Syslog
Test suite to check syslog
Test Syslog
Description
Show the system host name and check the syslog message
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog global level info
Step 2: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Step 3: Run command file show running://log/messages | tail -n 200
at DUT0
and check if output matches the following regular expressions:
executed a new command: 'show host name'Show output
2025-09-05 14:22:06.091812 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 203 2025-09-05 14:22:28.499021 user-err , ERROR: Dissociating VRF from service: cnm 2025-09-05 14:22:28.571045 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 205 2025-09-05 14:22:51.214482 user-err , ERROR: Dissociating VRF from service: cnm 2025-09-05 14:22:51.299605 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 208 2025-09-05 14:22:51.407494 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 207 2025-09-05 14:23:12.776190 user-err , ERROR: Dissociating VRF from service: cnm 2025-09-05 14:23:12.838467 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 211 2025-09-05 14:23:12.926314 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 210 2025-09-05 14:25:00.961395 user-err , ERROR: Dissociating VRF from service: cnm 2025-09-05 14:25:01.052572 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 223 2025-09-05 14:25:22.243338 user-err , ERROR: Dissociating VRF from service: cnm 2025-09-05 14:25:22.296582 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 227 2025-09-05 14:25:45.815999 user-err , ERROR: Dissociating VRF from service: cnm 2025-09-05 14:25:45.901521 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 231 2025-09-05 14:25:46.009385 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 232 2025-09-05 14:26:07.827816 user-err , ERROR: Dissociating VRF from service: cnm 2025-09-05 14:26:07.913474 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_LAN in VRF 235 2025-09-05 14:26:07.993327 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF VRF_WAN in VRF 236 2025-09-05 14:27:13.504069 user-err , ERROR: Dissociating VRF from service: cnm 2025-09-05 14:27:13.597726 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 245 2025-09-05 14:27:13.661493 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 244 2025-09-05 14:27:30.417518 user-err , ERROR: Dissociating VRF from service: cnm 2025-09-05 14:27:30.475022 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 248 2025-09-05 14:27:30.555114 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 247 2025-09-05 14:30:48.342857 user-err , ERROR: Dissociating VRF from service: cnm 2025-09-05 14:30:48.412483 daemon-err , nhrpd[180867]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 280 2025-09-05 14:30:48.412634 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 280 2025-09-05 14:30:48.484289 daemon-err , nhrpd[180867]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 279 2025-09-05 14:30:48.484345 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 279 2025-09-05 14:30:48.560244 daemon-err , nhrpd[180867]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF G in VRF 281 2025-09-05 14:30:48.560294 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF G in VRF 281 2025-09-05 14:31:07.894690 user-err , ERROR: Dissociating VRF from service: cnm 2025-09-05 14:31:07.980108 daemon-err , nhrpd[182034]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF G in VRF 285 2025-09-05 14:31:07.980254 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF G in VRF 285 2025-09-05 14:31:08.055880 daemon-err , nhrpd[182034]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 284 2025-09-05 14:31:08.055959 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 284 2025-09-05 14:31:08.135842 daemon-err , nhrpd[182034]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 286 2025-09-05 14:31:08.135892 daemon-err , staticd[31108]: [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 286 2025-09-05 14:32:33.628263 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:32:35.329861 user-err , file_operation: Secure mode activated. ftp, tftp and http connections not allowed 2025-09-05 14:32:35.467793 user-err , file_operation: Secure mode activated. ftp, tftp and http connections not allowed 2025-09-05 14:32:36.383561 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:32:43.524164 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:32:49.787763 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:32:56.875891 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:32:58.674111 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:32:58.675299 daemon-err , cfgd[1463]: [187599]Command output: [ service telnet ] Secure mode is activated Commit validation failed 2025-09-05 14:32:59.153236 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:32:59.154816 daemon-err , cfgd[1463]: [187599]Command output: [ service snmp ] Secure mode is activated Commit validation failed 2025-09-05 14:32:59.637347 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:32:59.638709 daemon-err , cfgd[1463]: [187599]Command output: [ system certificate scep ] Secure mode is activated Commit validation failed 2025-09-05 14:33:00.000008 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:33:00.001274 daemon-err , cfgd[1463]: [187599]Command output: [ system strong-password ] Secure mode is activated Commit validation failed 2025-09-05 14:33:00.429937 