dux (Omnissa CLI)

This document contains instructions to install and use dux CLI which will be used to setup, deploy and perform operations of containers - Tunnel container, PAC Reader, SEG and EIC.

Table of Contents

Installation

Dux can be installed on Linux, Mac OS and Windows.

Installing dux for Linux

Dux for Linux (RHEL) can be installed using the package managers - yum or dnf.

Note: If you had installed the Beta version 2.0.0.3 earlier, please perform the following steps to cleanup before proceeding with installation:

# Remove dux.repo 
sudo rm /etc/yum.repos.d/dux.repo

#Clean the package manager cache
sudo yum clean all
or
sudo dnf clean all

Create dux.repo and install

$ cat << EOF | sudo tee /etc/yum.repos.d/dux.repo
[dux]
name=Omnissa CLI - dux
baseurl=https://packages.omnissa.com/ws1-tunnel/dux
enabled=1
gpgcheck=0
EOF

#If using yum:
$ sudo yum install -y dux 
# If using dnf 
$ sudo dnf install -y dux

After installation the following directory structures will be created:
/opt/omnissa/dux/
/opt/omnissa/dux/images/
/opt/omnissa/dux/logs/

$ cd /opt/omnissa/
$ ls -ltr
drwxr-xr-x. 4 root root 32 Feb 16 17:59 dux
$ cd dux/
$ ls -ltr
total 0
drwxr-xr-x. 2 root root 6 Feb 16 13:27 logs
drwxr-xr-x. 2 root root 6 Feb 16 13:27 images
$ which dux
/usr/bin/dux

Installing rpm package for Linux

Download the dux rpm as per the architecture of the host from where dux would be executed (x86_64 for AMD/Intel or aarch64 for ARM/Apple M1).
For example, if OS is Linux and Arch is amd64, the rpm dux--1.x86_64.rpm should to be downloaded.
The url to download the rpms for Dux 3.0 is as follows :
For AMD64/Intel: https://packages.omnissa.com/ws1-tunnel/dux/3.0.0.641/dux-3.0.0.641-1.x86_64.rpm
For ARM64/Apple Silicon: https://packages.omnissa.com/ws1-tunnel/dux/3.0.0.641/dux-3.0.0.641-1.aarch64.rpm

# download and install manually 
$ wget <url to download> Or download manually

$ sudo rpm -i dux-3.0.0.641-1.x86_64.rpm
installed
$ cd /opt/omnissa/
$ ls -ltr
drwxr-xr-x. 4 root root 32 Feb 16 17:59 dux
$ cd dux/
$ ls -ltr
total 0
drwxr-xr-x. 2 root root 6 Feb 16 13:27 logs
drwxr-xr-x. 2 root root 6 Feb 16 13:27 images
$ which dux
/usr/bin/dux

$ dux version
Omnissa CLI - dux
3.0.0.641

Note: If you had an older version of Dux package installed by rpm, please ensure to delete the package before installing

sudo rpm -e <package_name>

Installing dux for Mac OS

Dux can be installed on Mac OS using the package manager - brew.

$ brew tap wsonetunnel/tunnel
$ brew install dux

After installation the following directory structures will be created based on if you are using Mac on Intel (AMD64) or Mac on Apple Silicon (ARM):
For Mac OS on Intel/AMD64:
/usr/local/var/opt/omnissa/dux/
/usr/local/var/opt/omnissa/dux/images
/usr/local/var/opt/omnissa/dux/logs

For Mac OS on Apple Silicon/ARM64:
/opt/homebrew/var/opt/omnissa/dux/
/opt/homebrew/var/opt/omnissa/dux/images/
/opt/homebrew/var/opt/omnissa/dux/logs/`

# For example
$ cd /usr/local/var/opt/omnissa/dux/
$ ls -ltr
total 0
drwxr-xr-x. 2 root root 6 Feb 16 13:27 logs
drwxr-xr-x. 2 root root 6 Feb 16 13:27 images
$ which dux
/usr/local/bin/dux

The default path where dux looks for Tunnel container images is the directory images based on the platform as mentioned above.
The logs of execution of dux (dux.log, tunnel snap, vpnserver logs) are stored under the directory logs based on the platform as mentioned above.

To update the dux version for Mac OS if you had installed an older version earlier:

brew update
brew upgrade dux

Installing dux for Windows

To install Dux for Windows, download the msi installer from the url based on the architecture:
For AMD64/Intel: https://packages.omnissa.com/ws1-tunnel/dux/3.0.0.641/dux-windows-amd64.msi
For ARM64/Apple Silicon: https://packages.omnissa.com/ws1-tunnel/dux/3.0.0.641/dux-windows-arm64.msi

Installation Steps

  1. Download the MSI installer for your architecture from the URLs provided above.
  2. Run the MSI installer.
  3. Select an installation directory for Dux. The default installation directory is: C:\Program Files\Omnissa\Dux
  4. Follow the on-screen instructions to complete the installation.

Post-Installation Notes

After installation, the following directory structures will be created under the selected installation directory:
<INSTALL_DIR>\images
<INSTALL_DIR>\logs

Dux commands can be run from a Powershell/Command Prompt in Windows.
If Dux is installed in a protected directory (e.g., C:\Program Files), you must run PowerShell or Command Prompt as an administrator to execute Dux commands.

Usage

Check version of Dux cli

Get the version of Dux cli deployed

$ dux version 
Omnissa CLI - dux
3.0.0.641

Get list of commands supported:

$ dux help
CLI to deploy and manage containers based on the manifest file

Usage:
  dux [command]

Available Commands:
  eic         CLI to deploy and manage EIC containers
  pacreader   CLI to deploy and manage PAC Reader container
  seg         CLI to deploy and manage SEG containers
  tunnel      CLI to deploy and manage Tunnel containers
  version     Get the version of dux

Flags:
  -h, --help   Print help information

Use "dux [command] --help" for more information about a command.

Prerequisites

Deploying Different Containers Using Dux CLI

The dux CLI tool supports deploying and managing multiple types of containers, including Tunnel, PAC (Proxy Auto Configuration) Reader, SEG (Secure Email Gateway), and EIC (Endpoint Integrity Check) policy engine.
This section explains how to use dux to deploy and manage different containers based on the container type.

Initializing a Container

The dux init command prompts the user to select the container type they want to initialize. Based on the selection, the CLI generates a manifest file template specific to the selected container type. This manifest file contains the necessary configuration parameters for deploying the container.

Example:

$ dux init
Select a container type to initialize:
1. Tunnel
2. EIC
3. PAC Reader
4. SEG
Enter the number of the container type: 4
SEG manifest file successfully created at: /opt/omnissa/dux/seg_manifest.yml

The generated manifest file is stored in the default directory based on the platform as outlined in the Installation section.

Using Dux Commands with Single or Multiple Containers

** Behavior Based on Manifest Files **
If only one manifest file is present in the default directory, dux commands automatically use that manifest file.
If multiple manifest files are present, the user must select a container type or explicitly specify it in the command.
This flexibility allows users to manage multiple container types efficiently using the dux CLI tool.

Single Container Deployment

If only one type of container is deployed (i.e., only one manifest file is present in the default directory), all dux commands work as usual without requiring the user to specify the container type.
Example (if only ts_manifest.yml was present in the default directory):

$ dux status 

Status of Tunnel containers deployed

1. Host: 10.87.132.166	Status: Not Deployed

Multiple Container Deployment

If multiple containers are deployed or multiple manifest files are present in the default directory, dux commands prompt the user to select a container type before executing the command.
Example:

Multiple manifests found. Please select a container type:
1. Tunnel (/opt/omnissa/dux/ts_manifest.yml)
2. EIC (/opt/omnissa/dux/eic_manifest.yml)
3. SEG (/opt/omnissa/dux/seg_manifest.yml)

Enter the number of the container: 2

Status of EIC containers deployed

1. Host: 10.87.132.166	
Health check: 200 OK	Version: 1.5	State: RUNNING	Policy: READY	ALLOW: BLOCK: 0	

Explicitly Specifying Container Type

To avoid prompts, you can explicitly specify the container type in the command using the format:
Example:

$ dux eic status

Status of EIC containers deployed

1. Host: 10.87.132.166	
Health check: 200 OK	Version: 1.5	State: RUNNING	Policy: READY	BLOCK: ALLOW: 0	

For Tunnel container commands, dux commands can be specified as dux tunnel <dux_command> <args>

Steps to deploy Tunnel container

1.a. Execute init command

This command creates a sample manifest file for configuring Tunnel container for deployment.

