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-06-25 12:12:57.549699 daemon-err , modulelauncher[34504]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-06-25 12:12:57.549725 daemon-err , modulelauncher[34504]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-06-25 12:12:57.551697 daemon-err , modulelauncher[34504]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-06-25 12:12:57.551716 daemon-err , modulelauncher[34504]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-06-25 12:12:57.553584 daemon-err , modulelauncher[34504]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-06-25 12:12:57.553607 daemon-err , modulelauncher[34504]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-06-25 12:13:53.471920 daemon-err , modulelauncher[37142]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-06-25 12:13:53.471958 daemon-err , modulelauncher[37142]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-06-25 12:13:53.474167 daemon-err , modulelauncher[37142]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-06-25 12:13:53.474186 daemon-err , modulelauncher[37142]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-06-25 12:13:59.891668 daemon-err , modulelauncher[37553]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-06-25 12:13:59.891708 daemon-err , modulelauncher[37553]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-06-25 12:13:59.894224 daemon-err , modulelauncher[37553]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-06-25 12:13:59.894257 daemon-err , modulelauncher[37553]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-06-25 12:14:01.419525 daemon-err , modulelauncher[37731]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard
2025-06-25 12:14:01.419598 daemon-err , modulelauncher[37731]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9.
2025-06-25 12:14:01.422477 daemon-err , modulelauncher[37731]:  osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged
2025-06-25 12:14:01.422513 daemon-err , modulelauncher[37731]:  Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9.
2025-06-25 12:15:44.800451 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-06-25 12:15:46.547442 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-06-25 12:15:55.748177 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-06-25 12:15:57.190595 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-06-25 12:16:05.232335 daemon-err , modulelauncher[44189]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0
2025-06-25 12:16:05.232365 daemon-err , modulelauncher[44189]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9.
2025-06-25 12:16:05.234028 daemon-err , modulelauncher[44189]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5
2025-06-25 12:16:05.234050 daemon-err , modulelauncher[44189]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9.
2025-06-25 12:16:05.237400 daemon-err , modulelauncher[44189]:  osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15
2025-06-25 12:16:05.237428 daemon-err , modulelauncher[44189]:  Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9.
2025-06-25 12:16:05.970203 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-06-25 12:16:06.558679 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-06-25 12:16:47.041514 user-err , OSDxCLI:  Unable to open config file /etc/aaa/tacacs/acct-tacgroup1: No such file or directory
2025-06-25 12:16:52.778754 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-06-25 12:16:52.838610 user-err , OSDxCLI:  TACACS+ authorization failed for [testadmin] (status=16)
2025-06-25 12:17:02.912000 user-err , OSDxCLI:  TACACS+ authorization failed for [testmonitor] (status=16)
2025-06-25 12:17:09.990096 daemon-err , cfgd[1464]:  [ interfaces ethernet eth0 alarm down ]
2025-06-25 12:17:09.990156 daemon-err , cfgd[1464]:  \"system alarm ALARM_TO_TEST\" does not exist
2025-06-25 12:17:09.990190 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:17:09.991877 daemon-err , cfgd[1464]:  [57208]Command output: [ interfaces ethernet eth0 alarm down ] \"system alarm ALARM_TO_TEST\" does not exist Commit validation failed
2025-06-25 12:18:50.223012 user-err , file_operation.py:  osdx.utils.xos cmd error: hexdump -C /opt/vyatta/etc/config/config.boot
2025-06-25 12:18:50.223089 user-err , file_operation.py:
2025-06-25 12:18:50.340671 user-err , file_operation.py:  osdx.utils.xos cmd error: hexdump -C /opt/vyatta/etc/config/.cfg_confirm_config
2025-06-25 12:18:50.340728 user-err , file_operation.py:
2025-06-25 12:19:03.352690 daemon-err , ntpd[59331]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:03.352749 daemon-err , ntpd[59331]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:03.804135 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19ukuKumK88lkZ29U5V/wafGgm/fhtl/ek=] finished with status 1
2025-06-25 12:19:03.804196 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:19:03.804217 daemon-err , cfgd[1464]:  \"U2FsdGVkX19ukuKumK88lkZ29U5V/wafGgm/fhtl/ek=\" strong-password: score is too weak
2025-06-25 12:19:03.804237 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:19:03.805762 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX19ukuKumK88lkZ29U5V/wafGgm/fhtl/ek=\" strong-password: score is too weak Commit validation failed