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:33:00.431486 daemon-err , cfgd[1463]: [187599]Command output: [ user-level 5 ] Secure mode is activated Commit validation failed 2025-09-05 14:33:01.499927 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:33:08.561705 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:33:10.287442 daemon-err , cfgd[1463]: [188055]Command output: Password does not meet the criteria for secure mode. The criteria are: Must include uppercase, lowercase, numbers, one of these special characters '!, @, #, $, %, ^, &, *, (, )' and must be at least 12 characters long. Value validation failed 2025-09-05 14:33:12.000507 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:33:22.466094 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:33:27.448781 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:33:27.646839 syslog-err , rsyslogd: not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0] 2025-09-05 14:33:27.646910 syslog-err , rsyslogd: invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Tue Jul 15 11:17:22 2025 to Fri Jul 13 11:17:22 2035; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA; [v8.2302.0] 2025-09-05 14:33:27.803943 syslog-err , rsyslogd: not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0] 2025-09-05 14:33:27.803999 syslog-err , rsyslogd: invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Tue Jul 15 11:17:22 2025 to Fri Jul 13 11:17:22 2035; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA; [v8.2302.0] 2025-09-05 14:33:28.123039 syslog-err , rsyslogd: not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0] 2025-09-05 14:33:28.123123 syslog-err , rsyslogd: invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Tue Jul 15 11:17:22 2025 to Fri Jul 13 11:17:22 2035; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA; [v8.2302.0] 2025-09-05 14:33:28.244853 syslog-err , rsyslogd: not permitted to talk to peer, certificate invalid: signer not found [v8.2302.0] 2025-09-05 14:33:28.244924 syslog-err , rsyslogd: invalid cert info: peer provided 1 certificate(s). Certificate 1 info: certificate valid from Tue Jul 15 11:17:22 2025 to Fri Jul 13 11:17:22 2035; Certificate public key: RSA; DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=rsyslog.server.com; Issuer DN: C=ES,ST=Madrid,L=Tres Cantos,O=Teldat S.A.,OU=RD,CN=Teldat Root CA; [v8.2302.0] 2025-09-05 14:33:34.619477 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:33:36.346761 daemon-err , cfgd[1463]: [189394]Command output: Unknown cipher "********" Value validation failed 2025-09-05 14:33:36.593831 daemon-err , cfgd[1463]: [189394]Command output: Unknown MAC "*********" Value validation failed 2025-09-05 14:33:36.843997 daemon-err , cfgd[1463]: [189394]Command output: Unknown KEX "**************************" Value validation failed 2025-09-05 14:33:37.093549 daemon-err , cfgd[1463]: [189394]Command output: Unknown key "***********" Value validation failed 2025-09-05 14:33:37.343627 daemon-err , cfgd[1463]: [189394]Command output: Unknown key "*******" Value validation failed 2025-09-05 14:33:38.456949 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:33:44.554307 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:33:49.557783 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:33:56.591785 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:33:58.315036 daemon-err , cfgd[1463]: [190418]Command output: Invalid dh-group Value validation failed 2025-09-05 14:33:58.608051 daemon-err , cfgd[1463]: [190418]Command output: must be a valid encryption algorithm Value validation failed 2025-09-05 14:33:58.861870 daemon-err , cfgd[1463]: [190418]Command output: Invalid hash Value validation failed 2025-09-05 14:33:59.115593 daemon-err , cfgd[1463]: [190418]Command output: Invalid mode Value validation failed 2025-09-05 14:33:59.391577 daemon-err , cfgd[1463]: [190418]Command output: Invalid dh-group Value validation failed 2025-09-05 14:33:59.683037 daemon-err , cfgd[1463]: [190418]Command output: must be a valid encryption algorithm Value validation failed 2025-09-05 14:33:59.982989 daemon-err , cfgd[1463]: [190418]Command output: Invalid hash Value validation failed 2025-09-05 14:34:00.957529 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:34:08.550139 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:34:10.495151 daemon-err , cfgd[1463]: External python command [cfg.vpn check_secure_mode AUTH] finished with status 1 2025-09-05 14:34:10.495201 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:34:10.496812 daemon-err , cfgd[1463]: [190827]Command output: [ vpn ipsec auth-profile AUTH ] PSK, RADIUS, MD5 and MSCHAPV2 methods are not available in secure mode Commit validation failed 2025-09-05 14:34:11.072111 daemon-err , cfgd[1463]: External python command [cfg.vpn check_secure_mode AUTH] finished with status 1 2025-09-05 14:34:11.072160 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:34:11.073669 daemon-err , cfgd[1463]: [190827]Command output: [ vpn ipsec auth-profile AUTH ] PSK, RADIUS, MD5 and MSCHAPV2 methods are not available in secure mode Commit validation failed 2025-09-05 14:34:11.647468 daemon-err , cfgd[1463]: External python command [cfg.vpn check_secure_mode AUTH] finished with status 1 2025-09-05 14:34:11.647521 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:34:11.650045 daemon-err , cfgd[1463]: [190827]Command output: [ vpn ipsec auth-profile