Note that the init command should be run the first time a container type is deployed, as it generates the manifest template file necessary for deployment. If you wish to update a ts_manifest.yml of older version (2.2.0.247 or 2.3.0.405) please refer to the next sub-section 1.b
This command creates a sample manifest (ts_manifest.yml) and the performance tuning script (perf_tune.sh) under the directory dux based on the platform (by default). If you wish to use a different path where the files need to be created the command "dux init <some_path>" can be given. Please ensure to specify the path of manifest with -m option in the other commands.
The script perf_tune.sh contains commands to configure remote host settings for enhanced performance.
For example, in Linux VM where dux is installed:

$ dux init --help
Select a container type to initialize:
1. Tunnel
2. EIC
3. PAC Reader
4. SEG
Enter the number of the container type: 1
Create a manifest file for configuring Tunnel container details for deployment and management

Usage:
  dux tunnel init [path] [flags]

Examples:
	dux tunnel init                             # initialize manifest under default path (/opt/omnissa/dux/)
	dux tunnel init /some/path                  # initialize manifest under the specified path
	dux tunnel init -u -m /path/to/manifest.yml # update the specified manifest file
	dux tunnel init -u -n                       # hide the comments in the manifest file (-m for custom manifest file)
	dux tunnel init -u                          # update the default manifest file

Flags:
  -m, --manifest-file string   Custom manifest file path to update (default "/opt/omnissa/dux/ts_manifest.yml")
  -n, --no-comments            Hide comments in the manifest file. If not given, comments will be shown in the manifest file
  -u, --update                 Update the manifest file as per the latest version of dux

Global Flags:
  -h, --help      Print help information
  -v, --verbose   Show verbose logs
$ dux init
Select a container type to initialize:
1. Tunnel
2. EIC
3. PAC Reader
4. SEG
Enter the number of the container type: 1
Deployment manifest initialized successfully in /opt/omnissa/dux/

$cd /opt/omnissa/dux
abc@abc dux $ ls -ltr
total 16
drwxr-xr-x  3 abc  xyz    96 Feb 16 18:12 images
-rw-r--r--  1 abc  xyz   643 Feb 16 18:15 perf_tune.sh
-rw-r--r--  1 abc  xyz  2335 Feb 19 11:11 ts_manifest.yml
drwxr-xr-x  9 abc  xyz    288 Feb 19 11:11 logs

1.b Upgrade the manifest for Tunnel container

If Dux versions 2.2.0.247 or 2.3.0.405 is already installed and the Tunnel container manifest file has the configuration details, the manifest can be upgraded with the following command:

$ dux init -u
1. Tunnel
2. EIC
3. PAC Reader
4. SEG
Enter the number of the container type: 1
Updating comments in the manifest file
Manifest file backed up to: /opt/omnissa/dux/ts_manifest.yml.bak_2025-06-17_07-14-04
Manifest file updated successfully at /opt/omnissa/dux/ts_manifest.yml

Note that if an outdated version of manifest is used the commands will not work as before and a warning will be presented to upgrade the manifest.

$ dux status -m ./ts_2.3.yml 
Warning: Manifest version 2.3.0.405 is outdated. Current Dux version is 3.0.0.641
Please update the manifest with the command: `dux init -u` or `dux tunnel init -u` . Refer to `dux init -h` or `dux tunnel init -h` for details
error="Manifest version is not same as current version. Upgrade needed"

The backup of the original manifest is saved with the timestamp so that any changes can be verified/reverted if needed.
Once the manifest is upgraded, it is recommended to check the updated manifest manually, or test if the updated manifest works fine with either a dux deploy -d command or dux status command. Please update the new manifest as needed for using a newer Tunnel container image, or use the new features supported etc.

2. Edit ts_manifest.yml

Edit ts_manifest.yml generated in an editor of your choice.
Please refer to the section "Points to be noted while editing ts_manifest.yml" under Troubleshooting section.

Here are a few parameters:

image_name : Input details of tunnel container image to deploy

  # Enter the filename of the image to deploy below. 
  # This must match against the Tunnel container image filename from the default directory (refer to the note below) or the absolute path.
  # example: 29-2023.06.14-22e04910.tar.gz or /home/admin/29-2023.06.14-22e04910.tar.gz
  # Note: The default directory where the images are recommended to be present is:
  #   - for linux: /opt/omnissa/dux/images
  #   - for Mac OS on Intel/AMD64: /usr/local/var/opt/omnissa/dux/images/
  #   - for Mac OS on Apple Silicon/ARM64: /opt/homebrew/var/opt/omnissa/dux/images/
  #   - for Windows: <path of dux installation directory>/images 
  # Repository: Repository path of the image with the tag can be given as well:
  # For example: your-local-repo.com/<path>/tunnel-server:<tag>

#Copy the bundle to the working directory
# eg. in Linux: cp ~/Downloads/23.12.14-2023.12.12-95068395.tar.gz /opt/omnissa/dux/images/
$ ls -ltr /opt/omnissa/dux/images 
total 735112
-rw-r--r--@ 1 abc  xyz  376374902 Feb 16 18:12 23.12.14-2023.12.12-95068395.tar.gz
#image_name in manifest
    image_name: 23.12.14-2023.12.12-95068395.tar.gz

ssh_login_credentials

If all hosts have common authentication credentials, you may want to use the parameter - ssh_login_credentials.
However if you want to use different set of credentials for a host, the parameter host_info can be used. Refer to the sub-section which talks about hosts below.
For authentication, provide the ssh user name and ssh key path below

Please ensure to create a ssh key and copy the key to the remote VMs. Refer to https://linuxhint.com/generate-ssh-keys-on-linux/

If all hosts use a different SSH port other than 22, uncomment the ssh_port parameter and enter the port number. If not provided, default value of 22 will be used.

For example:

ssh_login_credentials:
  ssh_user: administrator
  # Input the path of ssh key - e.g /home/admin/id_rsa
  ssh_key_path: "/home/admin/id_rsa"
  ## Optional: Input the ssh port. Default value - 22
  #ssh_port:

ssh_host_key_check: Input if the identity of the remote host needs to be verified

SSH (Secure Shell) host key checking is a crucial security measure that helps verify the authenticity of a remote server before establishing a connection. When a client connects to a server for the first time, SSH presents the server's host key to the client. The client then checks this key against its list of known host keys to ensure it matches.

If the host key presented by the server matches an entry in the client's known_hosts file, the connection proceeds without interruption. However, if there's no match, SSH prompts the user to confirm the authenticity of the server by displaying the key fingerprint. This fingerprint serves as a unique identifier for the server's key.

The purpose of SSH host key checking is to prevent man-in-the-middle attacks, where an attacker intercepts communication between the client and server, posing as the legitimate server. By verifying the host key, SSH ensures that the client is connecting to the intended server and not a malicious entity.

By default the option to check host keys of remote VMs is enabled and the user will be prompted. If you do not wish to receive the prompts, ssh_host_key_check can be set to 0 to disable the check.

  # SSH Host key check - verify the identity of the remote host 
  # By default this is enabled and the user will be prompted to confirm the fingerprint of the public key of the remote host.
  # If disabled, dux will connect similar to the ssh option StrictHostKeyChecking=no and UserKnownHostsFile=/dev/null
  # 1 - enable host key checking
  # 0 - disable host key checking
  ssh_host_key_check: 1 

hosts: Input docker host information for Tunnel container deployment. Add an entry for each host.