2025-06-25 12:19:09.290266 daemon-err , ntpd[59484]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:09.290286 daemon-err , ntpd[59484]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:09.962078 daemon-err , ntpd[59523]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:09.962120 daemon-err , ntpd[59523]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:10.558185 daemon-err , ntpd[59562]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:10.558199 daemon-err , ntpd[59562]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:11.154966 daemon-err , ntpd[59601]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:11.155127 daemon-err , ntpd[59601]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:11.765996 daemon-err , ntpd[59640]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:11.766071 daemon-err , ntpd[59640]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:12.316815 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=] finished with status 1
2025-06-25 12:19:12.316878 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:19:12.316905 daemon-err , cfgd[1464]:  \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak
2025-06-25 12:19:12.316926 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:19:12.318623 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak Commit validation failed
2025-06-25 12:19:12.969867 daemon-err , ntpd[59710]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:12.970005 daemon-err , ntpd[59710]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:13.587961 daemon-err , ntpd[59749]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:13.588080 daemon-err , ntpd[59749]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:14.201969 daemon-err , ntpd[59788]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:14.201986 daemon-err , ntpd[59788]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:14.864208 daemon-err , ntpd[59827]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:14.864345 daemon-err , ntpd[59827]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:15.481893 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=] finished with status 1
2025-06-25 12:19:15.481955 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:19:15.481988 daemon-err , cfgd[1464]:  \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak
2025-06-25 12:19:15.482013 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:19:15.483560 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak Commit validation failed
2025-06-25 12:19:16.112891 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=] finished with status 1
2025-06-25 12:19:16.112946 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:19:16.112961 daemon-err , cfgd[1464]:  \"U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=\" strong-password: score is too weak
2025-06-25 12:19:16.112977 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:19:16.114485 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=\" strong-password: score is too weak Commit validation failed
2025-06-25 12:19:16.757873 daemon-err , ntpd[59924]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:16.758057 daemon-err , ntpd[59924]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:17.382345 daemon-err , ntpd[59963]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:17.382488 daemon-err , ntpd[59963]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:17.999312 daemon-err , ntpd[60002]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:17.999333 daemon-err , ntpd[60002]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:18.533115 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=] finished with status 1
2025-06-25 12:19:18.533163 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:19:18.533180 daemon-err , cfgd[1464]:  \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak
2025-06-25 12:19:18.533195 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:19:18.534531 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak Commit validation failed
2025-06-25 12:19:19.075641 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=] finished with status 1
2025-06-25 12:19:19.075686 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:19:19.075701 daemon-err , cfgd[1464]:  \"U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=\" strong-password: score is too weak
2025-06-25 12:19:19.075719 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:19:19.076918 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=\" strong-password: score is too weak Commit validation failed
2025-06-25 12:19:19.596164 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh+Fy+i+e09Zqqxs5I1QbfNs=] finished with status 1
2025-06-25 12:19:19.596216 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:19:19.596237 daemon-err , cfgd[1464]:  \"U2FsdGVkX1+A7+xra97Sh+Fy+i+e09Zqqxs5I1QbfNs=\" strong-password: score is too weak
2025-06-25 12:19:19.596253 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:19:19.597941 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh+Fy+i+e09Zqqxs5I1QbfNs=\" strong-password: score is too weak Commit validation failed
