Syslog

Test suite to check syslog

Test Syslog

Description

Show the system host name and check the syslog message

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog global level info

Step 2: Run command show host name at DUT0 and expect this output:

Show output
osdx

Step 3: Run command file show running://log/messages | tail -n 200 at DUT0 and check if output matches the following regular expressions:

executed a new command: 'show host name'
Show output
2025-06-24 12:34:30.006169 daemon-err , modulelauncher[131282]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-06-24 12:34:30.017401 daemon-err , modulelauncher[131282]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.sndbuf=0
2025-06-24 12:34:30.017487 daemon-err , modulelauncher[131282]:  Command 'sudo sysctl net.netflow.sndbuf=0' returned non-zero exit status 1.
2025-06-24 12:35:03.497708 user-err , ERROR:  Dissociating VRF from service: cnm
2025-06-24 12:35:03.561004 daemon-err , staticd[66239]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 262
2025-06-24 12:35:03.648898 daemon-err , staticd[66239]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 263
2025-06-24 12:35:03.714228 daemon-err , modulelauncher[132229]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-06-24 12:35:03.714296 daemon-err , modulelauncher[132229]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-06-24 12:35:03.725550 daemon-err , modulelauncher[132229]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-06-24 12:35:03.725614 daemon-err , modulelauncher[132229]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-06-24 12:35:03.736207 daemon-err , modulelauncher[132229]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.sndbuf=0
2025-06-24 12:35:03.736272 daemon-err , modulelauncher[132229]:  Command 'sudo sysctl net.netflow.sndbuf=0' returned non-zero exit status 1.
2025-06-24 12:35:41.001425 user-err , ERROR:  Dissociating VRF from service: cnm
2025-06-24 12:35:41.068243 daemon-err , staticd[66239]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF A in VRF 264
2025-06-24 12:35:41.148073 daemon-err , staticd[66239]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF B in VRF 265
2025-06-24 12:35:41.233709 daemon-err , modulelauncher[133220]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-06-24 12:35:41.233799 daemon-err , modulelauncher[133220]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-06-24 12:35:41.245123 daemon-err , modulelauncher[133220]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-06-24 12:35:41.245219 daemon-err , modulelauncher[133220]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-06-24 12:35:41.257314 daemon-err , modulelauncher[133220]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.sndbuf=0
2025-06-24 12:35:41.257367 daemon-err , modulelauncher[133220]:  Command 'sudo sysctl net.netflow.sndbuf=0' returned non-zero exit status 1.
2025-06-24 12:35:53.396115 daemon-err , modulelauncher[133658]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-06-24 12:35:53.396200 daemon-err , modulelauncher[133658]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-06-24 12:35:53.404625 daemon-err , modulelauncher[133658]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-06-24 12:35:53.404694 daemon-err , modulelauncher[133658]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-06-24 12:35:53.412963 daemon-err , modulelauncher[133658]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.sndbuf=0
2025-06-24 12:35:53.413036 daemon-err , modulelauncher[133658]:  Command 'sudo sysctl net.netflow.sndbuf=0' returned non-zero exit status 1.
2025-06-24 12:36:04.965504 daemon-err , modulelauncher[134087]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.hashsize=0
2025-06-24 12:36:04.965536 daemon-err , modulelauncher[134087]:  Command 'sudo sysctl net.netflow.hashsize=0' returned non-zero exit status 1.
2025-06-24 12:36:04.973768 daemon-err , modulelauncher[134087]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.protocol=0
2025-06-24 12:36:04.973797 daemon-err , modulelauncher[134087]:  Command 'sudo sysctl net.netflow.protocol=0' returned non-zero exit status 1.
2025-06-24 12:36:04.982277 daemon-err , modulelauncher[134087]:  osdx.utils.xos cmd error: sudo sysctl net.netflow.sndbuf=0
2025-06-24 12:36:04.982314 daemon-err , modulelauncher[134087]:  Command 'sudo sysctl net.netflow.sndbuf=0' returned non-zero exit status 1.
2025-06-24 12:37:01.129881 user-err , ERROR:  Dissociating VRF from service: cnm
2025-06-24 12:37:01.205174 daemon-err , staticd[66239]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF RED in VRF 266
2025-06-24 12:37:45.890192 daemon-err , cfgd[1460]:  [127378]Command output: Identity name must be between 1 and 63 characters long and must contain only printed characters (no spaces allowed) Value validation failed
2025-06-24 12:39:17.105007 user-err , ERROR:  Dissociating VRF from service: cnm
2025-06-24 12:39:17.193098 daemon-err , staticd[66239]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan3 in VRF 271
2025-06-24 12:39:17.280965 daemon-err , staticd[66239]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant2 in VRF 270
2025-06-24 12:39:17.360906 daemon-err , staticd[66239]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan2 in VRF 269
2025-06-24 12:39:17.445019 daemon-err , staticd[66239]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF wan1 in VRF 268