AUTH ] PSK, RADIUS, MD5 and MSCHAPV2 methods are not available in secure mode Commit validation failed 2025-09-05 14:34:12.115344 daemon-err , cfgd[1463]: External python command [cfg.vpn proposal_parameters ESP 1] finished with status 1 2025-09-05 14:34:12.115404 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:34:12.117196 daemon-err , cfgd[1463]: [190827]Command output: [ vpn ipsec esp-group ESP proposal 1 ] pfs and hash must be configured in esp-group ESP proposal 1 when secure mode is enabled Commit validation failed 2025-09-05 14:34:13.118521 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:34:19.584464 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:34:21.958792 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:34:29.909069 daemon-err , cfgd[1463]: External python command [cfg.security check_passwd] finished with status 1 2025-09-05 14:34:29.909127 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:34:29.910501 daemon-err , cfgd[1463]: [191409]Command output: [ system login user admin ] You must delete all users except yours in the system. If your user belongs to a tacacs or radius system, you must keep only local admin user Commit validation failed 2025-09-05 14:34:34.223074 daemon-err , cfgd[1463]: External python command [cfg.security check_passwd] finished with status 1 2025-09-05 14:34:34.225121 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:34:34.226637 daemon-err , cfgd[1463]: [191409]Command output: [ system security medium ] Password does not meet the criteria for secure mode. The criteria are: Must include uppercase, lowercase, numbers, one of these special characters '!, @, #, $, %, ^, &, *, (, )' and must be at least 12 characters long. Commit validation failed 2025-09-05 14:34:34.685711 daemon-err , cfgd[1463]: Cannot be set manually in secure mode 2025-09-05 14:34:34.685790 daemon-err , cfgd[1463]: [191409]Command output: Cannot be set manually in secure mode 2025-09-05 14:34:42.211568 daemon-err , cfgd[1463]: Only max level users can enable this mode 2025-09-05 14:34:42.211635 daemon-err , cfgd[1463]: [191963]Command output: Only max level users can enable this mode 2025-09-05 14:34:50.099971 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:34:50.100021 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:34:50.102102 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] ssh keepalive-interval or keepalive-count-max must be deleted first Commit validation failed 2025-09-05 14:34:53.963911 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:34:53.966010 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:34:53.967471 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] ssh cipher must be deleted first Commit validation failed 2025-09-05 14:34:57.881391 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:34:57.883821 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:34:57.885222 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] ssh mac must be deleted first Commit validation failed 2025-09-05 14:35:01.786026 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:35:01.786071 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:35:01.787360 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] ssh key-exchange must be deleted first Commit validation failed 2025-09-05 14:35:05.624513 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:35:05.626682 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:35:05.628370 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] ssh pubkey-accepted-algorithms must be deleted first Commit validation failed 2025-09-05 14:35:09.488434 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:35:09.488493 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:35:09.490114 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] ssh host-key-algorithms must be deleted first Commit validation failed 2025-09-05 14:35:13.428494 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:35:13.428539 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:35:13.430013 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] ssh host-key must be deleted first Commit validation failed 2025-09-05 14:35:17.199682 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:35:17.201632 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:35:17.203011 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] ssh login-grace-time must be deleted first Commit validation failed 2025-09-05 14:35:21.045139 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:35:21.046854 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:35:21.048520 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] dns cipher must be deleted first Commit validation failed 2025-09-05 14:35:24.830657 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:35:24.830717 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:35:24.831928 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] ipsec auth-profile must be deleted first Commit validation failed 2025-09-05 14:35:29.051376 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:35:29.053318 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:35:29.054948 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] ipsec esp-group must be deleted first Commit validation failed 2025-09-05 14:35:33.205982 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:35:33.208423 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:35:33.210433 