Fill in the IP address / host name of the host where Tunnel container needs to be deployed and the server_role (Basic/cascade-FE or cascade-BE).
If Tunnel container has to be deployed in Basic mode, the value of server_role is 0.
If Tunnel container has to be deployed as FrontEnd server, the value of server_role is 1.
If Tunnel container has to be deployed as Backend server, the value of server_role is 2.

For example:

  hosts:
   # Enter IP address of the host below
    - address: 1.2.3.4

      # The deployment role for the server. 
      # 0 - basic mode
      # 1 - cascade mode - frontend
      # 2 - cascade mode - backend
      server_role: 1
host_info: For authentication info specific to this host, uncomment the parameters under the parameter host_info.

If both ssh_key_path and ssh_password are provided, ssh_key_path is preferred. Note that for security reasons, giving password information in manifest is not recommended. But it is still provided as an option.
The values can be passed as environment variables.
If all hosts have common ssh credential info, you may use the global parameter: ssh_login_credentials mentioned in the section above.
If both host_info and ssh_login_credentials are given, the credentials under host_info are preferred.

If the host uses a different SSH port other than 22, uncomment the ssh_port parameter and enter the port number. If not provided, default value of 22 will be used.
For example:

      host_info:
        ssh_user: admin
        ## Input the path of ssh key - e.g /home/admin/id_rsa
        ssh_key_path: /home/admin/id_rsa
        ## For security reasons, the ssh_password is not recommended. 
        #ssh_password: 
        ## Input the ssh port. Default value - 22
        #ssh_port:

subnet_range: Define Subnet range for Unique IP per device connection

To use the Unique IP per device connection feature supported from Tunnel container version 24.10 onwards, the subnet_range parameter can be defined per host. Note that this parameter should to be added only if the deployment role of the Tunnel container is basic or backend.
For example:

      ## If the deployment role for the server is basic/backend, please enter the CIDR for the IP range for devices corresponding to this Tunnel container deployment
      ##
      ## Example: subnet_range: 192.168.4.0/23

      subnet_range: 192.168.8.0/23

multi_nic_external_ip: If Multiple NICs are configured, specify the IP of the external NIC

If the customer needs to use a 2 NIC configuration - where one NIC is needed for unauthenticated traffic (External NIC) and another NIC for authenticated back-end traffic (Internal IP/host address), the provisioning needs to be done on the VM where tunnel container is to be deployed.
Dux will be running on a host in the Internal network, hence would be using the Internal IP for communication. The external IP can be given in the manifest using the parameter multi_nic_external_ip.
From Dux, the following security assessments would be done during deploy dry-run / deploy command to ensure security is not compromised if external IP is configured:

  1. Verify SSH is Not Listening on External IP - To ensure SSH is not accessible via the external IP on your machine, SSH should be configured to only listen on specific interfaces (internal IP, or 127.0.0.1 or any IPs explicitly configured) and not on all interfaces - 0.0.0.0 or external IP

  2. Port Scan for External IP : Ensure port 22 (the default SSH Port) is not open in the External IP

To specify the external IP, uncomment the multi_nic_external_ip parameter:

      # If external NIC is configured in the host machine where Tunnel container is deployed,
      # please specify the details of external IP of NIC2
      multi_nic_external_ip: 

perf_tune: Tune performance parameters/system configuration in remote host to support larger number of connections

If remote host has to be tuned with performance parameters, the value of perf_tune is 1 which is by default. This will execute perf_tune.sh in remote host.
If the user does not want to modify the system configuration in remote host, the value of perf_tune is 0.
For example:

# Tune performance parameters/system configuration in remote host to support larger number of connections
  # 1  - execute perf_tune.sh in the remote host
  # 0  - do not modify system configuration in remote host
  perf_tune: 1

If host entries need to be specified (e.g if outbound proxy is not in DNS in remote network ) in the remote host, specify the host names and ip addresses in this section.

  # Add entries to the container hosts file to manually link FQDN to IP address
  # Format:
  ## - host_name:
  ##   ip_address:
  host_entries:
    - host_name: example.com
      ip_address: 1.2.3.4

uem: Workspace ONE UEM Information

The details of UEM profile such as UEM url, Group Id/ tunnel configuration id, user name of the OG needs to be input in this section.
If tunnel_config_id is left blank, the organization Group ID is used to fetch the configuration.
Note that the tunnel_config_id parameter is supported only if UEM console supports multi-tunnel configuration feature which is from UEM Console version-23.06 onwards. If you are using an older UEM console version, please user group_id field.
Dux 3.0 supports specifying parameters to connect to Workspace ONE UEM API Server using OAuth.
Dux 3.0 supports specifying parameters to reach to UEM through Outbound proxy. Note that this is only used for the initial config download from UEM, the device traffic uses the Outbound proxy settings in Server traffic rules of UEM Console.

Example of configuration parameters related to UEM:

# Workspace ONE UEM Information
uem:
  # The Workspace ONE UEM API server URL. The destination URL must contain the protocol and hostname or IP address
  # Example: https://load-balancer.example.com
  url: https://wns-1.ssdevrd.com

  # Omnissa Tunnel Configuration ID configured in the Workspace ONE UEM Console.
  # This field is supported only if the UEM console supports multi-tunnel configuration feature (from UEM Console version 23.06 onwards).
  # If left blank, default configuration from the specified organization group will be fetched.
  tunnel_config_id: 27bff2e3-4c81-4c1a-a955-7de6b44c75be

  # The organization group ID in Workspace ONE UEM Console where Tunnel is configured.
  group_id:

  admin:
    # Starting with Tunnel container version 25.03, OAuth is the recommended authentication method
    # for securely connecting to the Workspace ONE UEM API server. This authentication method
    # provides improved security and scalability.
    #
    # Important: Older versions of the Tunnel container do not support OAuth. To maintain compatibility
    # ensure you use a version of DUX that support OAuth deployment. 
    oauth:
      # Client ID to download config from the Workspace ONE UEM API server.
      client_id: 41cbcadbe64e48d3b0be792cc2cd238d

      # Client Secret to download config from the Workspace ONE UEM API server.
      client_secret: 28C18ACFDAC1D0ED39E497D7C2BDD822

      # Oauth token Service endpoint url to download bearer token using Client ID and Client Secret.
      # This will be set to https://test.yatsworkspaceone.com/connect/token by default and can be overridden if needed.
      token_service_url:

    # Basic authentication is planned for deprecation in a future version due
    # to security concerns. It is recommended to use OAuth for authentication instead.
    #basic_auth:
      # The username to authenticate with the Workspace ONE UEM API server.
      #username:


  # Add details if Outbound Proxy needs to be configured to reach to UEM.
  outbound_proxy:
    # Format:
    # proxy_host - <http/https>://<hostname/ip>
    # If protocol is not specified, default value is http
    proxy_host: 
    # proxy_port - proxy port number. If not specified, default value is 80 for http and 443 for https
    proxy_port:
    # Outbound Proxy user name for proxy authorization; This optional field can be enabled by uncommenting the `proxy_user` parameter below.
    #proxy_user:

Note: The following sections assume that there is only ts_manifest.yml present in the default directory to deploy and manage Tunnel containers. Hence the commands are in format : dux <command> <args> format

3. Execute deploy command

Once the manifest is updated, deploy command can be run to deploy the Tunnel container in the hosts specified.

deploy help

$ dux deploy -h
Deploy Tunnel containers

Usage:
  dux tunnel deploy [flags]