2025-06-24 12:39:17.557008 daemon-err , staticd[66239]:  [VCGF0-X62M1][EC 100663301] INTERFACE_STATE: Cannot find IF tenant1 in VRF 267
2025-06-24 12:40:00.263820 daemon-err , ntpd[143498]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:00.263842 daemon-err , ntpd[143498]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:00.750017 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+7sryFrCRRCcpKQxzhVz3A/C9KuRnl5yo=] finished with status 1
2025-06-24 12:40:00.750076 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:40:00.750092 daemon-err , cfgd[1460]:  \"U2FsdGVkX1+7sryFrCRRCcpKQxzhVz3A/C9KuRnl5yo=\" strong-password: score is too weak
2025-06-24 12:40:00.750107 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:40:00.752253 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+7sryFrCRRCcpKQxzhVz3A/C9KuRnl5yo=\" strong-password: score is too weak Commit validation failed
2025-06-24 12:40:05.257002 daemon-err , ntpd[143656]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:05.257040 daemon-err , ntpd[143656]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:05.857266 daemon-err , ntpd[143695]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:05.857462 daemon-err , ntpd[143695]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:06.562051 daemon-err , ntpd[143734]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:06.562223 daemon-err , ntpd[143734]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:07.224318 daemon-err , ntpd[143773]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:07.224514 daemon-err , ntpd[143773]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:07.905043 daemon-err , ntpd[143812]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:07.905057 daemon-err , ntpd[143812]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:08.564806 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/bkTdXW4L6OaLCNvoG0tLgq5V/CAM9C5c=] finished with status 1
2025-06-24 12:40:08.564872 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:40:08.564890 daemon-err , cfgd[1460]:  \"U2FsdGVkX1/bkTdXW4L6OaLCNvoG0tLgq5V/CAM9C5c=\" strong-password: score is too weak
2025-06-24 12:40:08.564907 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:40:08.566765 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/bkTdXW4L6OaLCNvoG0tLgq5V/CAM9C5c=\" strong-password: score is too weak Commit validation failed
2025-06-24 12:40:09.215027 daemon-err , ntpd[143882]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:09.215042 daemon-err , ntpd[143882]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:09.851501 daemon-err , ntpd[143921]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:09.851642 daemon-err , ntpd[143921]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:10.524442 daemon-err , ntpd[143960]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:10.524462 daemon-err , ntpd[143960]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:11.148032 daemon-err , ntpd[143999]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:11.148047 daemon-err , ntpd[143999]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:11.669828 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/bkTdXW4L6OaLCNvoG0tLgq5V/CAM9C5c=] finished with status 1
2025-06-24 12:40:11.669891 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:40:11.669919 daemon-err , cfgd[1460]:  \"U2FsdGVkX1/bkTdXW4L6OaLCNvoG0tLgq5V/CAM9C5c=\" strong-password: score is too weak
2025-06-24 12:40:11.669945 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:40:11.671471 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/bkTdXW4L6OaLCNvoG0tLgq5V/CAM9C5c=\" strong-password: score is too weak Commit validation failed
2025-06-24 12:40:12.352929 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/bkTdXW4L6OayFQX9sdpIhExJ2ccvgHmo=] finished with status 1
2025-06-24 12:40:12.352986 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:40:12.353014 daemon-err , cfgd[1460]:  \"U2FsdGVkX1/bkTdXW4L6OayFQX9sdpIhExJ2ccvgHmo=\" strong-password: score is too weak
2025-06-24 12:40:12.353044 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:40:12.354420 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/bkTdXW4L6OayFQX9sdpIhExJ2ccvgHmo=\" strong-password: score is too weak Commit validation failed
2025-06-24 12:40:12.981996 daemon-err , ntpd[144096]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:12.982184 daemon-err , ntpd[144096]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:13.666665 daemon-err , ntpd[144135]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:13.666679 daemon-err , ntpd[144135]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:14.341376 daemon-err , ntpd[144174]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:14.341570 daemon-err , ntpd[144174]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:14.993821 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/bkTdXW4L6OaLCNvoG0tLgq5V/CAM9C5c=] finished with status 1
2025-06-24 12:40:14.993881 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:40:14.993903 daemon-err , cfgd[1460]:  \"U2FsdGVkX1/bkTdXW4L6OaLCNvoG0tLgq5V/CAM9C5c=\" strong-password: score is too weak
2025-06-24 12:40:14.993923 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:40:14.995465 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/bkTdXW4L6OaLCNvoG0tLgq5V/CAM9C5c=\" strong-password: score is too weak Commit validation failed