2025-06-25 12:19:20.223683 daemon-err , ntpd[60126]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:20.223889 daemon-err , ntpd[60126]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:20.886727 daemon-err , ntpd[60165]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:20.886747 daemon-err , ntpd[60165]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:21.482771 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=] finished with status 1
2025-06-25 12:19:21.482825 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:19:21.482846 daemon-err , cfgd[1464]:  \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak
2025-06-25 12:19:21.482866 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:19:21.484555 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak Commit validation failed
2025-06-25 12:19:22.131119 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=] finished with status 1
2025-06-25 12:19:22.131183 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:19:22.131206 daemon-err , cfgd[1464]:  \"U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=\" strong-password: score is too weak
2025-06-25 12:19:22.131227 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:19:22.132859 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=\" strong-password: score is too weak Commit validation failed
2025-06-25 12:19:22.706447 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh+Fy+i+e09Zqqxs5I1QbfNs=] finished with status 1
2025-06-25 12:19:22.706497 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:19:22.706519 daemon-err , cfgd[1464]:  \"U2FsdGVkX1+A7+xra97Sh+Fy+i+e09Zqqxs5I1QbfNs=\" strong-password: score is too weak
2025-06-25 12:19:22.706534 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:19:22.707777 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh+Fy+i+e09Zqqxs5I1QbfNs=\" strong-password: score is too weak Commit validation failed
2025-06-25 12:19:23.330258 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97ShzfKJaB4dOSqos/5tHUMVbY=] finished with status 1
2025-06-25 12:19:23.330317 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:19:23.330343 daemon-err , cfgd[1464]:  \"U2FsdGVkX1+A7+xra97ShzfKJaB4dOSqos/5tHUMVbY=\" strong-password: score is too weak
2025-06-25 12:19:23.330365 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:19:23.332031 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97ShzfKJaB4dOSqos/5tHUMVbY=\" strong-password: score is too weak Commit validation failed
2025-06-25 12:19:28.184230 daemon-err , ntpd[60437]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:28.184245 daemon-err , ntpd[60437]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:34.681832 daemon-err , ntpd[60626]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:34.681855 daemon-err , ntpd[60626]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:40.585289 daemon-err , cfgd[1464]:  [59138]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-06-25 12:19:40.991831 daemon-err , cfgd[1464]:  [59138]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-06-25 12:19:42.309695 daemon-err , ntpd[60869]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:42.309759 daemon-err , ntpd[60869]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:42.973682 daemon-err , ntpd[60909]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:42.973880 daemon-err , ntpd[60909]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:43.583762 daemon-err , ntpd[60948]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:43.584267 daemon-err , ntpd[60948]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:50.383439 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18BbDlm+InJGoVCxhttsyfhPaGjYZbJjVY=] finished with status 1
2025-06-25 12:19:50.383508 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:19:50.383546 daemon-err , cfgd[1464]:  \"U2FsdGVkX18BbDlm+InJGoVCxhttsyfhPaGjYZbJjVY=\" strong-password: score is too weak
2025-06-25 12:19:50.383573 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:19:50.386521 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX18BbDlm+InJGoVCxhttsyfhPaGjYZbJjVY=\" strong-password: score is too weak Commit validation failed
2025-06-25 12:19:51.007573 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+XARobE0jtJ8IeNNg2mt35PKUqTBb01c0=] finished with status 1
2025-06-25 12:19:51.007628 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:19:51.007648 daemon-err , cfgd[1464]:  \"U2FsdGVkX1+XARobE0jtJ8IeNNg2mt35PKUqTBb01c0=\" strong-password: score is too weak
2025-06-25 12:19:51.007665 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:19:51.009319 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+XARobE0jtJ8IeNNg2mt35PKUqTBb01c0=\" strong-password: score is too weak Commit validation failed
2025-06-25 12:19:51.733332 daemon-err , ntpd[61341]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:51.733356 daemon-err , ntpd[61341]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:19:57.246831 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19vuy0MB5BdtIu/xJJFiLv85ufCcGaqNDY=] finished with status 2
2025-06-25 12:19:57.246878 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:19:57.246898 daemon-err , cfgd[1464]:  \"U2FsdGVkX19vuy0MB5BdtIu/xJJFiLv85ufCcGaqNDY=\" strong-password: not long enough