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] ipsec ike-group must be deleted first Commit validation failed 2025-09-05 14:35:37.198561 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:35:37.198601 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:35:37.199758 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] ipsec logging must be deleted first Commit validation failed 2025-09-05 14:35:41.109051 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:35:41.110917 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:35:41.112563 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] login max-sessions must be deleted first Commit validation failed 2025-09-05 14:35:44.836793 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:35:44.839658 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:35:44.841091 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] login password-prompt-delay must be deleted first Commit validation failed 2025-09-05 14:35:48.049004 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049048 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049126 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049151 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049204 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049236 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049289 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049309 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049378 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049396 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049456 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049488 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049545 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049566 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049630 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049648 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049701 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049730 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049787 syslog-err , rsyslogd: omfwd/udp: socket 7: sendto() error: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.049805 syslog-err , rsyslogd: omfwd: socket 7: error 101 sending via udp: Network is unreachable [v8.2302.0 try https://www.rsyslog.com/e/2354 ] 2025-09-05 14:35:48.656609 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:35:48.658818 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:35:48.660598 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] syslog host must be deleted first Commit validation failed 2025-09-05 14:35:52.041459 daemon-err , ntpd[194405]: AUTH: authreadkeys: reading /etc/ntp.keys 2025-09-05 14:35:52.041664 daemon-err , ntpd[194405]: AUTH: authreadkeys: added 1 keys 2025-09-05 14:35:52.719780 daemon-err , cfgd[1463]: External python command [cfg.security validate] finished with status 1 2025-09-05 14:35:52.721889 daemon-err , cfgd[1463]: Commit validation failed 2025-09-05 14:35:52.723283 daemon-err , cfgd[1463]: [192009]Command output: [ system security medium ] ntp authentication-key must be deleted first Commit validation failed 2025-09-05 14:36:00.612729 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:36:04.027647 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:36:10.340901 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:36:13.776652 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:36:20.556079 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:36:24.406238 user-err , file_operation.py: osdx.utils.xos cmd error: hexdump -C /opt/vyatta/etc/config/log/user/audit_file/audit_file 2025-09-05 14:36:24.406336 user-err , file_operation.py: 2025-09-05 14:36:26.954067 daemon-err , cfgd[1463]: Exception processing normal request: write: Broken pipe 2025-09-05 14:36:52.858860 daemon-err , cfgd[1463]: [195996]Command output: File name reserved Value validation failed 2025-09-05 14:36:57.082945 daemon-notice , cfgd[1463]: [195996]Completed change to active configuration 2025-09-05 14:36:57.084780 auth-notice , OSDxCLI: User 'admin' committed the configuration. 2025-09-05 14:36:57.101539 auth-notice , OSDxCLI: User 'admin' left the configuration menu. 2025-09-05 14:36:57.244359 auth-notice , OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog File
Description
Create a new DHCP server and collect all the syslog messages produced by systemd.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.Show output
2025-09-05 14:37:04.107892 daemon-info , systemd[1]: Created slice system-dhcpd.slice - Slice /system/dhcpd. 2025-09-05 14:37:04.130228 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog File Rotate
Description
Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 2: Set the following configuration in DUT0
:
set interfaces ethernet eth1 address 192.168.100.100/24 set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file systemd_msg archive files 10 set system syslog file systemd_msg archive size 100 set system syslog file systemd_msg filter def app systemd set system syslog file systemd_msg filter def level info
Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat
at DUT0
and check if output matches the following regular expressions:
Started.*"DHCP Server Service instance main"\.Show output
2025-09-05 14:37:10.135542 daemon-info , systemd[1]: Started dhcpd@main.service - "DHCP Server Service instance main".