2025-06-24 12:40:15.621551 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/bkTdXW4L6OayFQX9sdpIhExJ2ccvgHmo=] finished with status 1
2025-06-24 12:40:15.621614 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:40:15.621642 daemon-err , cfgd[1460]:  \"U2FsdGVkX1/bkTdXW4L6OayFQX9sdpIhExJ2ccvgHmo=\" strong-password: score is too weak
2025-06-24 12:40:15.621673 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:40:15.623387 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/bkTdXW4L6OayFQX9sdpIhExJ2ccvgHmo=\" strong-password: score is too weak Commit validation failed
2025-06-24 12:40:16.244729 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/bkTdXW4L6OX9dg0SlHzFww0z2YULZVv0=] finished with status 1
2025-06-24 12:40:16.244801 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:40:16.244836 daemon-err , cfgd[1460]:  \"U2FsdGVkX1/bkTdXW4L6OX9dg0SlHzFww0z2YULZVv0=\" strong-password: score is too weak
2025-06-24 12:40:16.244862 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:40:16.246464 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/bkTdXW4L6OX9dg0SlHzFww0z2YULZVv0=\" strong-password: score is too weak Commit validation failed
2025-06-24 12:40:16.927867 daemon-err , ntpd[144299]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:16.928045 daemon-err , ntpd[144299]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:17.573927 daemon-err , ntpd[144338]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:17.573941 daemon-err , ntpd[144338]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:18.162681 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/bkTdXW4L6OaLCNvoG0tLgq5V/CAM9C5c=] finished with status 1
2025-06-24 12:40:18.162724 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:40:18.162741 daemon-err , cfgd[1460]:  \"U2FsdGVkX1/bkTdXW4L6OaLCNvoG0tLgq5V/CAM9C5c=\" strong-password: score is too weak
2025-06-24 12:40:18.162758 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:40:18.164000 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/bkTdXW4L6OaLCNvoG0tLgq5V/CAM9C5c=\" strong-password: score is too weak Commit validation failed
2025-06-24 12:40:18.813694 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/bkTdXW4L6OayFQX9sdpIhExJ2ccvgHmo=] finished with status 1
2025-06-24 12:40:18.813742 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:40:18.813758 daemon-err , cfgd[1460]:  \"U2FsdGVkX1/bkTdXW4L6OayFQX9sdpIhExJ2ccvgHmo=\" strong-password: score is too weak
2025-06-24 12:40:18.813777 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:40:18.815327 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/bkTdXW4L6OayFQX9sdpIhExJ2ccvgHmo=\" strong-password: score is too weak Commit validation failed
2025-06-24 12:40:19.369712 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/bkTdXW4L6OX9dg0SlHzFww0z2YULZVv0=] finished with status 1
2025-06-24 12:40:19.369758 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:40:19.369776 daemon-err , cfgd[1460]:  \"U2FsdGVkX1/bkTdXW4L6OX9dg0SlHzFww0z2YULZVv0=\" strong-password: score is too weak
2025-06-24 12:40:19.369791 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:40:19.371347 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/bkTdXW4L6OX9dg0SlHzFww0z2YULZVv0=\" strong-password: score is too weak Commit validation failed
2025-06-24 12:40:19.986033 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/bkTdXW4L6OXRXHV4NJ+EVF56qFppCY/g=] finished with status 1
2025-06-24 12:40:19.986081 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:40:19.986097 daemon-err , cfgd[1460]:  \"U2FsdGVkX1/bkTdXW4L6OXRXHV4NJ+EVF56qFppCY/g=\" strong-password: score is too weak
2025-06-24 12:40:19.986111 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:40:19.987662 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/bkTdXW4L6OXRXHV4NJ+EVF56qFppCY/g=\" strong-password: score is too weak Commit validation failed
2025-06-24 12:40:26.304908 daemon-err , ntpd[144611]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:26.304922 daemon-err , ntpd[144611]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:33.131548 daemon-err , ntpd[144805]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:33.131587 daemon-err , ntpd[144805]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:39.596353 daemon-err , cfgd[1460]:  [127378]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-06-24 12:40:39.971299 daemon-err , cfgd[1460]:  [127378]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-06-24 12:40:41.425701 daemon-err , ntpd[145054]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:41.425723 daemon-err , ntpd[145054]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:42.118025 daemon-err , ntpd[145094]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:42.118044 daemon-err , ntpd[145094]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:42.761662 daemon-err , ntpd[145133]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:42.761682 daemon-err , ntpd[145133]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:50.875002 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1+LmORfs6W1PFWnuIxvsyHgk6H6ysN8guA=] finished with status 1
2025-06-24 12:40:50.875065 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:40:50.875097 daemon-err , cfgd[1460]:  \"U2FsdGVkX1+LmORfs6W1PFWnuIxvsyHgk6H6ysN8guA=\" strong-password: score is too weak
