13.0, before that I'm not sure, but it was 12.x Get Outlook for Android<https://aka.ms/AAb9ysg>
________________________________ From: Zammit, Ludovic <luza...@akamai.com> Sent: Monday, January 29, 2024 4:27:55 PM To: PacketFence-users <packetfence-users@lists.sourceforge.net> Cc: David Moore <dave.mo...@outlook.com> Subject: Re: [PacketFence-users] Help with IP Tables and Processor usage question Hello David, What was the previous PF version before the upgrade? Thanks, Ludovic Zammit Product Support Engineer Principal Lead [https://www.akamai.com/us/en/multimedia/images/custom/2019/logo-no-tag-93x45.png] Cell: +1.613.670.8432 Akamai Technologies - Inverse 145 Broadway Cambridge, MA 02142 Connect with Us: [https://www.akamai.com/us/en/multimedia/images/custom/community.jpg] <https://community.akamai.com> [https://www.akamai.com/us/en/multimedia/images/custom/rss.png] <http://blogs.akamai.com> [https://www.akamai.com/us/en/multimedia/images/custom/twitter.png] <https://twitter.com/akamai> [https://www.akamai.com/us/en/multimedia/images/custom/fb.png] <http://www.facebook.com/AkamaiTechnologies> [https://www.akamai.com/us/en/multimedia/images/custom/in.png] <http://www.linkedin.com/company/akamai-technologies> [https://www.akamai.com/us/en/multimedia/images/custom/youtube.png] <http://www.youtube.com/user/akamaitechnologies?feature=results_main> On Jan 25, 2024, at 10:02 AM, David Moore via PacketFence-users <packetfence-users@lists.sourceforge.net> wrote: I recently upgraded to PF 13.1 and have had a few issues, most of which I have been able to resolve. The only lingering issue I'm aware of is with IP Tables, but I'm not positive it's something to be concerned about because PF is working. My PF server is ZEN running in VMWare ESXi the assigned hardware is 32 GB of RAM, 4 Processors and 300 GB of disk space, my network consists of about 30 nodes authenticating with 802.1x (Active Directory and MAC Auth for non-AD devices) memory and disk space are fine but the CPU is constantly at 5Ghz of consumption (is that normal for the processor?) Please see the details from packetfence.log and from systemctl status packetfence-iptables below: packetfence.log: Jan 25 09:43:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(14) INFO: [mac:[undef]] getting security_events triggers for accounting cleanup (pf::accounting::acct_maintenance) Jan 25 09:43:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(17) INFO: [mac:[undef]] processed 0 security_events during security_event maintenance (1706193787.30847 1706193787.36479) (pf::security_event::security_event_maintenance) Jan 25 09:43:15 fence packetfence[562283]: -e(562283) INFO: saving existing iptables to /usr/local/pf/var/iptables.bak (pf::iptables::iptables_save) Jan 25 09:43:15 fence packetfence[562283]: -e(562283) WARN: We are using IPSET (pf::ipset::iptables_generate) Jan 25 09:43:15 fence packetfence[562283]: -e(562283) INFO: flushing iptables (pf::ipset::iptables_flush_mangle) Jan 25 09:43:15 fence packetfence[562283]: -e(562283) INFO: Adding Forward rules to allow connections to the OAuth2 Providers and passthrough. (pf::iptables::generate_passthrough_rules) Jan 25 09:43:15 fence packetfence[562283]: -e(562283) INFO: Adding IP based passthrough for connectivitycheck.gstatic.com<http://connectivitycheck.gstatic.com/> (pf::iptables::generate_passthrough_rules) Jan 25 09:43:15 fence packetfence[562283]: -e(562283) INFO: Adding NAT Masquerade statement. (pf::iptables::generate_passthrough_rules) Jan 25 09:43:15 fence packetfence[562283]: -e(562283) INFO: restoring iptables from /usr/local/pf/var/conf/iptables.conf (pf::iptables::iptables_restore) Jan 