Test Syslog Regex
Description
Create a new syslog file and collect all the syslog messages matching a specified regex.
Scenario
Step 1: Set the following configuration in DUT0
:
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog file cli_msg filter CLI app OSDxCLI set system syslog file cli_msg filter CLI level notice set system syslog file cli_msg filter CLI regex '(^|[^a-zA-Z0-9_])alert([^a-zA-Z0-9_]|$)'
Step 2: Run command command with alert word
at DUT0
and expect this output:
Show output
Command validation failed: CLI Error: Invalid token [command] CLI Error: Command error
Step 3: Run command command with alerted word
at DUT0
and expect this output:
Show output
Command validation failed: CLI Error: Invalid token [command] CLI Error: Command error
Step 4: Run command file show running://log/user/cli_msg/cli_msg | cat
at DUT0
and expect this output:
Show output
2025-09-05 14:37:15.586811 auth-notice , OSDxCLI: User 'admin' entered an invalid command: 'command with alert word'.
Test Syslog Remote
Description
Add a remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.183 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.183/0.183/0.183/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-09-05T14:37:22.251785+00:00 10.215.168.64 2025-09-05T14:37:21.591548+00:00 daemon-notice osdx cfgd[1463]: [195996]Completed change to active configuration 2025-09-05T14:37:22.262555+00:00 10.215.168.64 2025-09-05T14:37:21.602512+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-09-05T14:37:22.279356+00:00 10.215.168.64 2025-09-05T14:37:21.619307+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-09-05T14:37:22.429897+00:00 10.215.168.64 2025-09-05T14:37:21.769809+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-09-05T14:37:22.500312+00:00 10.215.168.64 2025-09-05T14:37:21.840168+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With VRF
Description
Add a remote host to send syslog messages through a VRF and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.140 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.140/0.140/0.140/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-09-05T14:37:23.030022+00:00 10.215.168.64 2025-09-05T14:37:22.369907+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-09-05T14:37:23.114780+00:00 10.215.168.64 2025-09-05T14:37:22.454674+00:00 authpriv-warning osdx sudo: pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped 2025-09-05T14:37:23.119095+00:00 10.215.168.64 2025-09-05T14:37:22.459059+00:00 authpriv-warning osdx sudo: pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped 2025-09-05T14:37:23.321889+00:00 10.215.168.64 2025-09-05T14:37:22.661772+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-09-05T14:37:23.335502+00:00 10.215.168.64 2025-09-05T14:37:22.675379+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-09-05T14:37:24.381359+00:00 10.215.168.64 2025-09-05T14:37:23.721241+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-09-05T14:37:24.439438+00:00 10.215.168.64 2025-09-05T14:37:23.779270+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-09-05T14:37:24.561743+00:00 10.215.168.64 2025-09-05T14:37:23.901578+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-09-05T14:37:24.623221+00:00 10.215.168.64 2025-09-05T14:37:23.963087+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-09-05T14:37:24.721444+00:00 10.215.168.64 2025-09-05T14:37:24.061327+00:00 daemon-info osdx ubnt-cfgd[197924]: inactive 2025-09-05T14:37:28.305097+00:00 10.215.168.64 2025-09-05T14:37:27.673084+00:00 daemon-notice osdx cfgd[1463]: [195996]Completed change to active configuration 2025-09-05T14:37:28.320006+00:00 10.215.168.64 2025-09-05T14:37:27.688224+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-09-05T14:37:28.337929+00:00 10.215.168.64 2025-09-05T14:37:27.706275+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-09-05T14:37:28.568642+00:00 10.215.168.64 2025-09-05T14:37:27.936973+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-09-05T14:37:28.650236+00:00 10.215.168.64 2025-09-05T14:37:28.018548+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Interface
Description
