Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2025-08-20 13:17:23.180345 daemon-err , cfgd[1656]:  [87415]Command output: Password does not meet the criteria for secure mode. The criteria are: Must include uppercase, lowercase, numbers, one of these special characters '!, @, #, $, %, ^, &, *, (, )' and must be at least 12 characters long. Value validation failed
2025-08-20 13:17:24.807725 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:17:35.484703 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:17:40.128812 syslog-err , rsyslogd:  not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0]
2025-08-20 13:17:40.128946 syslog-err , rsyslogd:  invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Tue Jul 15 11:17:22 2025 to Fri Jul 13 11:17:22 2035; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA;  [v8.2302.0]
2025-08-20 13:17:40.346378 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:17:40.811735 syslog-err , rsyslogd:  not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0]
2025-08-20 13:17:40.811847 syslog-err , rsyslogd:  invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Tue Jul 15 11:17:22 2025 to Fri Jul 13 11:17:22 2035; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA;  [v8.2302.0]
2025-08-20 13:17:40.956764 syslog-err , rsyslogd:  not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0]
2025-08-20 13:17:40.956887 syslog-err , rsyslogd:  invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Tue Jul 15 11:17:22 2025 to Fri Jul 13 11:17:22 2035; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA;  [v8.2302.0]
2025-08-20 13:17:41.316172 syslog-err , rsyslogd:  not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0]
2025-08-20 13:17:41.316287 syslog-err , rsyslogd:  invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Tue Jul 15 11:17:22 2025 to Fri Jul 13 11:17:22 2035; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA;  [v8.2302.0]
2025-08-20 13:17:47.554744 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:17:49.150035 daemon-err , cfgd[1656]:  [88724]Command output: Unknown cipher "********" Value validation failed
2025-08-20 13:17:49.395820 daemon-err , cfgd[1656]:  [88724]Command output: Unknown MAC "*********" Value validation failed
2025-08-20 13:17:49.643685 daemon-err , cfgd[1656]:  [88724]Command output: Unknown KEX "**************************" Value validation failed
2025-08-20 13:17:49.904430 daemon-err , cfgd[1656]:  [88724]Command output: Unknown key "***********" Value validation failed
2025-08-20 13:17:50.153147 daemon-err , cfgd[1656]:  [88724]Command output: Unknown key "*******" Value validation failed
2025-08-20 13:17:51.083235 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:17:57.614661 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:18:01.964524 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:18:09.616173 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:18:11.278719 daemon-err , cfgd[1656]:  [89729]Command output: Invalid dh-group Value validation failed
2025-08-20 13:18:11.567596 daemon-err , cfgd[1656]:  [89729]Command output: must be a valid encryption algorithm Value validation failed
2025-08-20 13:18:11.824354 daemon-err , cfgd[1656]:  [89729]Command output: Invalid hash Value validation failed
2025-08-20 13:18:12.099106 daemon-err , cfgd[1656]:  [89729]Command output: Invalid mode Value validation failed
2025-08-20 13:18:12.351286 daemon-err , cfgd[1656]:  [89729]Command output: Invalid dh-group Value validation failed
2025-08-20 13:18:12.607592 daemon-err , cfgd[1656]:  [89729]Command output: must be a valid encryption algorithm Value validation failed
2025-08-20 13:18:12.890511 daemon-err , cfgd[1656]:  [89729]Command output: Invalid hash Value validation failed
2025-08-20 13:18:13.906045 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:18:20.668516 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:18:22.507154 daemon-err , cfgd[1656]:  External python command [cfg.vpn check_secure_mode AUTH] finished with status 1
2025-08-20 13:18:22.507211 daemon-err , cfgd[1656]:  Commit validation failed
2025-08-20 13:18:22.508625 daemon-err , cfgd[1656]:  [90126]Command output: [ vpn ipsec auth-profile AUTH ] PSK, RADIUS, MD5 and MSCHAPV2 methods are not available in secure mode  Commit validation failed
2025-08-20 13:18:23.051210 daemon-err , cfgd[1656]:  External python command [cfg.vpn check_secure_mode AUTH] finished with status 1
2025-08-20 13:18:23.051269 daemon-err , cfgd[1656]:  Commit validation failed
2025-08-20 13:18:23.052614 daemon-err , cfgd[1656]:  [90126]Command output: [ vpn ipsec auth-profile AUTH ] PSK, RADIUS, MD5 and MSCHAPV2 methods are not available in secure mode  Commit validation failed
2025-08-20 13:18:23.502615 daemon-err , cfgd[1656]:  External python command [cfg.vpn check_secure_mode AUTH] finished with status 1
2025-08-20 13:18:23.502679 daemon-err , cfgd[1656]:  Commit validation failed