2025-06-24 12:40:50.875118 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:40:50.877068 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1+LmORfs6W1PFWnuIxvsyHgk6H6ysN8guA=\" strong-password: score is too weak Commit validation failed
2025-06-24 12:40:51.676838 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/iGBsYG+r0BLXlDMhqJTa2vWyoOy4GiUo=] finished with status 1
2025-06-24 12:40:51.676904 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:40:51.676928 daemon-err , cfgd[1460]:  \"U2FsdGVkX1/iGBsYG+r0BLXlDMhqJTa2vWyoOy4GiUo=\" strong-password: score is too weak
2025-06-24 12:40:51.676948 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:40:51.678624 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/iGBsYG+r0BLXlDMhqJTa2vWyoOy4GiUo=\" strong-password: score is too weak Commit validation failed
2025-06-24 12:40:52.435206 daemon-err , ntpd[145541]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:52.435410 daemon-err , ntpd[145541]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:40:57.201313 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX186rO4p9GuEVzKw0Uadn9oRkKWVtCVJ6yY=] finished with status 2
2025-06-24 12:40:57.201376 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:40:57.201403 daemon-err , cfgd[1460]:  \"U2FsdGVkX186rO4p9GuEVzKw0Uadn9oRkKWVtCVJ6yY=\" strong-password: not long enough
2025-06-24 12:40:57.201426 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:40:57.202855 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX186rO4p9GuEVzKw0Uadn9oRkKWVtCVJ6yY=\" strong-password: not long enough Commit validation failed
2025-06-24 12:40:57.937301 daemon-err , ntpd[145725]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:40:57.937315 daemon-err , ntpd[145725]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:41:04.206759 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/ceMJ9zLe0IUKhmipabwj8Lrlbumzz7wI=] finished with status 3
2025-06-24 12:41:04.206816 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:41:04.206833 daemon-err , cfgd[1460]:  \"U2FsdGVkX1/ceMJ9zLe0IUKhmipabwj8Lrlbumzz7wI=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2025-06-24 12:41:04.206881 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:41:04.208611 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/ceMJ9zLe0IUKhmipabwj8Lrlbumzz7wI=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed
2025-06-24 12:41:05.139122 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX18YfMHzD75rSnj6lYeLyoL5pUABiCNytPA=] finished with status 3
2025-06-24 12:41:05.139169 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:41:05.139186 daemon-err , cfgd[1460]:  \"U2FsdGVkX18YfMHzD75rSnj6lYeLyoL5pUABiCNytPA=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2025-06-24 12:41:05.139201 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:41:05.140668 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX18YfMHzD75rSnj6lYeLyoL5pUABiCNytPA=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed
2025-06-24 12:41:05.782227 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX1/+hUupZoMvX1oFELVTTIluiAim94zx3qA=] finished with status 3
2025-06-24 12:41:05.782281 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:41:05.782310 daemon-err , cfgd[1460]:  \"U2FsdGVkX1/+hUupZoMvX1oFELVTTIluiAim94zx3qA=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters
2025-06-24 12:41:05.782334 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:41:05.783919 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX1/+hUupZoMvX1oFELVTTIluiAim94zx3qA=\" strong-password: doesn't have uppercase, lowercase, numbers and special characters Commit validation failed
2025-06-24 12:41:06.366297 daemon-err , cfgd[1460]:  External python command [cfg.strong_password check_password system ntp authentication-key 1 encrypted-key U2FsdGVkX19jf1QOqF8ElXL4Ge/mlK0lsyRrBk+qAcM=] finished with status 1
2025-06-24 12:41:06.366342 daemon-err , cfgd[1460]:  [ system ntp authentication-key 1 encrypted-key ]
2025-06-24 12:41:06.366371 daemon-err , cfgd[1460]:  \"U2FsdGVkX19jf1QOqF8ElXL4Ge/mlK0lsyRrBk+qAcM=\" strong-password: score is too weak
2025-06-24 12:41:06.366390 daemon-err , cfgd[1460]:  Commit validation failed
2025-06-24 12:41:06.367796 daemon-err , cfgd[1460]:  [127378]Command output: [ system ntp authentication-key 1 encrypted-key ] \"U2FsdGVkX19jf1QOqF8ElXL4Ge/mlK0lsyRrBk+qAcM=\" strong-password: score is too weak Commit validation failed
2025-06-24 12:41:07.000195 daemon-err , ntpd[145969]:  AUTH: authreadkeys: reading /etc/ntp.keys
2025-06-24 12:41:07.000214 daemon-err , ntpd[145969]:  AUTH: authreadkeys: added 1 keys
2025-06-24 12:41:07.351234 daemon-err , cfgd[1460]:  [127378]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-06-24 12:41:07.747514 daemon-err , cfgd[1460]:  [127378]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-06-24 12:41:08.117224 daemon-err , cfgd[1460]:  [127378]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-06-24 12:41:08.483824 daemon-err , cfgd[1460]:  [127378]Command output: Login password too weak, too short and/or has not lowercase, uppercase and special characters Value validation failed