Flags:
  -d, --dry-run                          Check if manifest is good to deploy
  -p, --ip stringArray                   Hostname or IP as specified in the manifest to deploy on a single host
  -m, --manifest-file string             Custom manifest file path (default "/opt/omnissa/dux/ts_manifest.yml")
  -n, --node-number stringArray          Node number as listed in manifest to deploy on a single host
  -o, --outbound-proxy-password string   Password to authenticate with the Outbound Proxy host
  -q, --quiet                            Quiet mode: interactive ssh password prompts are disabled
  -u, --uem-password string              Password to authenticate with the Workspace ONE UEM API server
  -y, --yes                              Auto accept all prompts

Global Flags:
  -h, --help      Print help information
  -v, --verbose   Show verbose logs

Check if manifest is good to run

To catch if there the manifest is syntanctically correct, run "deploy --dry-run or -d ".
Following checks are done when dux deploy --dry-run command is run:

  1. Syntax check of the manifest file (eg. ts_manifest.yml)
  2. Validation of the fields in manifest file so that the required fields are filled in
  3. Deployment pre-requisites
    a. SSH connectivity to remote hosts
    b. Check if docker is installed and running on remote hosts
    c. Check if the Linux user is configured to use sudo
    d. Check if passwordless sudo is setup for the Linux user
$ dux deploy -d
Manifest file syntax validation is successful

Verifying Tunnel container image location given in manifest: 24.10.457-2024.11.22-15ba0f7.tar.gz

Verifying deployment prerequisites on 10.87.132.166
Verifying docker is installed and running on 10.87.132.166

Checking open SSH connections to confirm SSH is configured securely
Warning: SSH is listening on all interfaces (0.0.0.0)
Warning: SSH is listening on all interfaces (::)
Please act on the warning messages to ensure security is not compromised

Checking for availablility of sufficient free disk space
Host 10.87.132.166 is good to deploy
Manifest file and hosts are good to deploy!

#In case of error in the manifest, for example, if tunnel_config_id was not filled up, you may get an error like below:
$ dux deploy -d
Manifest verification failed error="Incorrect data in manifest: the group_id field is required if tunnel_config_id is not populated"

Host Key Verification

For security requirements, when dux commands are executed, host key verification is done during the SSH handshake at the first time. If the host is unknown, a prompt is displayed to check the fingerprint of the host's key. If the user confirms the host key is correct, the host is added to known hosts.
If the fingerprint of the host changes, the user is prompted again to ensure there is no intruder attack.

The authenticity of host '192.168.99.185:22' can't be established.
Fingerprint of the host's key:SHA256:AOy8f1sChEM7xLJyYP190vjjVxDLYI9ORDaKZCNKzzE
Do you want to continue connecting? (yes/no): 

Deploy

This command deploys the Tunnel containers in the hosts in the order as listed in manifest, and as per the UEM configuration defined. The image is copied to remote host which will take few minutes depending on the network connectivity.
Note:

  1. Ensure the image to be deployed is in the images directory or the absolute path specified in the image_name in manifest.
  2. If image to be deployed is already loaded in remote host, the step to copy Tunnel container image will be skipped.
  3. The command given without options (-n or -p) will deploy containers in all hosts as listed in manifest.
#Sample run
$ dux deploy      
Enter UEM password: 
Warning: Using password-based authentication for fetching configuration from UEM. Consider switching to OAuth for improved security.
The perf_tune option has been enabled in the manifest. The perf_tune script will modify the Tunnel container host machines to provide recommended performance settings. Do you want to run the perf_tune script? (y/n): y

Checking open SSH connections to confirm SSH is configured securely
Warning: SSH is listening on all interfaces (0.0.0.0)
Warning: SSH is listening on all interfaces (::)

There are some warnings in the security assessment. Do you wish to continue with deployment (y/n): y

Preparing for Tunnel container deployment on 10.87.132.186
Copying Tunnel container image to remote. Please wait..
Progress 100% |██████████████████████████████████████████████████████████████████████████████████████| (376/376 MB, 7.5 MB/s)         
Deploying new Tunnel container on 10.87.132.186....                                                                              
5a3cfd0f45741379e0a61e8c4847eebeb75043e94d2b74d5c1cf97015cfa0fdf

Checking if Tunnel container is running on 10.87.132.186....
Fetching the deployment status. Please wait. This may take some time... \
Node number(n): 1        Version: 25.06.el9.992          CPU:   8.02%    Memory:  1221.984 MB   Devices: 0      Cascade: back-end       Status: Running
Deployment is up!

Deploy command has completed on 10.87.132.186

——

#### To use a different manifest
To use a manifest from a different path -m flag can be used. If not specified, ts_manifest.yml from the directory where dux is run from is used by default.


#For eg.
$ dux deploy -m ~/Downloads/ts_manifest_xyz.yml


#### To deploy Tunnel container in specific/few remote hosts 
To deploy Tunnel containers in few remote hosts specified by ip or node-number (as per the order in manifest). 


#For eg.
$ dux deploy -n 1 -n 3
$ dux deploy -p 1.2.3.4

#### To give UEM password as command line option:
$ dux deploy -u <uem_password>

Perform operations on deployed Tunnel containers

Once the deployment of containers is successful, other commands can be used to check status of deployment, fetch logs, run vpnreport on container, and perform operations like stop, restart, and even destroy the deployments.

1.Check status of deployment

#status help
$ dux status -h
Get the status of the Tunnel containers deployed

Usage:
  dux tunnel status [flags]

Flags:
  -p, --ip stringArray            Hostname or IP as specified in the manifest for filtering
  -j, --json                      Get status of Tunnel containers in json format
  -m, --manifest-file string      Custom manifest file path (default "/opt/omnissa/dux/ts_manifest.yml")
  -n, --node-number stringArray   Node number as listed in manifest for filtering
  -q, --quiet                     Quiet mode: interactive ssh password prompts are disabled

Global Flags:
  -h, --help      Print help information
  -v, --verbose   Show verbose logs

#To get status of all deployments - sample run. In this case, one of the deployments is not in Running state, hence shows Down as status
$ dux status 

Status of Tunnel containers deployed

1. Host: 10.87.132.186  Node number(n): 1        Version: 23.12.ph4.14   CPU:   6.97%    Memory:  1137.129 MB   Devices: 0 Cascade: off             Status: Running
2. Host: 192.168.99.180 Status: Not Deployed

#Get status of a host/hosts by IP
#Multiple ips can be specified too. eg. dux status -p 1.2.3.4 -p 1.2.3.5 
$ dux status -p 10.87.132.110 

Status of Tunnel containers deployed

1. Host: 10.87.132.186  Node number(n): 1         Version: 23.12.ph4.14   CPU:   0.00%    Memory:  1157.281 MB   Devices: 0      Cascade: off            Status: Running


#Get status of a specific host with node-number as listed in the manifest file
#Multiple node numbers can be given too: eg. dux status -n 1 -n 3 
$ dux status -n 1             

Status of Tunnel containers deployed

1. Host: 10.87.132.186  Node number(n): 1         Version: 23.12.ph4.14   CPU:   0.00%    Memory:  1157.281 MB   Devices: 0      Cascade: off            Status: Running

#Get status in a json string format for processing 
$ dux status -j               
{
    "command": "status",
    "values": [
        {
            "CPU": "0",
            "Cascade": "off",
            "Devices": "0",
            "Host": "10.87.132.186",
            "Memory": "1157.2812",
            "Node number": "1",
            "Status": "Running",
            "Version": "23.12.ph4.14"
        },
        {
            "CPU": "Unknown",
            "Cascade": "Unknown",
            "Devices": "Unknown",
            "Host": "192.168.99.180",
            "Memory": "Unknown",
            "Node number": "2",
            "Status": "Not Deployed",
            "Version": "Unknown"
        }
    ]
}

2.Run vpnreport on deployed container(s)

Vpnreport can be fetched from the deployed container(s).