Add a remote host to send syslog messages through a specific interface and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-interface eth0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.157 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.157/0.157/0.157/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-09-05T14:37:29.111799+00:00 10.215.168.64 2025-09-05T14:37:28.480064+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-09-05T14:37:29.184642+00:00 10.215.168.64 2025-09-05T14:37:28.552806+00:00 authpriv-warning osdx sudo: pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped 2025-09-05T14:37:29.194179+00:00 10.215.168.64 2025-09-05T14:37:28.562405+00:00 authpriv-warning osdx sudo: pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped 2025-09-05T14:37:29.380742+00:00 10.215.168.64 2025-09-05T14:37:28.749019+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-09-05T14:37:29.394328+00:00 10.215.168.64 2025-09-05T14:37:28.762573+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-09-05T14:37:30.257534+00:00 10.215.168.64 2025-09-05T14:37:29.625786+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-09-05T14:37:30.314766+00:00 10.215.168.64 2025-09-05T14:37:29.682992+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-09-05T14:37:30.427161+00:00 10.215.168.64 2025-09-05T14:37:29.795146+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-09-05T14:37:30.488720+00:00 10.215.168.64 2025-09-05T14:37:29.856922+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-09-05T14:37:30.589058+00:00 10.215.168.64 2025-09-05T14:37:29.957203+00:00 daemon-info osdx ubnt-cfgd[198259]: inactive 2025-09-05T14:37:34.112142+00:00 10.215.168.64 2025-09-05T14:37:33.494124+00:00 daemon-notice osdx cfgd[1463]: [195996]Completed change to active configuration 2025-09-05T14:37:34.126517+00:00 10.215.168.64 2025-09-05T14:37:33.508481+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-09-05T14:37:34.142718+00:00 10.215.168.64 2025-09-05T14:37:33.524877+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-09-05T14:37:34.315630+00:00 10.215.168.64 2025-09-05T14:37:33.697803+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-09-05T14:37:34.396088+00:00 10.215.168.64 2025-09-05T14:37:33.778219+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and UDP
Description
Add a remote host to send syslog messages through a specific local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.144 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.144/0.144/0.144/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-09-05T14:37:39.784460+00:00 33.33.33.33 2025-09-05T14:37:39.639075+00:00 daemon-notice osdx cfgd[1463]: [195996]Completed change to active configuration 2025-09-05T14:37:39.797757+00:00 33.33.33.33 2025-09-05T14:37:39.652687+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-09-05T14:37:39.816648+00:00 33.33.33.33 2025-09-05T14:37:39.671601+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-09-05T14:37:40.018404+00:00 33.33.33.33 2025-09-05T14:37:39.873360+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-09-05T14:37:40.079850+00:00 33.33.33.33 2025-09-05T14:37:39.934790+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote With Local-address and VRF
Description
Add a remote host to send syslog messages through a VRF and a local-address and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces ethernet eth0 vrf VRF0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 local-vrf VRF0 set system syslog host 10.215.168.1 port 514 set system syslog host 10.215.168.1 protocol udp set system vrf VRF0
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1Show output
ping: Warning: source address might be selected on device other than: VRF0 PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.149 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.149/0.149/0.149/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-09-05T14:37:40.572799+00:00 33.33.33.33 2025-09-05T14:37:40.427706+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show version'. 2025-09-05T14:37:40.620814+00:00 33.33.33.33 2025-09-05T14:37:40.475720+00:00 authpriv-warning osdx sudo: pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped 2025-09-05T14:37:40.626282+00:00 33.33.33.33 2025-09-05T14:37:40.481239+00:00 authpriv-warning osdx sudo: pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped 2025-09-05T14:37:40.821987+00:00 33.33.33.33 2025-09-05T14:37:40.676901+00:00 user-warning osdx OSDxCLI: Signal 10 received 2025-09-05T14:37:40.836276+00:00 33.33.33.33 2025-09-05T14:37:40.691190+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'set system mode user'. 2025-09-05T14:37:41.728912+00:00 33.33.33.33 2025-09-05T14:37:41.583817+00:00 auth-notice osdx OSDxCLI: User 'admin' entered the configuration menu. 2025-09-05T14:37:41.793840+00:00 33.33.33.33 2025-09-05T14:37:41.648739+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'delete '. 