Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2025-06-25 12:12:49.448605 daemon-err , modulelauncher[33896]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-06-25 12:12:49.450384 daemon-err , modulelauncher[33896]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-06-25 12:12:49.450400 daemon-err , modulelauncher[33896]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-06-25 12:12:49.452227 daemon-err , modulelauncher[33896]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-06-25 12:12:49.452249 daemon-err , modulelauncher[33896]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-06-25 12:12:56.027293 daemon-err , modulelauncher[34318]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-06-25 12:12:56.027354 daemon-err , modulelauncher[34318]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-06-25 12:12:56.029859 daemon-err , modulelauncher[34318]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-06-25 12:12:56.029904 daemon-err , modulelauncher[34318]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-06-25 12:12:56.035925 daemon-err , modulelauncher[34318]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-06-25 12:12:56.035997 daemon-err , modulelauncher[34318]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-06-25 12:12:57.549699 daemon-err , modulelauncher[34504]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-06-25 12:12:57.549725 daemon-err , modulelauncher[34504]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-06-25 12:12:57.551697 daemon-err , modulelauncher[34504]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-06-25 12:12:57.551716 daemon-err , modulelauncher[34504]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-06-25 12:12:57.553584 daemon-err , modulelauncher[34504]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-06-25 12:12:57.553607 daemon-err , modulelauncher[34504]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-06-25 12:13:53.471920 daemon-err , modulelauncher[37142]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-06-25 12:13:53.471958 daemon-err , modulelauncher[37142]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-06-25 12:13:53.474167 daemon-err , modulelauncher[37142]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-06-25 12:13:53.474186 daemon-err , modulelauncher[37142]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-06-25 12:13:59.891668 daemon-err , modulelauncher[37553]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-06-25 12:13:59.891708 daemon-err , modulelauncher[37553]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-06-25 12:13:59.894224 daemon-err , modulelauncher[37553]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-06-25 12:13:59.894257 daemon-err , modulelauncher[37553]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-06-25 12:14:01.419525 daemon-err , modulelauncher[37731]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard 2025-06-25 12:14:01.419598 daemon-err , modulelauncher[37731]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusstandard' returned non-zero exit status 9. 2025-06-25 12:14:01.422477 daemon-err , modulelauncher[37731]: osdx.utils.xos cmd error: useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged 2025-06-25 12:14:01.422513 daemon-err , modulelauncher[37731]: Command 'useradd -s '/sbin/radius_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' radiusprivileged' returned non-zero exit status 9. 2025-06-25 12:15:44.800451 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2025-06-25 12:15:46.547442 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2025-06-25 12:15:55.748177 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2025-06-25 12:15:57.190595 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2025-06-25 12:16:05.232335 daemon-err , modulelauncher[44189]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0 2025-06-25 12:16:05.232365 daemon-err , modulelauncher[44189]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_monitor' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs0' returned non-zero exit status 9. 2025-06-25 12:16:05.234028 daemon-err , modulelauncher[44189]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5 2025-06-25 12:16:05.234050 daemon-err , modulelauncher[44189]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_operator' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs5' returned non-zero exit status 9. 2025-06-25 12:16:05.237400 daemon-err , modulelauncher[44189]: osdx.utils.xos cmd error: useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15 2025-06-25 12:16:05.237428 daemon-err , modulelauncher[44189]: Command 'useradd -s '/sbin/tacacs_shell' -m -N -g 'cfg_admin' -G 'frrvty,frr,osdxcfg,sudo,adm,dip,disk,users' tacacs15' returned non-zero exit status 9. 