2025-08-20 13:18:23.504415 daemon-err , cfgd[1656]:  [90126]Command output: [ vpn ipsec auth-profile AUTH ] PSK, RADIUS, MD5 and MSCHAPV2 methods are not available in secure mode  Commit validation failed
2025-08-20 13:18:23.965853 daemon-err , cfgd[1656]:  External python command [cfg.vpn proposal_parameters ESP 1] finished with status 1
2025-08-20 13:18:23.965905 daemon-err , cfgd[1656]:  Commit validation failed
2025-08-20 13:18:23.967419 daemon-err , cfgd[1656]:  [90126]Command output: [ vpn ipsec esp-group ESP proposal 1 ] pfs and hash must be configured in esp-group ESP proposal 1 when secure mode is enabled  Commit validation failed
2025-08-20 13:18:25.072667 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:18:31.456274 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:18:34.766312 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:18:41.267805 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:18:44.810377 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:18:51.608619 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:18:55.343139 user-err , file_operation.py:  osdx.utils.xos cmd error: hexdump -C /opt/vyatta/etc/config/log/user/audit_file/audit_file
2025-08-20 13:18:55.343195 user-err , file_operation.py:
2025-08-20 13:18:57.939563 daemon-err , cfgd[1656]:  Exception processing normal request: write: Broken pipe
2025-08-20 13:19:12.085249 daemon-err , modulelauncher[92446]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-08-20 13:19:12.085297 daemon-err , modulelauncher[92446]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-08-20 13:19:12.093153 daemon-err , modulelauncher[92446]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-08-20 13:19:12.093188 daemon-err , modulelauncher[92446]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-08-20 13:19:12.101043 daemon-err , modulelauncher[92446]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.sndbuf=0
2025-08-20 13:19:12.101092 daemon-err , modulelauncher[92446]:  Command 'sudo sysctl net.netflow.sndbuf=0' returned non-zero exit status 1.
2025-08-20 13:19:24.518145 daemon-err , modulelauncher[92965]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-08-20 13:19:24.518173 daemon-err , modulelauncher[92965]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-08-20 13:19:24.526061 daemon-err , modulelauncher[92965]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-08-20 13:19:24.526081 daemon-err , modulelauncher[92965]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-08-20 13:19:24.534014 daemon-err , modulelauncher[92965]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.sndbuf=0
2025-08-20 13:19:24.534034 daemon-err , modulelauncher[92965]:  Command 'sudo sysctl net.netflow.sndbuf=0' returned non-zero exit status 1.
2025-08-20 13:19:35.828465 daemon-err , modulelauncher[93486]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-08-20 13:19:35.828505 daemon-err , modulelauncher[93486]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-08-20 13:19:35.838861 daemon-err , modulelauncher[93486]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-08-20 13:19:35.838906 daemon-err , modulelauncher[93486]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-08-20 13:19:35.847238 daemon-err , modulelauncher[93486]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.sndbuf=0
2025-08-20 13:19:35.847275 daemon-err , modulelauncher[93486]:  Command 'sudo sysctl net.netflow.sndbuf=0' returned non-zero exit status 1.
2025-08-20 13:19:48.332155 daemon-err , modulelauncher[94001]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-08-20 13:19:48.332203 daemon-err , modulelauncher[94001]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-08-20 13:19:48.340352 daemon-err , modulelauncher[94001]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-08-20 13:19:48.340397 daemon-err , modulelauncher[94001]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-08-20 13:19:48.348688 daemon-err , modulelauncher[94001]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.sndbuf=0
2025-08-20 13:19:48.348743 daemon-err , modulelauncher[94001]:  Command 'sudo sysctl net.netflow.sndbuf=0' returned non-zero exit status 1.
2025-08-20 13:19:58.885506 daemon-err , modulelauncher[94439]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-08-20 13:19:58.885562 daemon-err , modulelauncher[94439]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-08-20 13:19:58.894958 daemon-err , modulelauncher[94439]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-08-20 13:19:58.895005 daemon-err , modulelauncher[94439]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-08-20 13:19:58.904319 daemon-err , modulelauncher[94439]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.sndbuf=0
2025-08-20 13:19:58.904366 daemon-err , modulelauncher[94439]:  Command 'sudo sysctl net.netflow.sndbuf=0' returned non-zero exit status 1.