#report help
$ dux report -h     
Fetch vpnreport of a Tunnel container

Usage:
  dux tunnel report [flags]

Flags:
  -p, --ip stringArray            Hostname or IP as specified in the manifest for filtering
  -j, --json                      Get vpnreport in json format
  -m, --manifest-file string      Custom manifest file path (default "/opt/omnissa/dux/ts_manifest.yml")
  -n, --node-number stringArray   Node number as listed in manifest for filtering
  -q, --quiet                     Quiet mode: interactive ssh password prompts are disabled
  -r, --rows string               Range of rows from vpnreport to be printed for the nodes: e.g if rows 10-20 need to be printed, specify option as -r 10-20

Global Flags:
  -h, --help      Print help information
  -v, --verbose   Show verbose logs


#To get vpnreports of all containers, give the command "dux report" 
# Sample run
$ dux report

Vpnreport of Tunnel containers deployed

1. Host: 10.87.132.186
Tunnel Version:      23.12.ph4.14                                     
Console Version:     23.10.0.0                                     
Operating System:    Omnissa Photon OS/Linux                                     
MultiTunnel Config:  Tunnel Config                         
# of Devices:        0         Peak:      2                     
A: 0  iOS: 0  Mac: 0  Win: 0  Lnx: 0  Others: 0  SDK: 0    
# of Connections:    0         Peak:      0                     
# of Traffic Rules:  1         Enabled:   Yes                   
# of Proxies:        0         Up:        0         Down: 0      
API Connectivity:    Up        Last Resp: 200 OK                 
AWCM Connectivity:   Up        Last Resp: 200 OK                 
API via Traf Rules:  No                                    
Cascade Mode:        Off       Reverse Connect:     No             
KCD Proxy Support:   No        Config Locked:       No          
TLS Port Sharing:    No        Deployment Mode:     QA          
FIPS Mode:           No        NSX Mode:            No          
ZTNA DTR:            Yes       ZTNA PDTR:           No           
# of ZTNA DTR:       0         # of ZTNA PDTR:      0            
Appliance Mode:      No        Container Mode:      Yes          
MFA:                 Off       JWT:                 No                         
Service Status:      Up                                         
Log Lvl:             Debug                                 
SOCKS Downstream:       0.000 Kbps                         
SOCKS Upstream:         0.000 Kbps                         
NAT Downstream:         0.000 Kbps                         
NAT Upstream:           0.000 Kbps                         
Total Downstream:       0.000 Kbps                         
Total Upstream:         0.000 Kbps                         
CPU 1:  0.00%% CPU 2:  2.97%%                              
Average CPU:             1.06 %%                           
Memory Virtual:      1157.281 MB                           
Memory Resident:       77.879 MB                           
Memory Share:          15.461 MB                           
Certificate Expiry Info                                    
Server cert:        Sep 25,2025                            
API cert:           Sep 20,2042                            
Client cert:        Sep 20,2042                            
API Last Sync:        2024-02-19 12:50:04                    
AWCM Last Sync:       2024-02-19 12:56:55                    
Up Time:              3d 0h 8m 22s                         
# of Allowlisted Devices:          1                       
# of Devices Since Start:          0                       
  Using DTLS:                      0                       
# of Device Failures                                       
  Closed Handshake:                0                       
  Failed Handshake:                104                     
  Rejected due to DDoS Protection: 0                       
  Blocked due to ZTNA Policy:      0                       
  Blocked by Admin:                0                       
  Unable to Connect to BackEnd:    0                       
  Device Not in Allowlist:         0                       
  Device Non-Compliant:            0                       
  Device Non-Managed:              0                       
Outbound Traffic Since Start                               
  # of Successful Connections:     0                       
  # of Failed Connections:         0                       
  # of Blocked by ZTNA:            0                       
  # Using Proxy:                   0                       
  # Not Using Proxy:               0                       
# of Flows by Device Type                                  
  iOS:         0                                           
  Android:     0                                           
  Windows:     0                                           
  MacOS:       0                                           
  Linux:       0                                           
  Others:      0                                           
# of Flows from SDK Bundled App:  0                        
# of Flows by Protocol                                     
  TCP:                             0                       
  UDP:                             0                       
    Connected UDP:                 0                       
    Connectionless UDP:            0                       
    Per Device UDP Limit:          1321                    
Popular Apps                             TCP   UDP   PKT   
  1.                                     0     0     0     
  2.                                     0     0     0     
  3.                                     0     0     0     
  4.                                     0     0     0     
  5.                                     0     0     0     
  6.                                     0     0     0     
  7.                                     0     0     0     
  8.                                     0     0     0     
Devices with Most Traffic                TCP   UDP   PKT   
  1.                                     0     0     0     
  2.                                     0     0     0     
  3.                                     0     0     0     
  4.                                     0     0     0     
  5.                                     0     0     0     
  6.                                     0     0     0     
  7.                                     0     0     0     
  8.                                     0     0     0     
Top Destinations                         TCP   UDP   PKT   
  1.                                     0     0     0     
  2.                                     0     0     0     
  3.                                     0     0     0     
  4.                                     0     0     0     
  5.                                     0     0     0     
  6.                                     0     0     0     
  7.                                     0     0     0     
  8.                                     0     0     0     

2. Host: 192.168.99.180 Status: Not Deployed

# To filter few row numbers from the output give -r/--rows option
$ dux report -r 6-10 
Displaying rows:6 7 8 9 10 
Vpnreport of Tunnel containers deployed

1. Host: 10.87.132.186
A: 0  iOS: 0  Mac: 0  Win: 0  Lnx: 0  Others: 0  SDK: 0    
# of Connections:    0         Peak:      0                     
# of Traffic Rules:  1         Enabled:   Yes                   
# of Proxies:        0         Up:        0         Down: 0      
API Connectivity:    Up        Last Resp: 200 OK                 
2. Host: 192.168.99.180 Status: Not Deployed

# To fetch row numbers 1,6, and 10 from all hosts
$ dux report -r 1,6,10
Displaying rows:1 6 10 
Vpnreport of Tunnel containers deployed

1. Host: 10.87.132.186
Tunnel Version:      23.12.ph4.14                                     
A: 0  iOS: 0  Mac: 0  Win: 0  Lnx: 0  Others: 0  SDK: 0    
API Connectivity:    Up        Last Resp: 200 OK                 
2. Host: 192.168.99.180
Tunnel Version:      23.12.ph4.14                                     
A: 0  iOS: 0  Mac: 0  Win: 0  Lnx: 0  Others: 0  SDK: 0    
API Connectivity:    Up        Last Resp: 204 No Content     

## To get vpnreport output as json format for processing use -j option
# For example:
$ dux report -j

## To get vpnreport of a node-number or ip use -n or -p option as the other commands
# For example
$ dux report -n 1
$ dux report -p 10.87.142.143

3.Fetch logs from the deployed containers

Fetch tunnel_snap from the deployed containers. If the container deployment is down, the docker logs of the container are fetched.
Note that the logs are stored in the logs directory based on the platform.
For linux: /opt/omnissa/dux/logs/
For Mac OS on Intel (AMD64): /usr/local/var/opt/omnissa/dux/logs
For Mac OS on Apple Silicon (ARM64): /opt/homebrew/var/opt/omnissa/dux/logs
For Windows: <INSTALL_DIR>\logs

The option -f can be used to continously view the docker logs output of a Tunnel container deployed till Ctrl-C is given.