2025-06-25 12:16:05.970203 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2025-06-25 12:16:06.558679 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2025-06-25 12:16:47.041514 user-err , OSDxCLI: Unable to open config file /etc/aaa/tacacs/acct-tacgroup1: No such file or directory 2025-06-25 12:16:52.778754 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2025-06-25 12:16:52.838610 user-err , OSDxCLI: TACACS+ authorization failed for [testadmin] (status=16) 2025-06-25 12:17:02.912000 user-err , OSDxCLI: TACACS+ authorization failed for [testmonitor] (status=16) 2025-06-25 12:17:09.990096 daemon-err , cfgd[1464]: [ interfaces ethernet eth0 alarm down ] 2025-06-25 12:17:09.990156 daemon-err , cfgd[1464]: \"system alarm ALARM_TO_TEST\" does not exist 2025-06-25 12:17:09.990190 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:17:09.991877 daemon-err , cfgd[1464]: [57208]Command output: [ interfaces ethernet eth0 alarm down ] \"system alarm ALARM_TO_TEST\" does not exist Commit validation failed 2025-06-25 12:18:50.223012 user-err , file_operation.py: osdx.utils.xos cmd error: hexdump -C /opt/vyatta/etc/config/config.boot 2025-06-25 12:18:50.223089 user-err , file_operation.py: 2025-06-25 12:18:50.340671 user-err , file_operation.py: osdx.utils.xos cmd error: hexdump -C /opt/vyatta/etc/config/.cfg_confirm_config 2025-06-25 12:18:50.340728 user-err , file_operation.py: 2025-06-25 12:19:03.352690 daemon-err , ntpd[59331]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:03.352749 daemon-err , ntpd[59331]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:03.804135 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19ukuKumK88lkZ29U5V/wafGgm/fhtl/ek=] finished with status 1 2025-06-25 12:19:03.804196 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:19:03.804217 daemon-err , cfgd[1464]: \"U2FsdGVkX19ukuKumK88lkZ29U5V/wafGgm/fhtl/ek=\" strong-password: score is too weak 2025-06-25 12:19:03.804237 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:19:03.805762 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX19ukuKumK88lkZ29U5V/wafGgm/fhtl/ek=\" strong-password: score is too weak Commit validation failed 2025-06-25 12:19:09.290266 daemon-err , ntpd[59484]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:09.290286 daemon-err , ntpd[59484]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:09.962078 daemon-err , ntpd[59523]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:09.962120 daemon-err , ntpd[59523]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:10.558185 daemon-err , ntpd[59562]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:10.558199 daemon-err , ntpd[59562]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:11.154966 daemon-err , ntpd[59601]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:11.155127 daemon-err , ntpd[59601]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:11.765996 daemon-err , ntpd[59640]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:11.766071 daemon-err , ntpd[59640]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:12.316815 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=] finished with status 1 2025-06-25 12:19:12.316878 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:19:12.316905 daemon-err , cfgd[1464]: \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak 2025-06-25 12:19:12.316926 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:19:12.318623 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak Commit validation failed 2025-06-25 12:19:12.969867 daemon-err , ntpd[59710]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:12.970005 daemon-err , ntpd[59710]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:13.587961 daemon-err , ntpd[59749]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:13.588080 daemon-err , ntpd[59749]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:14.201969 daemon-err , ntpd[59788]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:14.201986 daemon-err , ntpd[59788]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:14.864208 daemon-err , ntpd[59827]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:14.864345 daemon-err , ntpd[59827]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:15.481893 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=] finished with status 1 2025-06-25 12:19:15.481955 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:19:15.481988 daemon-err , cfgd[1464]: \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak 2025-06-25 12:19:15.482013 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:19:15.483560 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak Commit validation failed 2025-06-25 12:19:16.112891 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=] finished with status 1 2025-06-25 