2025-08-20 13:20:10.774311 daemon-err , modulelauncher[94866]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-08-20 13:20:10.774380 daemon-err , modulelauncher[94866]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-08-20 13:20:10.786487 daemon-err , modulelauncher[94866]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-08-20 13:20:10.786531 daemon-err , modulelauncher[94866]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-08-20 13:20:10.799572 daemon-err , modulelauncher[94866]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.sndbuf=0
2025-08-20 13:20:10.799616 daemon-err , modulelauncher[94866]:  Command 'sudo sysctl net.netflow.sndbuf=0' returned non-zero exit status 1.
2025-08-20 13:20:44.514054 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:20:44.578526 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 118
2025-08-20 13:20:44.686478 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 119
2025-08-20 13:20:44.755389 daemon-err , modulelauncher[95806]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-08-20 13:20:44.755482 daemon-err , modulelauncher[95806]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-08-20 13:20:44.764077 daemon-err , modulelauncher[95806]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-08-20 13:20:44.764173 daemon-err , modulelauncher[95806]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-08-20 13:20:44.773832 daemon-err , modulelauncher[95806]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.sndbuf=0
2025-08-20 13:20:44.773919 daemon-err , modulelauncher[95806]:  Command 'sudo sysctl net.netflow.sndbuf=0' returned non-zero exit status 1.
2025-08-20 13:21:22.368552 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:21:22.439616 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 120
2025-08-20 13:21:22.507440 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 121
2025-08-20 13:21:22.578003 daemon-err , modulelauncher[96801]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-08-20 13:21:22.578057 daemon-err , modulelauncher[96801]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-08-20 13:21:22.586264 daemon-err , modulelauncher[96801]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-08-20 13:21:22.586321 daemon-err , modulelauncher[96801]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-08-20 13:21:22.594605 daemon-err , modulelauncher[96801]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.sndbuf=0
2025-08-20 13:21:22.594650 daemon-err , modulelauncher[96801]:  Command 'sudo sysctl net.netflow.sndbuf=0' returned non-zero exit status 1.
2025-08-20 13:22:52.657026 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:22:52.730153 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 131
2025-08-20 13:22:52.730313 daemon-err , nhrpd[99463]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 131
2025-08-20 13:22:52.833940 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 130
2025-08-20 13:22:52.834000 daemon-err , nhrpd[99463]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 130
2025-08-20 13:22:52.941989 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF G in VRF 132
2025-08-20 13:22:52.942050 daemon-err , nhrpd[99463]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF G in VRF 132
2025-08-20 13:23:14.076891 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:23:14.153819 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF G in VRF 136
2025-08-20 13:23:14.153979 daemon-err , nhrpd[100627]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF G in VRF 136
2025-08-20 13:23:14.253596 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 135
2025-08-20 13:23:14.253670 daemon-err , nhrpd[100627]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 135
2025-08-20 13:23:14.369599 daemon-err , nhrpd[100627]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 137
2025-08-20 13:23:14.369675 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 137
2025-08-20 13:25:52.066226 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:25:52.139629 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 156
2025-08-20 13:25:52.251491 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 155
2025-08-20 13:26:12.140857 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:26:12.190631 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 159
2025-08-20 13:26:12.282514 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 158
2025-08-20 13:29:30.433553 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:29:30.503247 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 174
2025-08-20 13:29:30.587081 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 173
2025-08-20 13:29:49.929041 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:29:50.018290 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 177
2025-08-20 13:29:50.118160 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 176
2025-08-20 13:34:18.778038 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:34:18.852984 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 203
2025-08-20 13:34:18.853098 daemon-err , nhrpd[121994]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 203
2025-08-20 13:34:50.773060 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:34:50.850971 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 205
2025-08-20 13:34:50.851082 daemon-err , nhrpd[122997]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 205
2025-08-20 13:35:22.976728 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:35:22.984907 daemon-err , zebra[29649]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: No such file or directory, type=RTM_DELNEXTHOP(105), seq=7091, pid=2189297188
2025-08-20 13:35:22.985184 daemon-err , zebra[29649]:  [YA619-S7J5M][EC 4043309075] Failed to uninstall Nexthop ID (1580) from the kernel
2025-08-20 13:35:23.064058 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 207
2025-08-20 13:35:23.064183 daemon-err , nhrpd[123986]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 207
2025-08-20 13:35:23.155718 daemon-err , nhrpd[123986]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 208
2025-08-20 13:35:23.155766 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 208