# logs help
$ dux logs -h
Get logs from the Tunnel containers deployed

Usage:
  dux tunnel logs [flags]

Flags:
  -f, --follow                    Follow/View logs of a Tunnel container specified by node-number (-n) or ip (-p) option
  -p, --ip stringArray            Hostname or IP as specified in the manifest for filtering
  -m, --manifest-file string      Custom manifest file path (default "/opt/omnissa/dux/ts_manifest.yml")
  -n, --node-number stringArray   Node number as listed in manifest for filtering
  -q, --quiet                     Quiet mode: interactive ssh password prompts are disabled

Global Flags:
  -h, --help      Print help information
  -v, --verbose   Show verbose logs


#Get logs of all containers deployed as per manifest
#Sample run - Note if the deployment is not up, the container logs are fetched.
$ dux logs 
Retrieve vpnserv logs from 10.87.132.186
Copy log bundle from Remote to Local machine..
Logs from 10.87.132.186 downloaded at: /opt/omnissa/dux/logs/tunnel_snap.10.87.132.186_20240219184004.tar.gz

Retrieve vpnserv logs from 192.168.99.180
Copy log bundle from Remote to Local machine..
Logs from 192.168.99.180 downloaded at: /opt/omnissa/dux/logs/tunnel_snap.192.168.99.180_20240219184036.tar.gz

#Logs from a single deployment or multiple deployments can be obtained by specifying IP / node-number in the order as per the manifest
#eg. 
# dux logs -p 1.2.3.4 -p 1.2.3.5
# dux logs -n 2 -n 4

#To continuously view/follow the run logs of container , give -f option for the specific node/host ip
# dux logs -n 1 -f 
#Press Ctrl-C to stop viewing

4.Stop deployed containers

In case a Tunnel container needs to be stopped for some reason, dux stop command can be given.

# stop help
$ dux stop -h                      
Stop Tunnel containers on the given host(s) from the manifest file. To restart the containers again, you may use `dux restart` command.

Usage:
  dux tunnel stop [flags]

Flags:
  -p, --ip stringArray            Hostname or IP as specified in the manifest for filtering
  -m, --manifest-file string      Custom manifest file path (default "/opt/omnissa/dux/ts_manifest.yml")
  -n, --node-number stringArray   Node number as listed in manifest for filtering
  -q, --quiet                     Quiet mode: interactive ssh password prompts are disabled
  -y, --yes                       Auto accept all prompts

Global Flags:
  -h, --help      Print help information
  -v, --verbose   Show verbose logs

# Stop all deployments 
$ dux stop  


Are you sure you want to stop the Tunnel containers deployed in all the hosts given in the manifest? 
ip : 10.87.132.186 node-number : 1
ip : 10.87.132.197 node-number : 2 
Please confirm (y/n): y
Tunnel container was successfully stopped on 10.87.132.186
Tunnel container was successfully stopped on 10.87.132.197


#Deployment of Tunnel containers can be stopped by specifying IPs or node-number in the order as per the manifest
#eg.
# dux stop -p 1.2.3.4
# dux stop -n 4

#To auto accept all prompts for y/n , -y option can be given
#eg.
# dux stop -y

5.Restart deployed containers

Stopped containers can be restarted by dux restart command

#restart help
$ dux restart -h
Restart the Tunnel container on given hosts

Usage:
  dux tunnel restart [flags]

Flags:
  -p, --ip stringArray            Hostname or IP as specified in the manifest for filtering
  -m, --manifest-file string      Custom manifest file path (default "/opt/omnissa/dux/ts_manifest.yml")
  -n, --node-number stringArray   Node number as listed in manifest for filtering
  -q, --quiet                     Quiet mode: interactive ssh password prompts are disabled
  -y, --yes                       Auto accept all prompts

Global Flags:
  -h, --help      Print help information
  -v, --verbose   Show verbose logs

#Restart all deployments
#Sample run
$ dux restart   

Are you sure you want to restart the Tunnel containers deployed in all the hosts given in the manifest? 
ip : 10.87.132.186 node-number : 1
ip : 10.87.132.197 node-number : 2 
Please confirm (y/n): y
Tunnel container was successfully restarted on 10.87.132.186
Tunnel container was successfully restarted on 10.87.132.197

#Deployment of Tunnel containers can be restarted by specifying IPs or node-number in the order as per the manifest
#eg.
# dux restart -p 1.2.3.4
# dux restart -n 4

#To auto accept all prompts for y/n , -y option can be given
#eg.
# dux restart -y

6.Destroy deployed containers

To stop and remove the deployed container from the remote Tunnel container host, dux destroy command can be used.

#destroy command help
$ dux destroy -h
Destroy the Tunnel containers on the given hosts

Usage:
  dux tunnel destroy [flags]

Flags:
  -p, --ip stringArray            Hostname or IP as specified in the manifest for filtering
  -m, --manifest-file string      Custom manifest file path (default "/opt/omnissa/dux/ts_manifest.yml")
  -n, --node-number stringArray   Node number as listed in manifest for filtering
  -q, --quiet                     Quiet mode: interactive ssh password prompts are disabled
  -y, --yes                       Auto accept all prompts

Global Flags:
  -h, --help      Print help information
  -v, --verbose   Show verbose logs


#Destroy all deployments
#Sample run
$ dux destroy       

Are you sure you want to destroy the Tunnel containers deployed in all the hosts given in the manifest? 
ip : 10.87.132.186 node-number : 1
ip : 10.87.132.197 node-number : 2 
Please confirm (y/n): y
Tunnel container was successfully destroyed on 10.87.132.186
Tunnel container was successfully destroyed on 10.87.132.197


#Deployment of Tunnel  containers can be destroyed by specifying IPs or node-number in the order as per the manifest
#eg.
# dux destroy -p 1.2.3.4
# dux destroy -n 4

#To auto accept all prompts for y/n , -y option can be given
#eg.
# dux destroy -y

7. Log-override in Tunnel container

To change the log level in Tunnel container, use the log-override command.
Note that this feature to change log-level from the one set in UEM console is supported in Tunnel container from 23.12 onwards.

$ dux log-override  -h
Override log level in one or more Tunnel containers deployed

Usage:
  dux tunnel log-override [flags]

Flags:
  -c, --clear                     Restore log level to default value set by UEM Console
  -d, --duration int              Duration in minutes for the log level override; -1 to set log level indefinitely (default 30)
  -p, --ip stringArray            Hostname or IP as specified in the manifest for filtering
  -l, --log-level int             Desired log level to be set (1-Error, 2-Warn, 3-Info, 4-Debug)
  -m, --manifest-file string      Custom manifest file path (default "/opt/omnissa/dux/ts_manifest.yml")
  -n, --node-number stringArray   Node number as listed in manifest for filtering
  -q, --quiet                     Quiet mode: interactive ssh password prompts are disabled
  -y, --yes                       Auto accept all prompts

Global Flags:
  -h, --help      Print help information
  -v, --verbose   Show verbose logs

  # Some examples below
  # To set log-level to Debug (4) for 10 mins
  $ dux log-override -n 1 -l 4 -d 10

  Are you sure you want to set log level in the Tunnel containers deployed in the following hosts to "Debug" for 10 mins? 
  ip : 10.87.132.186 node-number : 1 
  Please confirm (y/n): y
  Log-level was succesfully set to "Debug" in Tunnel container on 10.87.132.186

  # To set log-level to Debug (4) (default 30 mins)
  $ dux log-override -n 1 -l 4      

  Are you sure you want to set log level in the Tunnel containers deployed in the following hosts to "Debug" for 30 mins? 
  ip : 10.87.132.186 node-number : 1 
  Please confirm (y/n): y
  Log-level was succesfully set to "Debug" in Tunnel container on 10.87.132.186

  # To set log-level to Info (3) for indefinite time with auto-accept 
  $ dux log-override -n 1 -l 4 -d -1 -y
  Log-level was succesfully set to "Debug" in Tunnel container on 10.87.132.186
  # To clear log-level set / restore to default value set by UEM Console - for all hosts
  $ dux log-override -c

  Are you sure you want to clear log override on all the Tunnel containers deployed? (y/n): y
  Restored log level to default value set by UEM Console on 10.87.132.186
  Restored log level to default value set by UEM Console on 10.87.132.197

8. Get verbose logs

If you wish to get verbose logs for any command, use the -v or --verbose option.
For example:

$ dux deploy -v

9. Open interactive shell with tunnel container

If you wish to start a shell with tunnel container you can use the command 'exec-shell'

$ dux exec-shell -h
Open interactive shell with Tunnel container

Usage:
  dux tunnel exec-shell [flags]