12:19:16.112946 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:19:16.112961 daemon-err , cfgd[1464]: \"U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=\" strong-password: score is too weak 2025-06-25 12:19:16.112977 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:19:16.114485 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=\" strong-password: score is too weak Commit validation failed 2025-06-25 12:19:16.757873 daemon-err , ntpd[59924]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:16.758057 daemon-err , ntpd[59924]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:17.382345 daemon-err , ntpd[59963]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:17.382488 daemon-err , ntpd[59963]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:17.999312 daemon-err , ntpd[60002]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:17.999333 daemon-err , ntpd[60002]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:18.533115 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=] finished with status 1 2025-06-25 12:19:18.533163 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:19:18.533180 daemon-err , cfgd[1464]: \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak 2025-06-25 12:19:18.533195 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:19:18.534531 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak Commit validation failed 2025-06-25 12:19:19.075641 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=] finished with status 1 2025-06-25 12:19:19.075686 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:19:19.075701 daemon-err , cfgd[1464]: \"U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=\" strong-password: score is too weak 2025-06-25 12:19:19.075719 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:19:19.076918 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=\" strong-password: score is too weak Commit validation failed 2025-06-25 12:19:19.596164 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh+Fy+i+e09Zqqxs5I1QbfNs=] finished with status 1 2025-06-25 12:19:19.596216 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:19:19.596237 daemon-err , cfgd[1464]: \"U2FsdGVkX1+A7+xra97Sh+Fy+i+e09Zqqxs5I1QbfNs=\" strong-password: score is too weak 2025-06-25 12:19:19.596253 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:19:19.597941 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh+Fy+i+e09Zqqxs5I1QbfNs=\" strong-password: score is too weak Commit validation failed 2025-06-25 12:19:20.223683 daemon-err , ntpd[60126]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:20.223889 daemon-err , ntpd[60126]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:20.886727 daemon-err , ntpd[60165]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:20.886747 daemon-err , ntpd[60165]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:21.482771 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=] finished with status 1 2025-06-25 12:19:21.482825 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:19:21.482846 daemon-err , cfgd[1464]: \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak 2025-06-25 12:19:21.482866 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:19:21.484555 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh/HzmuSXrYQy2Hn6kI2nJLM=\" strong-password: score is too weak Commit validation failed 2025-06-25 12:19:22.131119 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=] finished with status 1 2025-06-25 12:19:22.131183 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:19:22.131206 daemon-err , cfgd[1464]: \"U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=\" strong-password: score is too weak 2025-06-25 12:19:22.131227 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:19:22.132859 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh1IUiEg/DX0uc0TCmj+BpQU=\" strong-password: score is too weak Commit validation failed 2025-06-25 12:19:22.706447 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97Sh+Fy+i+e09Zqqxs5I1QbfNs=] finished with status 1 2025-06-25 12:19:22.706497 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:19:22.706519 daemon-err , cfgd[1464]: \"U2FsdGVkX1+A7+xra97Sh+Fy+i+e09Zqqxs5I1QbfNs=\" strong-password: score is too weak 2025-06-25 12:19:22.706534 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:19:22.707777 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97Sh+Fy+i+e09Zqqxs5I1QbfNs=\" strong-password: score is too weak Commit validation failed 2025-06-25 12:19:23.330258 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+A7+xra97ShzfKJaB4dOSqos/5tHUMVbY=] finished with status 1 2025-06-25 12:19:23.330317 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:19:23.330343 daemon-err , cfgd[1464]: \"U2FsdGVkX1+A7+xra97ShzfKJaB4dOSqos/5tHUMVbY=\" strong-password: score is too weak 2025-06-25 12:19:23.330365 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:19:23.332031 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+A7+xra97ShzfKJaB4dOSqos/5tHUMVbY=\" strong-password: score is too weak Commit validation failed 2025-06-25 12:19:28.184230 daemon-err , ntpd[60437]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:28.184245 daemon-err , ntpd[60437]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:34.681832 daemon-err , ntpd[60626]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:34.681855 daemon-err , ntpd[60626]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:40.585289 daemon-err , cfgd[1464]: [59138]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-06-25 12:19:40.991831 daemon-err , cfgd[1464]: [59138]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-06-25 12:19:42.309695 daemon-err , ntpd[60869]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:42.309759 daemon-err , ntpd[60869]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:42.973682 daemon-err , ntpd[60909]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:42.973880 daemon-err , ntpd[60909]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:43.583762 daemon-err , ntpd[60948]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:43.584267 daemon-err , ntpd[60948]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:50.383439 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18BbDlm+InJGoVCxhttsyfhPaGjYZbJjVY=] finished with status 1 2025-06-25 12:19:50.383508 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:19:50.383546 daemon-err , cfgd[1464]: \"U2FsdGVkX18BbDlm+InJGoVCxhttsyfhPaGjYZbJjVY=\" strong-password: score is too weak 2025-06-25 12:19:50.383573 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:19:50.386521 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX18BbDlm+InJGoVCxhttsyfhPaGjYZbJjVY=\" strong-password: score is too weak Commit validation failed 2025-06-25 12:19:51.007573 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+XARobE0jtJ8IeNNg2mt35PKUqTBb01c0=] finished with status 1 2025-06-25 12:19:51.007628 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:19:51.007648 daemon-err , cfgd[1464]: \"U2FsdGVkX1+XARobE0jtJ8IeNNg2mt35PKUqTBb01c0=\" strong-password: score is too weak 2025-06-25 12:19:51.007665 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:19:51.009319 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+XARobE0jtJ8IeNNg2mt35PKUqTBb01c0=\" strong-password: score is too weak Commit validation failed 2025-06-25 12:19:51.733332 daemon-err , ntpd[61341]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:51.733356 daemon-err , ntpd[61341]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:19:57.246831 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19vuy0MB5BdtIu/xJJFiLv85ufCcGaqNDY=] finished with status 2 2025-06-25 12:19:57.246878 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:19:57.246898 daemon-err , cfgd[1464]: \"U2FsdGVkX19vuy0MB5BdtIu/xJJFiLv85ufCcGaqNDY=\" strong-password: not long enough 2025-06-25 12:19:57.246919 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:19:57.248349 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX19vuy0MB5BdtIu/xJJFiLv85ufCcGaqNDY=\" strong-password: not long enough Commit validation failed 2025-06-25 12:19:58.026136 daemon-err , ntpd[61521]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:19:58.026157 daemon-err , ntpd[61521]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:20:02.204651 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19vQ9Q66pJih6OL1/cqd+W+Rar3FuWjBeM=] finished with status 3 2025-06-25 12:20:02.204691 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:20:02.204707 daemon-err , cfgd[1464]: \"U2FsdGVkX19vQ9Q66pJih6OL1/cqd+W+Rar3FuWjBeM=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2025-06-25 12:20:02.204726 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:20:02.206204 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX19vQ9Q66pJih6OL1/cqd+W+Rar3FuWjBeM=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed 2025-06-25 12:20:02.853028 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18alVGogFA0noUGFLkABiKhBrP6gVitd0Q=] finished with status 3 2025-06-25 12:20:02.853075 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:20:02.853092 daemon-err , cfgd[1464]: \"U2FsdGVkX18alVGogFA0noUGFLkABiKhBrP6gVitd0Q=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2025-06-25 12:20:02.853112 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:20:02.854524 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX18alVGogFA0noUGFLkABiKhBrP6gVitd0Q=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed 2025-06-25 12:20:03.441865 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19XK3FvEuY1Bt5pc9qPf5Vy5mTclf7DY98=] finished