2025-06-24 12:41:16.529041 user-crit , systemd-coredump[146291]:  Process 146225 (cnm-client) of user 0 dumped core.  Module libsystemd.so.0 from deb systemd-252.36-1~deb12u1.amd64 Stack trace of thread 146225: #0  0x00007fa6c0e59a9c pselect (libc.so.6 + 0xfea9c) #1  0x000055bdb5e2b2ef n/a (cnm-client + 0x532ef) #2  0x000055bdb5e2d05f n/a (cnm-client + 0x5505f) #3  0x000055bdb5e0394b n/a (cnm-clie
nt + 0x2b94b) #4  0x00007fa6c0d8224a n/a (libc.so.6 + 0x2724a) #5  0x00007fa6c0d82305 __libc_start_main (libc.so.6 + 0x27305) #6  0x000055bdb5e0af61 n/a (cnm-client + 0x32f61) ELF object binary architecture: AMD x86-64
2025-06-24 12:41:30.337712 user-crit , systemd-coredump[146410]:  Process 146344 (cnm-client) of user 0 dumped core.  Module libsystemd.so.0 from deb systemd-252.36-1~deb12u1.amd64 Stack trace of thread 146344: #0  0x00007f466f229a9c pselect (libc.so.6 + 0xfea9c) #1  0x0000561afae512ef n/a (cnm-client + 0x532ef) #2  0x0000561afae5305f n/a (cnm-client + 0x5505f) #3  0x0000561afae2994b n/a (cnm-clie
nt + 0x2b94b) #4  0x00007f466f15224a n/a (libc.so.6 + 0x2724a) #5  0x00007f466f152305 __libc_start_main (libc.so.6 + 0x27305) #6  0x0000561afae30f61 n/a (cnm-client + 0x32f61) ELF object binary architecture: AMD x86-64
2025-06-24 12:41:44.191115 local0-info , coredump-cleanup:  Removed old coredump core.cnm-client.0.4c45e4bf50804df29e629988589e13c3.146225.1750768876000000.zst.
2025-06-24 12:41:44.390577 user-crit , systemd-coredump[146540]:  Process 146467 (cnm-client) of user 0 dumped core.  Module libsystemd.so.0 from deb systemd-252.36-1~deb12u1.amd64 Stack trace of thread 146467: #0  0x00007f64b9325a9c pselect (libc.so.6 + 0xfea9c) #1  0x0000558de464b2ef n/a (cnm-client + 0x532ef) #2  0x0000558de464d05f n/a (cnm-client + 0x5505f) #3  0x0000558de462394b n/a (cnm-clie
nt + 0x2b94b) #4  0x00007f64b924e24a n/a (libc.so.6 + 0x2724a) #5  0x00007f64b924e305 __libc_start_main (libc.so.6 + 0x27305) #6  0x0000558de462af61 n/a (cnm-client + 0x32f61) ELF object binary architecture: AMD x86-64
2025-06-24 12:41:55.051329 user-crit , systemd-coredump[146895]:  Process 146828 (cnm-client) of user 0 dumped core.  Module libsystemd.so.0 from deb systemd-252.36-1~deb12u1.amd64 Stack trace of thread 146828: #0  0x00007fee3c8fda9c pselect (libc.so.6 + 0xfea9c) #1  0x00005581446742ef n/a (cnm-client + 0x532ef) #2  0x000055814467605f n/a (cnm-client + 0x5505f) #3  0x000055814464c94b n/a (cnm-clie
nt + 0x2b94b) #4  0x00007fee3c82624a n/a (libc.so.6 + 0x2724a) #5  0x00007fee3c826305 __libc_start_main (libc.so.6 + 0x27305) #6  0x0000558144653f61 n/a (cnm-client + 0x32f61) ELF object binary architecture: AMD x86-64
2025-06-24 12:42:08.726430 local0-info , coredump-cleanup:  Removed old coredump core.cnm-client.0.4c45e4bf50804df29e629988589e13c3.146828.1750768914000000.zst.
2025-06-24 12:42:08.867575 user-crit , systemd-coredump[147019]:  Process 146948 (cnm-client) of user 0 dumped core.  Module libsystemd.so.0 from deb systemd-252.36-1~deb12u1.amd64 Stack trace of thread 146948: #0  0x00007f63dbf1ea9c pselect (libc.so.6 + 0xfea9c) #1  0x00005607b32aa2ef n/a (cnm-client + 0x532ef) #2  0x00005607b32ac05f n/a (cnm-client + 0x5505f) #3  0x00005607b328294b n/a (cnm-clie
nt + 0x2b94b) #4  0x00007f63dbe4724a n/a (libc.so.6 + 0x2724a) #5  0x00007f63dbe47305 __libc_start_main (libc.so.6 + 0x27305) #6  0x00005607b3289f61 n/a (cnm-client + 0x32f61) ELF object binary architecture: AMD x86-64
2025-03-22 00:00:02.679309 user-crit , systemd-coredump[147364]:  Process 147298 (cnm-client) of user 0 dumped core.  Module libsystemd.so.0 from deb systemd-252.36-1~deb12u1.amd64 Stack trace of thread 147298: #0  0x00007f7840ed3a9c pselect (libc.so.6 + 0xfea9c) #1  0x00005641fac212ef n/a (cnm-client + 0x532ef) #2  0x00005641fac2305f n/a (cnm-client + 0x5505f) #3  0x00005641fabf994b n/a (cnm-clie
nt + 0x2b94b) #4  0x00007f7840dfc24a n/a (libc.so.6 + 0x2724a) #5  0x00007f7840dfc305 __libc_start_main (libc.so.6 + 0x27305) #6  0x00005641fac00f61 n/a (cnm-client + 0x32f61) ELF object binary architecture: AMD x86-64
2025-03-23 00:01:01.835716 local0-info , coredump-cleanup:  Removed old coredump core.cnm-client.0.4c45e4bf50804df29e629988589e13c3.147298.1742601602000000.zst.
2025-03-23 00:01:02.043603 user-crit , systemd-coredump[147484]:  Process 147459 (cnm-client) of user 0 dumped core.  Module libsystemd.so.0 from deb systemd-252.36-1~deb12u1.amd64 Stack trace of thread 147459: #0  0x00007fe7ae029a9c pselect (libc.so.6 + 0xfea9c) #1  0x00005586beb9d2ef n/a (cnm-client + 0x532ef) #2  0x00005586beb9f05f n/a (cnm-client + 0x5505f) #3  0x00005586beb7594b n/a (cnm-clie
nt + 0x2b94b) #4  0x00007fe7adf5224a n/a (libc.so.6 + 0x2724a) #5  0x00007fe7adf52305 __libc_start_main (libc.so.6 + 0x27305) #6  0x00005586beb7cf61 n/a (cnm-client + 0x32f61) ELF object binary architecture: AMD x86-64
2025-03-24 00:02:00.128564 local0-info , coredump-cleanup:  Removed old coredump core.cnm-client.0.4c45e4bf50804df29e629988589e13c3.147459.1742688061000000.zst.
2025-06-24 12:42:36.976044 daemon-err , cfgd[1460]:  [147500]Command output: File name reserved Value validation failed
2025-06-24 12:42:42.399410 daemon-notice , cfgd[1460]:  [147500]Completed change to active configuration
2025-06-24 12:42:42.401687 auth-notice , OSDxCLI:  User 'admin' committed the configuration.
2025-06-24 12:42:42.419072 auth-notice , OSDxCLI:  User 'admin' left the configuration menu.
2025-06-24 12:42:42.547757 auth-notice , OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog File