2025-06-25 12:19:57.246919 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:19:57.248349 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX19vuy0MB5BdtIu/xJJFiLv85ufCcGaqNDY=\" strong-password: not long enough Commit validation failed
2025-06-25 12:19:58.026136 daemon-err , ntpd[61521]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:19:58.026157 daemon-err , ntpd[61521]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:20:02.204651 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19vQ9Q66pJih6OL1/cqd+W+Rar3FuWjBeM=] finished with status 3
2025-06-25 12:20:02.204691 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:20:02.204707 daemon-err , cfgd[1464]:  \"U2FsdGVkX19vQ9Q66pJih6OL1/cqd+W+Rar3FuWjBeM=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2025-06-25 12:20:02.204726 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:20:02.206204 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX19vQ9Q66pJih6OL1/cqd+W+Rar3FuWjBeM=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed
2025-06-25 12:20:02.853028 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18alVGogFA0noUGFLkABiKhBrP6gVitd0Q=] finished with status 3
2025-06-25 12:20:02.853075 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:20:02.853092 daemon-err , cfgd[1464]:  \"U2FsdGVkX18alVGogFA0noUGFLkABiKhBrP6gVitd0Q=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2025-06-25 12:20:02.853112 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:20:02.854524 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX18alVGogFA0noUGFLkABiKhBrP6gVitd0Q=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed
2025-06-25 12:20:03.441865 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19XK3FvEuY1Bt5pc9qPf5Vy5mTclf7DY98=] finished with status 3
2025-06-25 12:20:03.441908 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:20:03.441937 daemon-err , cfgd[1464]:  \"U2FsdGVkX19XK3FvEuY1Bt5pc9qPf5Vy5mTclf7DY98=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2025-06-25 12:20:03.441953 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:20:03.443341 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX19XK3FvEuY1Bt5pc9qPf5Vy5mTclf7DY98=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed
2025-06-25 12:20:03.990875 daemon-err , cfgd[1464]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/Zbq3Hq4ie/sb86630/v1zLfXW14GPS5s=] finished with status 1
2025-06-25 12:20:03.990907 daemon-err , cfgd[1464]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-25 12:20:03.990922 daemon-err , cfgd[1464]:  \"U2FsdGVkX1/Zbq3Hq4ie/sb86630/v1zLfXW14GPS5s=\" strong-password: score is too weak
2025-06-25 12:20:03.990940 daemon-err , cfgd[1464]:  Commit validation failed
2025-06-25 12:20:03.992407 daemon-err , cfgd[1464]:  [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/Zbq3Hq4ie/sb86630/v1zLfXW14GPS5s=\" strong-password: score is too weak Commit validation failed
2025-06-25 12:20:04.594286 daemon-err , ntpd[61764]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-25 12:20:04.594338 daemon-err , ntpd[61764]:  AUTH: authreadkeys: added 1 keys
2025-06-25 12:20:04.942241 daemon-err , cfgd[1464]:  [59138]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-06-25 12:20:05.315714 daemon-err , cfgd[1464]:  [59138]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-06-25 12:20:05.675578 daemon-err , cfgd[1464]:  [59138]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-06-25 12:20:06.069100 daemon-err , cfgd[1464]:  [59138]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-06-25 12:20:16.031282 daemon-err , cfgd[1464]:  [59138]Command output: File name reserved Value validation failed
2025-06-25 12:20:20.013896 daemon-notice , cfgd[1464]:  [59138]Completed change to active configuration
2025-06-25 12:20:20.015529 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-06-25 12:20:20.031638 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2025-06-25 12:20:20.155483 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2025-06-25 12:20:27.000917 daemon-info , systemd[1]:  Created slice system-dhcpd.slice - Slice /system/dhcpd.
2025-06-25 12:20:27.019410 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2025-06-25 12:20:33.219830 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Regex

Description

Create a new syslog file and collect all the syslog messages matching a specified regex.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file cli_msg filter CLI app OSDxCLI
set system syslog file cli_msg filter CLI level notice
set system syslog file cli_msg filter CLI regex '(^|[^a-zA-Z0-9_])alert([^a-zA-Z0-9_]|$)'

Step 2: Run command command with alert word at DUT0 and expect this output:

Show output
Command validation failed:
CLI Error: Invalid token [command]
CLI Error: Command error

Step 3: Run command command with alerted word at DUT0 and expect this output:

Show output
Command validation failed:
CLI Error: Invalid token [command]
CLI Error: Command error

Step 4: Run command file show running://log/user/cli_msg/cli_msg | cat at DUT0 and expect this output:

Show output
2025-06-25 12:20:39.553310 auth-notice , OSDxCLI:  User 'admin' entered an invalid command: 'command with alert word'.