2025-08-20 13:35:55.885427 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:35:55.957033 daemon-err , nhrpd[125102]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 210
2025-08-20 13:35:55.957139 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 210
2025-08-20 13:35:56.036805 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 211
2025-08-20 13:35:56.036841 daemon-err , nhrpd[125102]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 211
2025-08-20 13:36:30.849955 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:36:30.920485 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 214
2025-08-20 13:36:30.920641 daemon-err , nhrpd[126251]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 214
2025-08-20 13:36:31.016357 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 215
2025-08-20 13:36:31.016429 daemon-err , nhrpd[126251]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 215
2025-08-20 13:36:31.104411 daemon-err , nhrpd[126251]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 213
2025-08-20 13:36:31.104459 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 213
2025-08-20 13:37:06.075278 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:37:06.148728 daemon-err , nhrpd[127469]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 218
2025-08-20 13:37:06.148839 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 218
2025-08-20 13:37:06.240563 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 219
2025-08-20 13:37:06.240628 daemon-err , nhrpd[127469]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 219
2025-08-20 13:37:06.336519 daemon-err , nhrpd[127469]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 217
2025-08-20 13:37:06.336571 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 217
2025-08-20 13:37:41.566526 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:37:41.574149 daemon-err , zebra[29649]:  [WVJCK-PPMGD][EC 4043309093] netlink-dp (NS 0) error: No such file or directory, type=RTM_DELNEXTHOP(105), seq=7978, pid=2189297188
2025-08-20 13:37:41.574377 daemon-err , zebra[29649]:  [YA619-S7J5M][EC 4043309075] Failed to uninstall Nexthop ID (1719) from the kernel
2025-08-20 13:37:41.640373 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 222
2025-08-20 13:37:41.640554 daemon-err , nhrpd[128657]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_TUN in VRF 222
2025-08-20 13:37:41.740100 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 223
2025-08-20 13:37:41.740168 daemon-err , nhrpd[128657]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 223
2025-08-20 13:37:41.832142 daemon-err , nhrpd[128657]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 221
2025-08-20 13:37:41.832209 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 221
2025-08-20 13:38:27.045622 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:38:27.103392 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 225
2025-08-20 13:38:48.809563 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:38:48.881292 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 226
2025-08-20 13:39:10.555063 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:39:10.627688 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 227
2025-08-20 13:39:33.373866 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:39:33.437357 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 229
2025-08-20 13:39:33.553181 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 228
2025-08-20 13:39:55.468501 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:39:55.535219 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 231
2025-08-20 13:39:55.623075 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 230
2025-08-20 13:41:41.302832 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:41:41.384108 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 238
2025-08-20 13:42:03.919876 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:42:03.981503 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 241
2025-08-20 13:42:26.124583 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:42:26.210209 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 244
2025-08-20 13:42:26.293758 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 245
2025-08-20 13:42:48.666965 user-err , ERROR:  Dissociating VRF from service: cnm
2025-08-20 13:42:48.736556 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 247
2025-08-20 13:42:48.852371 daemon-err , staticd[29656]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 248
2025-08-20 13:42:55.839591 daemon-err , cfgd[1656]:  [91826]Command output: File name reserved Value validation failed
2025-08-20 13:43:01.070724 daemon-notice , cfgd[1656]:  [91826]Completed change to active configuration
2025-08-20 13:43:01.072698 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-08-20 13:43:01.090218 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2025-08-20 13:43:01.217486 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2025-08-20 13:43:07.011594 daemon-info , systemd[1]:  Created slice system-dhcpd.slice - Slice /system/dhcpd.
2025-08-20 13:43:07.027850 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2025-08-20 13:43:13.193499 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Regex

Description

Create a new syslog file and collect all the syslog messages matching a specified regex.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file cli_msg filter CLI app OSDxCLI
set system syslog file cli_msg filter CLI level notice
set system syslog file cli_msg filter CLI regex '(^|[^a-zA-Z0-9_])alert([^a-zA-Z0-9_]|$)'

Step 2: Run command command with alert word at DUT0 and expect this output:

Show output
Command validation failed:
CLI Error: Invalid token [command]
CLI Error: Command error

Step 3: Run command command with alerted word at DUT0 and expect this output:

Show output
Command validation failed:
CLI Error: Invalid token [command]
CLI Error: Command error

Step 4: Run command file show running://log/user/cli_msg/cli_msg | cat at DUT0 and expect this output:

Show output
2025-08-20 13:43:19.584648 auth-notice , OSDxCLI:  User 'admin' entered an invalid command: 'command with alert word'.