Description

Create a new DHCP server and collect all the syslog messages produced by systemd.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

systemd\[1\]:\s+Started.*"DHCP Server Service instance main"\.
Show output
2025-06-24 12:42:50.230220 daemon-info , systemd[1]:  Created slice system-dhcpd.slice - Slice /system/dhcpd.
2025-06-24 12:42:50.246039 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog File Rotate

Description

Create a new DHCP server and collect all syslog messages produced by systemd. This test also rotates 10 saved files when a file weighing 100 kbytes is used.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 192.168.100.100/24
set service dhcp-server shared-network test subnet 192.168.100.0/24 start 192.168.100.150 stop 192.168.100.155
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file systemd_msg archive files 10
set system syslog file systemd_msg archive size 100
set system syslog file systemd_msg filter def app systemd
set system syslog file systemd_msg filter def level info

Step 3: Run command file show running://log/user/systemd_msg/systemd_msg | cat at DUT0 and check if output matches the following regular expressions:

Started.*"DHCP Server Service instance main"\.
Show output
2025-06-24 12:42:56.554789 daemon-info , systemd[1]:  Started dhcpd@main.service - "DHCP Server Service instance main".

Test Syslog Regex

Description

Create a new syslog file and collect all the syslog messages matching a specified regex.

Scenario

Step 1: Set the following configuration in DUT0 :

set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog file cli_msg filter CLI app OSDxCLI
set system syslog file cli_msg filter CLI level notice
set system syslog file cli_msg filter CLI regex '(^|[^a-zA-Z0-9_])alert([^a-zA-Z0-9_]|$)'

Step 2: Run command command with alert word at DUT0 and expect this output:

Show output
Command validation failed:
CLI Error: Invalid token [command]
CLI Error: Command error

Step 3: Run command command with alerted word at DUT0 and expect this output:

Show output
Command validation failed:
CLI Error: Invalid token [command]
CLI Error: Command error

Step 4: Run command file show running://log/user/cli_msg/cli_msg | cat at DUT0 and expect this output:

Show output
2025-06-24 12:43:03.767315 auth-notice , OSDxCLI:  User 'admin' entered an invalid command: 'command with alert word'.

Test Syslog Remote

Description

Add a remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.152 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.152/0.152/0.152/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-24T12:43:09.978422+00:00 10.215.168.64  2025-06-24T12:43:09.523685+00:00 daemon-notice osdx cfgd[1460]:  [147500]Completed change to active configuration
2025-06-24T12:43:09.991782+00:00 10.215.168.64  2025-06-24T12:43:09.537171+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-24T12:43:10.009362+00:00 10.215.168.64  2025-06-24T12:43:09.554807+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-24T12:43:10.166332+00:00 10.215.168.64  2025-06-24T12:43:09.711712+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-06-24T12:43:10.236437+00:00 10.215.168.64  2025-06-24T12:43:09.781811+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With VRF