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.171 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.171/0.171/0.171/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-25T12:20:45.159233+00:00 10.215.168.64  2025-06-25T12:20:44.384712+00:00 daemon-notice osdx cfgd[1464]:  [59138]Completed change to active configuration
2025-06-25T12:20:45.170815+00:00 10.215.168.64  2025-06-25T12:20:44.396549+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-25T12:20:45.208588+00:00 10.215.168.64  2025-06-25T12:20:44.434349+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-25T12:20:45.357230+00:00 10.215.168.64  2025-06-25T12:20:44.582903+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-06-25T12:20:45.417045+00:00 10.215.168.64  2025-06-25T12:20:44.642734+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.159 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.159/0.159/0.159/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-25T12:20:45.846607+00:00 10.215.168.64  2025-06-25T12:20:45.072253+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-06-25T12:20:45.888707+00:00 10.215.168.64  2025-06-25T12:20:45.114433+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-06-25T12:20:45.892665+00:00 10.215.168.64  2025-06-25T12:20:45.118450+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-06-25T12:20:46.061801+00:00 10.215.168.64  2025-06-25T12:20:45.287552+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-06-25T12:20:46.077209+00:00 10.215.168.64  2025-06-25T12:20:45.302841+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-06-25T12:20:46.949244+00:00 10.215.168.64  2025-06-25T12:20:46.174908+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-06-25T12:20:47.060829+00:00 10.215.168.64  2025-06-25T12:20:46.286515+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-06-25T12:20:47.135531+00:00 10.215.168.64  2025-06-25T12:20:46.361251+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-06-25T12:20:47.231824+00:00 10.215.168.64  2025-06-25T12:20:46.455583+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-06-25T12:20:47.291584+00:00 10.215.168.64  2025-06-25T12:20:46.517248+00:00 daemon-info osdx ubnt-cfgd[63427]:  inactive
2025-06-25T12:20:50.997180+00:00 10.215.168.64  2025-06-25T12:20:50.857587+00:00 daemon-notice osdx cfgd[1464]:  [59138]Completed change to active configuration
2025-06-25T12:20:51.009392+00:00 10.215.168.64  2025-06-25T12:20:50.869543+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-25T12:20:51.027986+00:00 10.215.168.64  2025-06-25T12:20:50.888655+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-25T12:20:51.199467+00:00 10.215.168.64  2025-06-25T12:20:51.060084+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-06-25T12:20:51.259505+00:00 10.215.168.64  2025-06-25T12:20:51.120103+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.162 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.162/0.162/0.162/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-25T12:20:51.701362+00:00 10.215.168.64  2025-06-25T12:20:51.561958+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-06-25T12:20:51.795564+00:00 10.215.168.64  2025-06-25T12:20:51.656191+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-06-25T12:20:51.800910+00:00 10.215.168.64  2025-06-25T12:20:51.661577+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-06-25T12:20:51.968155+00:00 10.215.168.64  2025-06-25T12:20:51.828781+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-06-25T12:20:51.985668+00:00 10.215.168.64  2025-06-25T12:20:51.846273+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-06-25T12:20:52.822980+00:00 10.215.168.64  2025-06-25T12:20:52.683545+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-06-25T12:20:52.930898+00:00 10.215.168.64  2025-06-25T12:20:52.791455+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-06-25T12:20:53.025540+00:00 10.215.168.64  2025-06-25T12:20:52.886086+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-06-25T12:20:53.135146+00:00 10.215.168.64  2025-06-25T12:20:52.995690+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-06-25T12:20:53.210614+00:00 10.215.168.64  2025-06-25T12:20:53.071176+00:00 daemon-info osdx ubnt-cfgd[63760]:  inactive
2025-06-25T12:20:56.807938+00:00 10.215.168.64  2025-06-25T12:20:56.502422+00:00 daemon-notice osdx cfgd[1464]:  [59138]Completed change to active configuration
2025-06-25T12:20:56.819392+00:00 10.215.168.64  2025-06-25T12:20:56.513450+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-25T12:20:56.836991+00:00 10.215.168.64  2025-06-25T12:20:56.531655+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-25T12:20:56.988524+00:00 10.215.168.64  2025-06-25T12:20:56.683200+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-06-25T12:20:57.046184+00:00 10.215.168.64  2025-06-25T12:20:56.740859+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.174 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.174/0.174/0.174/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-25T12:21:02.416298+00:00 33.33.33.33  2025-06-25T12:21:01.702171+00:00 daemon-notice osdx cfgd[1464]:  [59138]Completed change to active configuration