with status 3 2025-06-25 12:20:03.441908 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:20:03.441937 daemon-err , cfgd[1464]: \"U2FsdGVkX19XK3FvEuY1Bt5pc9qPf5Vy5mTclf7DY98=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters 2025-06-25 12:20:03.441953 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:20:03.443341 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX19XK3FvEuY1Bt5pc9qPf5Vy5mTclf7DY98=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed 2025-06-25 12:20:03.990875 daemon-err , cfgd[1464]: External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/Zbq3Hq4ie/sb86630/v1zLfXW14GPS5s=] finished with status 1 2025-06-25 12:20:03.990907 daemon-err , cfgd[1464]: [ system ntp authentication-key 1 encrypted-key ] 2025-06-25 12:20:03.990922 daemon-err , cfgd[1464]: \"U2FsdGVkX1/Zbq3Hq4ie/sb86630/v1zLfXW14GPS5s=\" strong-password: score is too weak 2025-06-25 12:20:03.990940 daemon-err , cfgd[1464]: Commit validation failed 2025-06-25 12:20:03.992407 daemon-err , cfgd[1464]: [59138]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/Zbq3Hq4ie/sb86630/v1zLfXW14GPS5s=\" strong-password: score is too weak Commit validation failed 2025-06-25 12:20:04.594286 daemon-err , ntpd[61764]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-06-25 12:20:04.594338 daemon-err , ntpd[61764]: AUTH: authreadkeys: added 1 keys 2025-06-25 12:20:04.942241 daemon-err , cfgd[1464]: [59138]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-06-25 12:20:05.315714 daemon-err , cfgd[1464]: [59138]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-06-25 12:20:05.675578 daemon-err , cfgd[1464]: [59138]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-06-25 12:20:06.069100 daemon-err , cfgd[1464]: [59138]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed 2025-06-25 12:20:16.031282 daemon-err , cfgd[1464]: [59138]Command output: File name reserved Value validation failed 2025-06-25 12:20:20.013896 daemon-notice , cfgd[1464]: [59138]Completed change to active configuration 2025-06-25 12:20:20.015529 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2025-06-25 12:20:20.031638 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2025-06-25 12:20:20.155483 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.Show output
2025-06-25 12:20:27.000917 daemon-info , systemd[1]: Created slice system-dhcpd.slice - Slice /system/dhcpd. 2025-06-25 12:20:27.019410 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
Started.*"DHCP Server Service instance main"\.Show output
2025-06-25 12:20:33.219830 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog Regex
Description
Create a new syslog file and collect all the syslog messages matching a specified regex.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file cli_msg filter CLI app OSDxCLI set system syslog file cli_msg filter CLI level notice set system syslog file cli_msg filter CLI regex '(^|[^a-zA-Z0-9_])alert([^a-zA-Z0-9_]|$)'
Step 2: Run command command with alert word
at DUT0
and expect this output:
Show output
Command validation failed: CLI Error: Invalid token [command] CLI Error: Command error
Step 3: Run command command with alerted word
at DUT0
and expect this output:
Show output
Command validation failed: CLI Error: Invalid token [command] CLI Error: Command error
Step 4: Run command file show running://log/user/cli_msg/cli_msg | cat
at DUT0
and expect this output:
Show output
2025-06-25 12:20:39.553310 auth-notice , OSDxCLI: User 'admin' entered an invalid command: 'command with alert word'.
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.171 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.171/0.171/0.171/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-06-25T12:20:45.159233+00:00 10.215.168.64 2025-06-25T12:20:44.384712+00:00 daemon-notice osdx cfgd[1464]: [59138]Completed change to active configuration 2025-06-25T12:20:45.170815+00:00 10.215.168.64 2025-06-25T12:20:44.396549+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-06-25T12:20:45.208588+00:00 10.215.168.64 2025-06-25T12:20:44.434349+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-06-25T12:20:45.357230+00:00 10.215.168.64 2025-06-25T12:20:44.582903+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-06-25T12:20:45.417045+00:00 10.215.168.64 2025-06-25T12:20:44.642734+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.159 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.159/0.159/0.159/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-06-25T12:20:45.846607+00:00 10.215.168.64 2025-06-25T12:20:45.072253+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-06-25T12:20:45.888707+00:00 10.215.168.64 2025-06-25T12:20:45.114433+00:00 authpriv-warning osdx sudo: pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped 2025-06-25T12:20:45.892665+00:00 10.215.168.64 2025-06-25T12:20:45.118450+00:00 authpriv-warning osdx sudo: pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped 2025-06-25T12:20:46.061801+00:00 10.215.168.64 2025-06-25T12:20:45.287552+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-06-25T12:20:46.077209+00:00 10.215.168.64 2025-06-25T12:20:45.302841+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-06-25T12:20:46.949244+00:00 10.215.168.64 2025-06-25T12:20:46.174908+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-06-25T12:20:47.060829+00:00 10.215.168.64 2025-06-25T12:20:46.286515+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-06-25T12:20:47.135531+00:00 10.215.168.64 2025-06-25T12:20:46.361251+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-06-25T12:20:47.231824+00:00 10.215.168.64 2025-06-25T12:20:46.455583+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-06-25T12:20:47.291584+00:00 10.215.168.64 2025-06-25T12:20:46.517248+00:00 daemon-info osdx ubnt-cfgd[63427]: inactive 2025-06-25T12:20:50.997180+00:00 10.215.168.64 2025-06-25T12:20:50.857587+00:00 daemon-notice osdx cfgd[1464]: [59138]Completed change to active configuration 2025-06-25T12:20:51.009392+00:00 10.215.168.64 2025-06-25T12:20:50.869543+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-06-25T12:20:51.027986+00:00 10.215.168.64 2025-06-25T12:20:50.888655+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-06-25T12:20:51.199467+00:00 10.215.168.64 2025-06-25T12:20:51.060084+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-06-25T12:20:51.259505+00:00 10.215.168.64 2025-06-25T12:20:51.120103+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-interface eth0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.162 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.162/0.162/0.162/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-06-25T12:20:51.701362+00:00 10.215.168.64 2025-06-25T12:20:51.561958+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-06-25T12:20:51.795564+00:00 10.215.168.64 2025-06-25T12:20:51.656191+00:00 authpriv-warning osdx sudo: pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped 2025-06-25T12:20:51.800910+00:00 10.215.168.64 2025-06-25T12:20:51.661577+00:00 authpriv-warning osdx sudo: pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped 2025-06-25T12:20:51.968155+00:00 10.215.168.64 2025-06-25T12:20:51.828781+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-06-25T12:20:51.985668+00:00 10.215.168.64 2025-06-25T12:20:51.846273+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-06-25T12:20:52.822980+00:00 10.215.168.64 2025-06-25T12:20:52.683545+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-06-25T12:20:52.930898+00:00 10.215.168.64 2025-06-25T12:20:52.791455+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-06-25T12:20:53.025540+00:00 10.215.168.64 2025-06-25T12:20:52.886086+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-06-25T12:20:53.135146+00:00 10.215.168.64 2025-06-25T12:20:52.995690+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-06-25T12:20:53.210614+00:00 10.215.168.64 2025-06-25T12:20:53.071176+00:00 daemon-info osdx ubnt-cfgd[63760]: inactive 2025-06-25T12:20:56.807938+00:00 10.215.168.64 2025-06-25T12:20:56.502422+00:00 daemon-notice osdx cfgd[1464]: [59138]Completed change to active configuration 2025-06-25T12:20:56.819392+00:00 10.215.168.64 2025-06-25T12:20:56.513450+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-06-25T12:20:56.836991+00:00 10.215.168.64 2025-06-25T12:20:56.531655+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-06-25T12:20:56.988524+00:00 10.215.168.64 2025-06-25T12:20:56.683200+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-06-25T12:20:57.046184+00:00 10.215.168.64 2025-06-25T12:20:56.740859+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and UDP
Description
Add a remote host to send syslog messages through a specific local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.174 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.174/0.174/0.174/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-06-25T12:21:02.416298+00:00 33.33.33.33 2025-06-25T12:21:01.702171+00:00 daemon-notice osdx cfgd[1464]: [59138]Completed change to active configuration 2025-06-25T12:21:02.428001+00:00 33.33.33.33 2025-06-25T12:21:01.713343+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-06-25T12:21:02.458022+00:00 33.33.33.33 2025-06-25T12:21:01.744100+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-06-25T12:21:02.568642+00:00 33.33.33.33 2025-06-25T12:21:01.854711+00:00 authpriv-warning osdx CRON[64362]: pam_limits(cron:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped 2025-06-25T12:21:02.601410+00:00 33.33.33.33 2025-06-25T12:21:01.887407+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-06-25T12:21:02.667299+00:00 33.33.33.33 2025-06-25T12:21:01.953383+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and VRF