Description

Add a remote host to send syslog messages through a VRF and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.168 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.168/0.168/0.168/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-24T12:43:10.702942+00:00 10.215.168.64  2025-06-24T12:43:10.248209+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-06-24T12:43:10.783051+00:00 10.215.168.64  2025-06-24T12:43:10.328260+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-06-24T12:43:10.788489+00:00 10.215.168.64  2025-06-24T12:43:10.333717+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-06-24T12:43:10.997862+00:00 10.215.168.64  2025-06-24T12:43:10.543058+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-06-24T12:43:11.012594+00:00 10.215.168.64  2025-06-24T12:43:10.557802+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-06-24T12:43:11.969923+00:00 10.215.168.64  2025-06-24T12:43:11.514850+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-06-24T12:43:12.068362+00:00 10.215.168.64  2025-06-24T12:43:11.613299+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-06-24T12:43:12.167543+00:00 10.215.168.64  2025-06-24T12:43:11.712446+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-06-24T12:43:12.265951+00:00 10.215.168.64  2025-06-24T12:43:11.810764+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-06-24T12:43:12.346073+00:00 10.215.168.64  2025-06-24T12:43:11.890940+00:00 daemon-info osdx ubnt-cfgd[149218]:  inactive
2025-06-24T12:43:16.165090+00:00 10.215.168.64  2025-06-24T12:43:15.813052+00:00 daemon-notice osdx cfgd[1460]:  [147500]Completed change to active configuration
2025-06-24T12:43:16.176857+00:00 10.215.168.64  2025-06-24T12:43:15.824948+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-24T12:43:16.208331+00:00 10.215.168.64  2025-06-24T12:43:15.856394+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-24T12:43:16.440909+00:00 10.215.168.64  2025-06-24T12:43:16.088919+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-06-24T12:43:16.520364+00:00 10.215.168.64  2025-06-24T12:43:16.168349+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Interface

Description

Add a remote host to send syslog messages through a specific interface and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-interface eth0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.124 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.124/0.124/0.124/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-24T12:43:16.929503+00:00 10.215.168.64  2025-06-24T12:43:16.572719+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-06-24T12:43:17.007702+00:00 10.215.168.64  2025-06-24T12:43:16.655609+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-06-24T12:43:17.012772+00:00 10.215.168.64  2025-06-24T12:43:16.660707+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-06-24T12:43:17.214988+00:00 10.215.168.64  2025-06-24T12:43:16.862883+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-06-24T12:43:17.230105+00:00 10.215.168.64  2025-06-24T12:43:16.877810+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-06-24T12:43:18.074865+00:00 10.215.168.64  2025-06-24T12:43:17.722512+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-06-24T12:43:18.176888+00:00 10.215.168.64  2025-06-24T12:43:17.824536+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-06-24T12:43:18.270925+00:00 10.215.168.64  2025-06-24T12:43:17.918559+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-06-24T12:43:18.411675+00:00 10.215.168.64  2025-06-24T12:43:18.053601+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-06-24T12:43:18.519845+00:00 10.215.168.64  2025-06-24T12:43:18.167422+00:00 daemon-info osdx ubnt-cfgd[149555]:  inactive
2025-06-24T12:43:22.254549+00:00 10.215.168.64  2025-06-24T12:43:21.654447+00:00 daemon-notice osdx cfgd[1460]:  [147500]Completed change to active configuration
2025-06-24T12:43:22.268643+00:00 10.215.168.64  2025-06-24T12:43:21.668693+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-24T12:43:22.285244+00:00 10.215.168.64  2025-06-24T12:43:21.685306+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-24T12:43:22.431370+00:00 10.215.168.64  2025-06-24T12:43:21.831396+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-06-24T12:43:22.491271+00:00 10.215.168.64  2025-06-24T12:43:21.891259+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and UDP

Description

Add a remote host to send syslog messages through a specific local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.140 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.140/0.140/0.140/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-24T12:43:28.622882+00:00 33.33.33.33  2025-06-24T12:43:27.838547+00:00 daemon-notice osdx cfgd[1460]:  [147500]Completed change to active configuration
2025-06-24T12:43:28.634743+00:00 33.33.33.33  2025-06-24T12:43:27.850478+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-24T12:43:28.681809+00:00 33.33.33.33  2025-06-24T12:43:27.897649+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-24T12:43:28.819145+00:00 33.33.33.33  2025-06-24T12:43:28.034828+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-06-24T12:43:28.881058+00:00 33.33.33.33  2025-06-24T12:43:28.096865+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote With Local-address and VRF

Description

Add a remote host to send syslog messages through a VRF and a local-address and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces ethernet eth0 vrf VRF0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 local-vrf VRF0
set system syslog host 10.215.168.1 port 514
set system syslog host 10.215.168.1 protocol udp
set system vrf VRF0