Flags:
  -p, --ip stringArray            Hostname or IP as specified in the manifest for filtering
  -m, --manifest-file string      Custom manifest file path (default "/opt/omnissa/dux/ts_manifest.yml")
  -n, --node-number stringArray   Node number as listed in manifest for filtering
  -q, --quiet                     Quiet mode: interactive ssh password prompts are disabled

Global Flags:
  -h, --help      Print help information
  -v, --verbose   Show verbose logs

$ dux exec-shell -n 1

Starting the interactive shell with container 10.87.132.186 vpnserver
[root@centos81 vpnd]# pwd
pwd
/opt/omnissa/tunnel/vpnd
[root@centos81 vpnd]# ls
ls
awcm.ca
awcm.crt
awcm.key
ca.pem
client_config.conf
dh2048.pem
entrypoint
gmon.out
ipv6_history.json
report.conf
server.conf
traffic_rules.xml
tunnel_snap.tar.gz
unique_ip_history.json
vpn.crt
vpn.key
vpnreport
vpnserv

10. Check for open ports in the external NIC of the Tunnel container hosts

If the user needs to use a 2 NIC configuration - where one NIC is needed for unauthenticated traffic (External NIC) and another NIC for authenticated back-end traffic (Internal IP/host address), they can use the command 'extportscan' command to check for the following security issues in the external NIC/IP of the Tunnel host:

  1. Verify SSH is Not Listening on External IP - To ensure SSH is not accessible via the external IP on your machine, SSH should be configured to only listen on specific interfaces (internal IP, or 127.0.0.1 or any IPs explicitly configured) and not on all interfaces - 0.0.0.0 or external IP

  2. Port Scan for External IP : Ensure port 22 (the default SSH Port) is not open in the External IP. Also list all open ports for the user to check for any security loopholes.
    Note that the external IP can be given in the multi_nic_external_ip parameter in the manifest file.

$ dux extportscan --help
Check for open ports in the external NIC of the Tunnel container hosts

Usage:
  dux tunnel extportscan [flags]

Flags:
  -p, --ip stringArray            Hostname or IP as specified in the manifest for filtering
  -m, --manifest-file string      Custom manifest file path (default "/opt/omnissa/dux/ts_manifest.yml")
  -n, --node-number stringArray   Node number as listed in manifest for filtering
  -y, --y                         Auto accept all prompts

Global Flags:
  -h, --help      Print help information
  -v, --verbose   Show verbose logs

$ dux extportscan 

Are you sure you want to check for open ports on all nodes? (y/n): y

Checking open SSH connections to confirm SSH is configured securely
SSH is securely enabled only on the internal IP.
Scanning for open ports on the external IP
No open ports found.
Info: 65535 closed TCP ports detected.

11. Enhanced supportability to search and list records from Tunnel container logs

The dux list command is used to search and list sessions, flows, alerts, or allowlist records from Tunnel server container logs. It provides various filtering options to narrow down the results based on user, destination, time range, and more.

$ dux list --help
List/search sessions, flows, alerts or allowlist from Tunnel container logs

Usage:
  dux tunnel list [flags]

Flags:
  -l, --alert                     List alerts from Tunnel container logs
  -a, --all                       List alerts, sessions and flows from Tunnel container logs
  -c, --allowlist-cache           List allowlist cache from Tunnel container
  -d, --dest string               List records matching a destination from Tunnel container logs
  -e, --end string                End time range for searching records from Tunnel container logs. Use RFC-3339 UTC time format e.g. 2023-12-31T15:00:00Z
  -f, --flow                      List flows from Tunnel container logs
  -p, --ip stringArray            Hostname or IP as specified in the manifest for filtering
  -m, --manifest-file string      Custom manifest file path (default "/opt/omnissa/dux/ts_manifest.yml")
  -o, --no-space-footer           List records without adding whitespaces
  -n, --node-number stringArray   Node number as listed in manifest for filtering
  -q, --quiet                     Quiet mode: interactive ssh password prompts are disabled
  -s, --session                   List sessions from Tunnel container logs
  -t, --start string              Start time range for searching records from Tunnel container logs. Use RFC-3339 UTC time format e.g. 2023-12-31T15:00:00Z
  -u, --user string               List records matching a user from Tunnel container logs

Global Flags:
  -h, --help      Print help information
  -v, --verbose   Show verbose logs

Examples

  1. List all records (alerts, sessions, and flows):

    dux list --all
    
  2. List allowlist cache along with all records only for node number 1:

    dux list --allowlist-cache -n 1
    
  3. Filter records by destination:

    dux list --dest www.example.com
    
  4. Filter records by user:

    dux list --user john
    
  5. Filter alerts within a specific time range:

    dux list --alert --start 2025-03-20T04:00:00Z --end 2025-03-20T05:00:29Z
    

Troubleshooting

  1. For any installation issues please refer to the package manager instructions (yum/dnf/brew) for the specific error.
    For example, if you are using dnf and encounter issues with installing dux, check if the cache is updated. Try "dnf makecache" to update metadata cache.

  2. Ensure "dux init" command is run the first time.

  3. Do a dry-run before deploying to ensure there are no issues with the manifest, and to ensure that the deployment pre-requisites are met.

 dux deploy -d
  1. For any issues, please check the file dux.log under logs directory as per the platform - for e.g /opt/omnissa/dux/logs/dux.log in Linux. The CRUD logs for dux (i.e container operations related commands like deploy, destroy, stop, restart) can be found in the file dux-audit.log under logs directory as per the platform - for e.g /opt/omnissa/dux/logs/dux-audit.log in Linux.

  2. If docker is installed with snap in the Linux system, you may encounter permission issues during deployment of Tunnel containers.
    Ubuntu commonly uses snap to install packages.
    If snap docker is used it is recommended to uninstall snap docker, and install docker as mentioned in https://docs.docker.com/engine/install/ubuntu/ .

sudo snap remove docker --purge
sudo reboot 
sudo apt-get install docker-ce docker-ce-cli containerd.io docker-compose-plugin

Note: Please check if there are other containers running in your VM with snap docker. While technically possible, running both Snap Docker and Docker CE on the same Ubuntu system is generally not recommended due to the potential for conflicts and complexity - wrt port usage, networking, system resources usage etc.

  1. Please ensure the conditions in the Prerequisites section are met.

  2. In Windows, if dux is installed under system directories like C:\Program Files, Windows Powershell/Command Prompt should be run as administrator for dux commands to work. Please check for errors related to access issues.

  3. To avoid errors while editing the ts_manifest.yml, please refer to the following guide:

Points to be noted while editing ts_manifest.yml file

  1. Open the YAML File

    • Right-click on the ts_manifest.yml file and choose "Open With" from the context menu. Select a text editor such as TextEdit (Mac), or any code editor like Visual Studio Code, Sublime Text, or Atom.
    • Alternatively, you can open the text editor first and then navigate to the file using the "File" menu.
  2. Understand YAML Syntax

    • YAML uses a human-readable syntax based on indentation and key-value pairs.
    • Each entry in the YAML file consists of a key followed by a colon : and then the corresponding value.
    • Indentation (whitespace at the beginning of a line) is crucial in YAML to denote hierarchical structure.
    • Please ensure there is a space post colon as this is a common user error :
      image_name: TunnelContainer_23.12.1.7.tar.gz
  3. Make Changes

    • Locate the section of the YAML file you wish to modify. Be careful not to change the structure or indentation, as YAML is sensitive to these.
    • Edit the values according to your requirements.
    • Take note of any comments (#) in the YAML file as they provide context or explanations about specific entries.
  4. Save Changes

    • After making the necessary edits, save the file by clicking on "File" in the menu and then selecting "Save" or by pressing Ctrl + S (Linux) or Cmd + S (Mac).
    • Ensure that you save the file with the .yml extension to maintain its YAML format.
  5. Validate Changes (Optional)