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.172 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.172/0.172/0.172/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-08-20T13:43:25.253151+00:00 10.215.168.64  2025-08-20T13:43:24.448298+00:00 daemon-notice osdx cfgd[1656]:  [91826]Completed change to active configuration
2025-08-20T13:43:25.267360+00:00 10.215.168.64  2025-08-20T13:43:24.462821+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-08-20T13:43:25.285147+00:00 10.215.168.64  2025-08-20T13:43:24.480661+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-08-20T13:43:25.437797+00:00 10.215.168.64  2025-08-20T13:43:24.633285+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-08-20T13:43:25.502412+00:00 10.215.168.64  2025-08-20T13:43:24.697850+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.142 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.142/0.142/0.142/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-08-20T13:43:25.926743+00:00 10.215.168.64  2025-08-20T13:43:25.122214+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-08-20T13:43:26.021629+00:00 10.215.168.64  2025-08-20T13:43:25.217066+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-08-20T13:43:26.027773+00:00 10.215.168.64  2025-08-20T13:43:25.223254+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-08-20T13:43:26.274148+00:00 10.215.168.64  2025-08-20T13:43:25.469626+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-08-20T13:43:26.289765+00:00 10.215.168.64  2025-08-20T13:43:25.485250+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-08-20T13:43:27.258230+00:00 10.215.168.64  2025-08-20T13:43:26.453620+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-08-20T13:43:27.317531+00:00 10.215.168.64  2025-08-20T13:43:26.512929+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-08-20T13:43:27.419864+00:00 10.215.168.64  2025-08-20T13:43:26.615289+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-08-20T13:43:27.491788+00:00 10.215.168.64  2025-08-20T13:43:26.687173+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-08-20T13:43:27.591760+00:00 10.215.168.64  2025-08-20T13:43:26.787069+00:00 daemon-info osdx ubnt-cfgd[141321]:  inactive
2025-08-20T13:43:31.257677+00:00 10.215.168.64  2025-08-20T13:43:30.790380+00:00 daemon-notice osdx cfgd[1656]:  [91826]Completed change to active configuration
2025-08-20T13:43:31.270817+00:00 10.215.168.64  2025-08-20T13:43:30.803701+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-08-20T13:43:31.301961+00:00 10.215.168.64  2025-08-20T13:43:30.834851+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-08-20T13:43:31.491054+00:00 10.215.168.64  2025-08-20T13:43:31.023977+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-08-20T13:43:31.566658+00:00 10.215.168.64  2025-08-20T13:43:31.099546+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.173 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.173/0.173/0.173/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-08-20T13:43:31.959290+00:00 10.215.168.64  2025-08-20T13:43:31.492132+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-08-20T13:43:32.013578+00:00 10.215.168.64  2025-08-20T13:43:31.546450+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-08-20T13:43:32.019112+00:00 10.215.168.64  2025-08-20T13:43:31.551990+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-08-20T13:43:32.167908+00:00 10.215.168.64  2025-08-20T13:43:31.700780+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-08-20T13:43:32.181652+00:00 10.215.168.64  2025-08-20T13:43:31.714522+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-08-20T13:43:33.284548+00:00 10.215.168.64  2025-08-20T13:43:32.817323+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-08-20T13:43:33.343564+00:00 10.215.168.64  2025-08-20T13:43:32.876386+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-08-20T13:43:33.453011+00:00 10.215.168.64  2025-08-20T13:43:32.985809+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-08-20T13:43:33.515592+00:00 10.215.168.64  2025-08-20T13:43:33.048394+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-08-20T13:43:33.649143+00:00 10.215.168.64  2025-08-20T13:43:33.181806+00:00 daemon-info osdx ubnt-cfgd[141655]:  inactive
2025-08-20T13:43:37.249664+00:00 10.215.168.64  2025-08-20T13:43:36.648638+00:00 daemon-notice osdx cfgd[1656]:  [91826]Completed change to active configuration
2025-08-20T13:43:37.261397+00:00 10.215.168.64  2025-08-20T13:43:36.660139+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-08-20T13:43:37.278483+00:00 10.215.168.64  2025-08-20T13:43:36.677685+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-08-20T13:43:37.429290+00:00 10.215.168.64  2025-08-20T13:43:36.828496+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-08-20T13:43:37.494846+00:00 10.215.168.64  2025-08-20T13:43:36.894021+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.146 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.146/0.146/0.146/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-08-20T13:43:43.193760+00:00 33.33.33.33  2025-08-20T13:43:42.673210+00:00 daemon-notice osdx cfgd[1656]:  [91826]Completed change to active configuration