Description
Add a remote host to send syslog messages through a VRF and a local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.139 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.139/0.139/0.139/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-06-25T12:21:03.150439+00:00 33.33.33.33 2025-06-25T12:21:02.429623+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-06-25T12:21:03.199500+00:00 33.33.33.33 2025-06-25T12:21:02.485571+00:00 authpriv-warning osdx sudo: pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped 2025-06-25T12:21:03.204297+00:00 33.33.33.33 2025-06-25T12:21:02.490427+00:00 authpriv-warning osdx sudo: pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped 2025-06-25T12:21:03.401215+00:00 33.33.33.33 2025-06-25T12:21:02.687257+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-06-25T12:21:03.418524+00:00 33.33.33.33 2025-06-25T12:21:02.704502+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-06-25T12:21:04.324919+00:00 33.33.33.33 2025-06-25T12:21:03.610978+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-06-25T12:21:04.382763+00:00 33.33.33.33 2025-06-25T12:21:03.668649+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-06-25T12:21:04.515348+00:00 33.33.33.33 2025-06-25T12:21:03.801377+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-06-25T12:21:04.580113+00:00 33.33.33.33 2025-06-25T12:21:03.864844+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-06-25T12:21:04.691288+00:00 33.33.33.33 2025-06-25T12:21:03.977324+00:00 daemon-info osdx ubnt-cfgd[64421]: inactive 2025-06-25T12:21:08.404412+00:00 33.33.33.33 2025-06-25T12:21:07.844406+00:00 daemon-notice osdx cfgd[1464]: [59138]Completed change to active configuration 2025-06-25T12:21:08.404412+00:00 33.33.33.33 2025-06-25T12:21:07.844540+00:00 syslog-warning osdx rsyslogd: bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ] 2025-06-25T12:21:08.418532+00:00 33.33.33.33 2025-06-25T12:21:07.858741+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-06-25T12:21:08.449390+00:00 33.33.33.33 2025-06-25T12:21:07.889592+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-06-25T12:21:08.680590+00:00 33.33.33.33 2025-06-25T12:21:08.120797+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-06-25T12:21:08.739248+00:00 33.33.33.33 2025-06-25T12:21:08.179423+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.130 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.130/0.130/0.130/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-06-25T12:21:14.457541+00:00 10.215.168.64 2025-06-25T12:21:13.578189+00:00 daemon-notice osdx cfgd[1464]: [59138]Completed change to active configuration 2025-06-25T12:21:14.503458+00:00 10.215.168.64 2025-06-25T12:21:13.589896+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-06-25T12:21:14.503458+00:00 10.215.168.64 2025-06-25T12:21:13.616017+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-06-25T12:21:14.503458+00:00 10.215.168.64 2025-06-25T12:21:13.683041+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-06-25T12:21:14.503458+00:00 10.215.168.64 2025-06-25T12:21:13.683097+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-06-25T12:21:14.539199+00:00 10.215.168.64 2025-06-25T12:21:13.772899+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-06-25T12:21:14.718057+00:00 10.215.168.64 2025-06-25T12:21:13.951681+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Local Address Single TLS
Description
Add a secured remote host to send syslog messages and show the host name from a fiven local-address
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.120 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.120/0.120/0.120/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-06-25T12:21:20.773982+00:00 33.33.33.33 2025-06-25T12:21:19.830131+00:00 daemon-notice osdx cfgd[1464]: [59138]Completed change to active configuration 2025-06-25T12:21:20.815538+00:00 33.33.33.33 2025-06-25T12:21:19.844459+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-06-25T12:21:20.815538+00:00 33.33.33.33 2025-06-25T12:21:19.870711+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-06-25T12:21:20.815538+00:00 33.33.33.33 2025-06-25T12:21:20.031224+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-06-25T12:21:20.815538+00:00 33.33.33.33 2025-06-25T12:21:20.223330+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-06-25T12:21:20.815538+00:00 33.33.33.33 2025-06-25T12:21:20.223446+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-06-25T12:21:22.892916+00:00 33.33.33.33 2025-06-25T12:21:22.350212+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.