2025-09-05T14:37:41.908254+00:00 33.33.33.33 2025-09-05T14:37:41.763131+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'. 2025-09-05T14:37:41.971922+00:00 33.33.33.33 2025-09-05T14:37:41.826815+00:00 auth-notice osdx OSDxCLI: User 'admin' added a new cfg line: 'show working'. 2025-09-05T14:37:42.071470+00:00 33.33.33.33 2025-09-05T14:37:41.926220+00:00 daemon-info osdx ubnt-cfgd[198921]: inactive 2025-09-05T14:37:46.244267+00:00 33.33.33.33 2025-09-05T14:37:45.221653+00:00 daemon-notice osdx cfgd[1463]: [195996]Completed change to active configuration 2025-09-05T14:37:46.244267+00:00 33.33.33.33 2025-09-05T14:37:45.221994+00:00 syslog-warning osdx rsyslogd: bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ] 2025-09-05T14:37:46.254838+00:00 33.33.33.33 2025-09-05T14:37:45.232618+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-09-05T14:37:46.273997+00:00 33.33.33.33 2025-09-05T14:37:45.251767+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-09-05T14:37:46.509954+00:00 33.33.33.33 2025-09-05T14:37:45.487717+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'. 2025-09-05T14:37:46.569403+00:00 33.33.33.33 2025-09-05T14:37:45.547177+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Single TLS
Description
Add a secured remote host to send syslog messages and show the host name.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.131 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.131/0.131/0.131/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/10.215.168.64/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-09-05T14:37:52.687211+00:00 10.215.168.64 2025-09-05T14:37:51.650541+00:00 daemon-notice osdx cfgd[1463]: [195996]Completed change to active configuration 2025-09-05T14:37:52.730471+00:00 10.215.168.64 2025-09-05T14:37:51.662030+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-09-05T14:37:52.730471+00:00 10.215.168.64 2025-09-05T14:37:51.686738+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-09-05T14:37:52.730471+00:00 10.215.168.64 2025-09-05T14:37:51.830178+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-09-05T14:37:52.730471+00:00 10.215.168.64 2025-09-05T14:37:51.830232+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-09-05T14:37:52.730471+00:00 10.215.168.64 2025-09-05T14:37:51.840037+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-09-05T14:37:52.863244+00:00 10.215.168.64 2025-09-05T14:37:52.016911+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.
Test Syslog Remote Local Address Single TLS
Description
Add a secured remote host to send syslog messages and show the host name from a fiven local-address
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 33.33.33.33/24 set interfaces ethernet eth0 address 10.215.168.64/24 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system syslog host 10.215.168.1 filter def level info set system syslog host 10.215.168.1 local-address 33.33.33.33 set system syslog host 10.215.168.1 port 10514 set system syslog host 10.215.168.1 protocol tcp set system syslog host 10.215.168.1 tls ca 'running://ca.crt' set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com
Step 2: Ping IP address 10.215.168.1
from DUT0
:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.113 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.113/0.113/0.113/0.000 ms
Step 3: Run command show host name
at DUT0
and expect this output:
Show output
osdx
Note
Check the server /var/log/33.33.33.33/.log
file and read the
executed a new command: 'show host name'
log message:
Show output
2025-09-05T14:37:58.769112+00:00 33.33.33.33 2025-09-05T14:37:57.757908+00:00 daemon-notice osdx cfgd[1463]: [195996]Completed change to active configuration 2025-09-05T14:37:58.814397+00:00 33.33.33.33 2025-09-05T14:37:57.770704+00:00 auth-notice osdx OSDxCLI: User 'admin' committed the configuration. 2025-09-05T14:37:58.814397+00:00 33.33.33.33 2025-09-05T14:37:57.790415+00:00 auth-notice osdx OSDxCLI: User 'admin' left the configuration menu. 2025-09-05T14:37:58.814397+00:00 33.33.33.33 2025-09-05T14:37:57.866541+00:00 syslog-warning osdx rsyslogd: warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ] 2025-09-05T14:37:58.814397+00:00 33.33.33.33 2025-09-05T14:37:57.866609+00:00 syslog-warning osdx rsyslogd: warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ] 2025-09-05T14:37:58.848782+00:00 33.33.33.33 2025-09-05T14:37:57.954144+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'. 2025-09-05T14:37:59.036148+00:00 33.33.33.33 2025-09-05T14:37:58.141376+00:00 auth-notice osdx OSDxCLI: User 'admin' executed a new command: 'show host name'.