2025-06-25T12:21:02.428001+00:00 33.33.33.33  2025-06-25T12:21:01.713343+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-25T12:21:02.458022+00:00 33.33.33.33  2025-06-25T12:21:01.744100+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-25T12:21:02.568642+00:00 33.33.33.33  2025-06-25T12:21:01.854711+00:00 authpriv-warning osdx CRON[64362]:  pam_limits(cron:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-06-25T12:21:02.601410+00:00 33.33.33.33  2025-06-25T12:21:01.887407+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-06-25T12:21:02.667299+00:00 33.33.33.33  2025-06-25T12:21:01.953383+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.139 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.139/0.139/0.139/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-25T12:21:03.150439+00:00 33.33.33.33  2025-06-25T12:21:02.429623+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-06-25T12:21:03.199500+00:00 33.33.33.33  2025-06-25T12:21:02.485571+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-06-25T12:21:03.204297+00:00 33.33.33.33  2025-06-25T12:21:02.490427+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-06-25T12:21:03.401215+00:00 33.33.33.33  2025-06-25T12:21:02.687257+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-06-25T12:21:03.418524+00:00 33.33.33.33  2025-06-25T12:21:02.704502+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-06-25T12:21:04.324919+00:00 33.33.33.33  2025-06-25T12:21:03.610978+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-06-25T12:21:04.382763+00:00 33.33.33.33  2025-06-25T12:21:03.668649+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-06-25T12:21:04.515348+00:00 33.33.33.33  2025-06-25T12:21:03.801377+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-06-25T12:21:04.580113+00:00 33.33.33.33  2025-06-25T12:21:03.864844+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-06-25T12:21:04.691288+00:00 33.33.33.33  2025-06-25T12:21:03.977324+00:00 daemon-info osdx ubnt-cfgd[64421]:  inactive
2025-06-25T12:21:08.404412+00:00 33.33.33.33  2025-06-25T12:21:07.844406+00:00 daemon-notice osdx cfgd[1464]:  [59138]Completed change to active configuration
2025-06-25T12:21:08.404412+00:00 33.33.33.33  2025-06-25T12:21:07.844540+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2025-06-25T12:21:08.418532+00:00 33.33.33.33  2025-06-25T12:21:07.858741+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-25T12:21:08.449390+00:00 33.33.33.33  2025-06-25T12:21:07.889592+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-25T12:21:08.680590+00:00 33.33.33.33  2025-06-25T12:21:08.120797+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-06-25T12:21:08.739248+00:00 33.33.33.33  2025-06-25T12:21:08.179423+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.130 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.130/0.130/0.130/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-25T12:21:14.457541+00:00 10.215.168.64  2025-06-25T12:21:13.578189+00:00 daemon-notice osdx cfgd[1464]:  [59138]Completed change to active configuration
2025-06-25T12:21:14.503458+00:00 10.215.168.64  2025-06-25T12:21:13.589896+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-25T12:21:14.503458+00:00 10.215.168.64  2025-06-25T12:21:13.616017+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-25T12:21:14.503458+00:00 10.215.168.64  2025-06-25T12:21:13.683041+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-06-25T12:21:14.503458+00:00 10.215.168.64  2025-06-25T12:21:13.683097+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-06-25T12:21:14.539199+00:00 10.215.168.64  2025-06-25T12:21:13.772899+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-06-25T12:21:14.718057+00:00 10.215.168.64  2025-06-25T12:21:13.951681+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.120 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.120/0.120/0.120/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-25T12:21:20.773982+00:00 33.33.33.33  2025-06-25T12:21:19.830131+00:00 daemon-notice osdx cfgd[1464]:  [59138]Completed change to active configuration
2025-06-25T12:21:20.815538+00:00 33.33.33.33  2025-06-25T12:21:19.844459+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-25T12:21:20.815538+00:00 33.33.33.33  2025-06-25T12:21:19.870711+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-25T12:21:20.815538+00:00 33.33.33.33  2025-06-25T12:21:20.031224+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-06-25T12:21:20.815538+00:00 33.33.33.33  2025-06-25T12:21:20.223330+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-06-25T12:21:20.815538+00:00 33.33.33.33  2025-06-25T12:21:20.223446+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-06-25T12:21:22.892916+00:00 33.33.33.33  2025-06-25T12:21:22.350212+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.