2025-08-20T13:43:43.204640+00:00 33.33.33.33  2025-08-20T13:43:42.684339+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-08-20T13:43:43.222087+00:00 33.33.33.33  2025-08-20T13:43:42.701803+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-08-20T13:43:43.388157+00:00 33.33.33.33  2025-08-20T13:43:42.867879+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-08-20T13:43:43.451060+00:00 33.33.33.33  2025-08-20T13:43:42.930760+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.152 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.152/0.152/0.152/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-08-20T13:43:43.876245+00:00 33.33.33.33  2025-08-20T13:43:43.355895+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-08-20T13:43:43.918690+00:00 33.33.33.33  2025-08-20T13:43:43.398370+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-08-20T13:43:43.922920+00:00 33.33.33.33  2025-08-20T13:43:43.402559+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-08-20T13:43:44.101859+00:00 33.33.33.33  2025-08-20T13:43:43.581532+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-08-20T13:43:44.117275+00:00 33.33.33.33  2025-08-20T13:43:43.596929+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-08-20T13:43:44.996033+00:00 33.33.33.33  2025-08-20T13:43:44.475617+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-08-20T13:43:45.082557+00:00 33.33.33.33  2025-08-20T13:43:44.562143+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-08-20T13:43:45.167536+00:00 33.33.33.33  2025-08-20T13:43:44.647131+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-08-20T13:43:45.304495+00:00 33.33.33.33  2025-08-20T13:43:44.782190+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-08-20T13:43:45.366392+00:00 33.33.33.33  2025-08-20T13:43:44.845994+00:00 daemon-info osdx ubnt-cfgd[142312]:  inactive
2025-08-20T13:43:49.426333+00:00 33.33.33.33  2025-08-20T13:43:49.000747+00:00 daemon-notice osdx cfgd[1656]:  [91826]Completed change to active configuration
2025-08-20T13:43:49.426333+00:00 33.33.33.33  2025-08-20T13:43:49.000938+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2025-08-20T13:43:49.437300+00:00 33.33.33.33  2025-08-20T13:43:49.011944+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-08-20T13:43:49.454787+00:00 33.33.33.33  2025-08-20T13:43:49.029475+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-08-20T13:43:49.669364+00:00 33.33.33.33  2025-08-20T13:43:49.244028+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-08-20T13:43:49.737837+00:00 33.33.33.33  2025-08-20T13:43:49.312459+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.123 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.123/0.123/0.123/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-08-20T13:43:55.684027+00:00 10.215.168.64  2025-08-20T13:43:54.636300+00:00 daemon-notice osdx cfgd[1656]:  [91826]Completed change to active configuration
2025-08-20T13:43:55.730416+00:00 10.215.168.64  2025-08-20T13:43:54.649157+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-08-20T13:43:55.730416+00:00 10.215.168.64  2025-08-20T13:43:54.674840+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-08-20T13:43:55.730416+00:00 10.215.168.64  2025-08-20T13:43:54.768509+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-08-20T13:43:55.730416+00:00 10.215.168.64  2025-08-20T13:43:54.768558+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-08-20T13:43:55.746648+00:00 10.215.168.64  2025-08-20T13:43:54.841009+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-08-20T13:43:55.935489+00:00 10.215.168.64  2025-08-20T13:43:55.029835+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.123 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.123/0.123/0.123/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-08-20T13:44:01.899698+00:00 33.33.33.33  2025-08-20T13:44:00.845717+00:00 daemon-notice osdx cfgd[1656]:  [91826]Completed change to active configuration
2025-08-20T13:44:01.946395+00:00 33.33.33.33  2025-08-20T13:44:00.856976+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-08-20T13:44:01.946395+00:00 33.33.33.33  2025-08-20T13:44:00.862344+00:00 authpriv-warning osdx CRON[143341]:  pam_limits(cron:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-08-20T13:44:01.946395+00:00 33.33.33.33  2025-08-20T13:44:00.894433+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-08-20T13:44:01.946395+00:00 33.33.33.33  2025-08-20T13:44:00.978538+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-08-20T13:44:01.946395+00:00 33.33.33.33  2025-08-20T13:44:00.978601+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-08-20T13:44:01.973295+00:00 33.33.33.33  2025-08-20T13:44:01.060367+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-08-20T13:44:02.202185+00:00 33.33.33.33  2025-08-20T13:44:01.289134+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.