    • If you're unsure whether your changes are syntactically correct, you can validate the YAML file using online YAML validators (https://www.yamllint.com/) or command-line tools.
    • YAML linting tools can identify syntax errors or formatting issues, helping you ensure the file is valid.
  6. Backup (Optional but Recommended)

    • Before making extensive changes, consider creating a backup of the original YAML file. This ensures you can revert to the previous configuration if needed.
  7. Sample ts_manifest.yml file for reference

# Version number for the Tunnel container deployment manifest. This is auto generated and should not be altered.
version: "3.0.0.641"


# Workspace ONE UEM Information 
uem:
  # The Workspace ONE UEM API server URL. The destination URL must contain the protocol and hostname or IP address 
  # Example: https://load-balancer.example.com 
  url: https://example-uem-api.com

  # Omnissa Tunnel Configuration ID configured in the Workspace ONE UEM Console.
  # This field is supported only if the UEM console supports multi-tunnel configuration feature (from UEM Console version 23.06 onwards).
  # If left blank, default configuration from the specified organization group will be fetched. 
  tunnel_config_id: cafa5265-2e0f-4506-920e-f07f4b9esdsd

  # The organization group ID in Workspace ONE UEM Console where Tunnel is configured.
  group_id: 

  admin:
    # Starting with Tunnel container version 25.03, OAuth is the recommended authentication method
    # for securely connecting to the Workspace ONE UEM API server. This authentication method
    # provides improved security and scalability.
    #
    # Important: Older versions of the Tunnel container do not support OAuth. To maintain compatibility
    # ensure you use a version of DUX that support OAuth deployment.
    oauth:
      # Client ID to download config from the Workspace ONE UEM API server.
      client_id: 41cbcadbe64e48d3b0be792cc2cd23dd

      # Client Secret to download config from the Workspace ONE UEM API server. 
      client_secret: 28C18ACFDAC1D0ED39E497D7C2BDD8AA
      
      # Oauth token Service endpoint url to download bearer token using Client ID and Client Secret.
      # This will be set to https://test.yatsworkspaceone.com/connect/token by default and can be overridden if needed. 
      token_service_url:

    # Basic authentication is planned for deprecation in a future version due
    # to security concerns. It is recommended to use OAuth for authentication instead. 
    #basic_auth:
      # The username to authenticate with the Workspace ONE UEM API server. 
      #username:


  # Add details if Outbound Proxy needs to be configured to reach to UEM. 
  outbound_proxy:
    # Format: 
    # proxy_host - <http/https>://<hostname/ip>
    # If protocol is not specified, default value is http 
    proxy_host:
    # proxy_port - proxy port number. If not specified, default value is 80 for http and 443 for https 
    proxy_port:
    # Outbound Proxy user name for proxy authorization; This optional field can be enabled by uncommenting the `proxy_user` parameter below.
    #proxy_user:


#Tunnel container Image Information 
tunnel_server:
  # Enter the filename of the image or the repo path to deploy below.
  # File: This must match against the Tunnel container image filename from the default directory (refer to the note below) or the absolute path.
  # example: 29-2023.06.14-22e04910.tar.gz or /home/admin/29-2023.06.14-22e04910.tar.gz
  # Note: The default directory where the images are recommended to be present is:
  #   - for linux: /opt/omnissa/dux/images
  #   - for Mac OS on Intel/AMD64: /usr/local/var/opt/omnissa/dux/images/
  #   - for Mac OS on Apple Silicon/ARM64: /opt/homebrew/var/opt/omnissa/dux/images/
  #   - for Windows: <path of dux installation directory>/images 
  # Repository: Repository path of the image with the tag can be given as well:
  # For example: your-local-repo.com/<path>/tunnel-server:<tag> 
  image_name: TunnelContainer_25.06.tar.gz

  #Container Host(s) Authentication Information 
  # If all hosts have common authentication credentials, you may want to use the parameter - 'ssh_login_credentials'
  # For authentication, provide the ssh user name and ssh key path below
  # If all hosts use a different SSH port other than 22, uncomment the `ssh_port` parameter and enter the port number.
  # If not provided, default value of 22 will be used. 
  ssh_login_credentials:
    ssh_user: users
    # Input the path of ssh key - e.g /home/admin/id_rsa 
    ssh_key_path: /home/user1/.ssh/id_rsa
    ## Optional: Input the ssh port. Default value - 22 
    ssh_port: 

  # SSH Host key check - verify the identity of the remote host 
  # By default this is enabled and the user will be prompted to confirm the fingerprint of the public key of the remote host.
  # If disabled, dux will connect similar to the ssh option StrictHostKeyChecking=no and UserKnownHostsFile=/dev/null
  # 1 - enable host key checking
  # 0 - disable host key checking 
  ssh_host_key_check: 1

  #Tunnel container Host(s) Information
  # Input docker host information for Tunnel container deployment. Add an entry for each host. 
  hosts:
    # Enter IP address of the host below 
    - address: 10.232.18.232

      # The deployment role for the server. 
      # 0 - basic mode
      # 1 - cascade mode - frontend
      # 2 - cascade mode - backend 
      server_role: 0

      ######################################################################
      ## THE FOLLOWING ARE OPTIONAL PARAMETERS FOR TUNNEL CONTAINER DEPLOYMENT. 
      ## PLEASE EDIT THEM AS PER YOUR REQUIREMENTS
      ######################################################################

      ## For information specific to this host, uncomment 'host_info' and the parameters under it as needed.

      ## For authentication info specific to this host, uncomment the 'ssh_user' and 'ssh_key_path/ssh_password' as needed.
      ## If both 'ssh_key_path' and 'ssh_password' are provided, 'ssh_key_path' is preferred.
      ## The values can also be passed as environment variables.
      ## If all hosts have common ssh credential info/ssh port info, you may use the global parameter: 'ssh_login_credentials'  
      ## If both 'host_info' and 'ssh_login_credentials' are given, the credentials under 'host_info' are preferred.
      
      ## SSH Port information
      ## If the host uses a different SSH port other than 22, uncomment the `ssh_port` parameter and enter the port number.
      ## If not provided, default value of 22 will be used.
      
      #host_info:
        #ssh_user: 
        ## Input the path of ssh key - e.g /home/admin/id_rsa
        #ssh_key_path: 
        ## For security reasons, the ssh_password is not recommended. 
        #ssh_password: 
        ## Input the ssh port. Default value - 22
        #ssh_port:

      ## Define Subnet range for Unique IP per device connection (Please note this feature is supported from Tunnel container version 24.10 onwards)
      ## If the deployment role for the server is basic/backend, please enter the CIDR for the IP range for devices corresponding to this Tunnel container deployment
      ##
      ## Example: subnet_range: 192.168.4.0/23
      
      # subnet_range:

      # If external NIC is configured in the host machine where Tunnel container is deployed, 
      # please specify the details of external IP of NIC2 
      # multi_nic_external_ip:
   - address: 10.232.18.132
      server_role: 0

      host_info:
        ssh_user: user2
        ## Input the path of ssh key - e.g /home/admin/id_rsa
        #ssh_key_path: 
        ## For security reasons, the ssh_password is not recommended. 
        ssh_password: abc123
        ## Input the ssh port. Default value - 22
        #ssh_port:

      subnet_range: 192.168.8.0/23
      # If external NIC is configured in the host machine where Tunnel container is deployed,
      # please specify the details of external IP of NIC2
      #multi_nic_external_ip: 

  # Tune performance parameters/system configuration in remote host to support larger number of connections
  # 1  - execute perf_tune.sh in the remote host
  # 0  - do not modify system configuration in remote host 
  perf_tune: 1

  # Add entries to the container hosts file to manually link FQDN to IP address
  # Format:
  ## - host_name:
  ##   ip_address: 
  host_entries:
    # Example:
    # - host_name: example.com
    #   ip_address: 192.168.1.1