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1
Show output
ping: Warning: source address might be selected on device other than: VRF0
PING 10.215.168.1 (10.215.168.1) from 10.215.168.64 VRF0: 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.147 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.147/0.147/0.147/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-24T12:43:29.456613+00:00 33.33.33.33  2025-06-24T12:43:28.672216+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show version'.
2025-06-24T12:43:29.505583+00:00 33.33.33.33  2025-06-24T12:43:28.721246+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-06-24T12:43:29.510691+00:00 33.33.33.33  2025-06-24T12:43:28.726406+00:00 authpriv-warning osdx sudo:  pam_limits(sudo:session): invalid line '@200:215#011hard#011maxlogins#011' - skipped
2025-06-24T12:43:29.865324+00:00 33.33.33.33  2025-06-24T12:43:29.080936+00:00 user-warning osdx OSDxCLI:  Signal 10 received
2025-06-24T12:43:29.880495+00:00 33.33.33.33  2025-06-24T12:43:29.095866+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'set system mode user'.
2025-06-24T12:43:30.957852+00:00 33.33.33.33  2025-06-24T12:43:30.173193+00:00 auth-notice osdx OSDxCLI:  User 'admin' entered the configuration menu.
2025-06-24T12:43:31.056469+00:00 33.33.33.33  2025-06-24T12:43:30.271744+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'delete '.
2025-06-24T12:43:31.183318+00:00 33.33.33.33  2025-06-24T12:43:30.398511+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'set system login user admin authentication encrypted-password $6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'.
2025-06-24T12:43:31.303797+00:00 33.33.33.33  2025-06-24T12:43:30.519011+00:00 auth-notice osdx OSDxCLI:  User 'admin' added a new cfg line: 'show working'.
2025-06-24T12:43:31.406967+00:00 33.33.33.33  2025-06-24T12:43:30.622186+00:00 daemon-info osdx ubnt-cfgd[150217]:  inactive
2025-06-24T12:43:35.376359+00:00 33.33.33.33  2025-06-24T12:43:34.999932+00:00 daemon-notice osdx cfgd[1460]:  [147500]Completed change to active configuration
2025-06-24T12:43:35.376359+00:00 33.33.33.33  2025-06-24T12:43:35.000189+00:00 syslog-warning osdx rsyslogd:  bound address 33.33.33.33 IP free [v8.2302.0 try https://www.rsyslog.com/e/2186 ]
2025-06-24T12:43:35.391777+00:00 33.33.33.33  2025-06-24T12:43:35.015550+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-24T12:43:35.422698+00:00 33.33.33.33  2025-06-24T12:43:35.046460+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-24T12:43:35.620403+00:00 33.33.33.33  2025-06-24T12:43:35.244149+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 vrf VRF0 count 1 size 56 timeout 1'.
2025-06-24T12:43:35.681444+00:00 33.33.33.33  2025-06-24T12:43:35.305181+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Single TLS

Description

Add a secured remote host to send syslog messages and show the host name.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.115 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.115/0.115/0.115/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/10.215.168.64/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-24T12:43:41.810612+00:00 10.215.168.64  2025-06-24T12:43:40.798600+00:00 daemon-notice osdx cfgd[1460]:  [147500]Completed change to active configuration
2025-06-24T12:43:41.855388+00:00 10.215.168.64  2025-06-24T12:43:40.810032+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-24T12:43:41.855388+00:00 10.215.168.64  2025-06-24T12:43:40.826263+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-24T12:43:41.855388+00:00 10.215.168.64  2025-06-24T12:43:40.963327+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-06-24T12:43:41.855388+00:00 10.215.168.64  2025-06-24T12:43:40.963377+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-06-24T12:43:41.855409+00:00 10.215.168.64  2025-06-24T12:43:41.014871+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-06-24T12:43:42.042980+00:00 10.215.168.64  2025-06-24T12:43:41.203612+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.

Test Syslog Remote Local Address Single TLS

Description

Add a secured remote host to send syslog messages and show the host name from a fiven local-address

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces dummy dum0 address 33.33.33.33/24
set interfaces ethernet eth0 address 10.215.168.64/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system syslog host 10.215.168.1 filter def level info
set system syslog host 10.215.168.1 local-address 33.33.33.33
set system syslog host 10.215.168.1 port 10514
set system syslog host 10.215.168.1 protocol tcp
set system syslog host 10.215.168.1 tls ca 'running://ca.crt'
set system syslog host 10.215.168.1 tls permitted-peer rsyslog.server.com

Step 2: Ping IP address 10.215.168.1 from DUT0:

admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1
Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data.
64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.229 ms

--- 10.215.168.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.229/0.229/0.229/0.000 ms

Step 3: Run command show host name at DUT0 and expect this output:

Show output
osdx

Note

Check the server /var/log/33.33.33.33/.log file and read the executed a new command: 'show host name' log message:

Show output
2025-06-24T12:43:48.480435+00:00 33.33.33.33  2025-06-24T12:43:48.177693+00:00 daemon-notice osdx cfgd[1460]:  [147500]Completed change to active configuration
2025-06-24T12:43:48.523567+00:00 33.33.33.33  2025-06-24T12:43:48.193116+00:00 auth-notice osdx OSDxCLI:  User 'admin' committed the configuration.
2025-06-24T12:43:48.523567+00:00 33.33.33.33  2025-06-24T12:43:48.228075+00:00 auth-notice osdx OSDxCLI:  User 'admin' left the configuration menu.
2025-06-24T12:43:48.523567+00:00 33.33.33.33  2025-06-24T12:43:48.374087+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'ping 10.215.168.1 count 1 size 56 timeout 1'.
2025-06-24T12:43:48.523567+00:00 33.33.33.33  2025-06-24T12:43:48.405614+00:00 syslog-warning osdx rsyslogd:  warning: certificate file is not set [v8.2302.0 try https://www.rsyslog.com/e/2330 ]
2025-06-24T12:43:48.523567+00:00 33.33.33.33  2025-06-24T12:43:48.405677+00:00 syslog-warning osdx rsyslogd:  warning: key file is not set [v8.2302.0 try https://www.rsyslog.com/e/2331 ]
2025-06-24T12:43:50.743436+00:00 33.33.33.33  2025-06-24T12:43:50.676663+00:00 auth-notice osdx OSDxCLI:  User 'admin' executed a new command: 'show host name'.