25 09:43:15 fence packetfence[562283]: -e(562283) WARN: Problem trying to run command: LANG=C /sbin/iptables-restore < /usr/local/pf/var/conf/iptables.conf called from iptables_restore. Child exited with non-zero value 2 (pf::util::pf_run) Jan 25 09:44:06 fence pfperl-api-docker-wrapper[562338]: pfperl-api(19) INFO: [mac:[undef]] processed 0 security_events during security_event maintenance (1706193846.10912 1706193846.12021) (pf::security_event::security_event_maintenance) Jan 25 09:44:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(15) INFO: [mac:[undef]] Using 300 resolution threshold (pf::pfcron::task::cluster_check::run) Jan 25 09:44:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(14) INFO: [mac:[undef]] getting security_events triggers for accounting cleanup (pf::accounting::acct_maintenance) Jan 25 09:44:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(15) INFO: [mac:[undef]] All cluster members are running the same configuration version (pf::pfcron::task::cluster_check::run) Jan 25 09:44:16 fence packetfence[562283]: -e(562283) INFO: saving existing iptables to /usr/local/pf/var/iptables.bak (pf::iptables::iptables_save) Jan 25 09:44:16 fence packetfence[562283]: -e(562283) WARN: We are using IPSET (pf::ipset::iptables_generate) Jan 25 09:44:16 fence packetfence[562283]: -e(562283) INFO: flushing iptables (pf::ipset::iptables_flush_mangle) Jan 25 09:44:16 fence packetfence[562283]: -e(562283) INFO: Adding Forward rules to allow connections to the OAuth2 Providers and passthrough. (pf::iptables::generate_passthrough_rules) Jan 25 09:44:16 fence packetfence[562283]: -e(562283) INFO: Adding IP based passthrough for connectivitycheck.gstatic.com<http://connectivitycheck.gstatic.com/> (pf::iptables::generate_passthrough_rules) Jan 25 09:44:16 fence packetfence[562283]: -e(562283) INFO: Adding NAT Masquerade statement. (pf::iptables::generate_passthrough_rules) Jan 25 09:44:16 fence packetfence[562283]: -e(562283) INFO: restoring iptables from /usr/local/pf/var/conf/iptables.conf (pf::iptables::iptables_restore) Jan 25 09:44:16 fence packetfence[562283]: -e(562283) WARN: Problem trying to run command: LANG=C /sbin/iptables-restore < /usr/local/pf/var/conf/iptables.conf called from iptables_restore. Child exited with non-zero value 2 (pf::util::pf_run) Jan 25 09:45:06 fence pfperl-api-docker-wrapper[562338]: pfperl-api(13) INFO: [mac:[undef]] processed 0 security_events during security_event maintenance (1706193906.17069 1706193906.18816) (pf::security_event::security_event_maintenance) Jan 25 09:45:06 fence pfperl-api-docker-wrapper[562338]: pfperl-api(12) INFO: [mac:[undef]] getting security_events triggers for accounting cleanup (pf::accounting::acct_maintenance) Jan 25 09:45:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(13) INFO: [mac:[undef]] Using 300 resolution threshold (pf::pfcron::task::cluster_check::run) Jan 25 09:45:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(13) INFO: [mac:[undef]] All cluster members are running the same configuration version (pf::pfcron::task::cluster_check::run) Jan 25 09:45:16 fence packetfence[562283]: -e(562283) INFO: saving existing iptables to /usr/local/pf/var/iptables.bak (pf::iptables::iptables_save) Jan 25 09:45:16 fence packetfence[562283]: -e(562283) WARN: We are using IPSET (pf::ipset::iptables_generate) Jan 25 09:45:16 fence packetfence[562283]: -e(562283) INFO: flushing iptables (pf::ipset::iptables_flush_mangle) Jan 25 09:45:17 fence packetfence[562283]: -e(562283) INFO: Adding Forward rules to allow connections to the OAuth2 Providers and passthrough. (pf::iptables::generate_passthrough_rules) Jan 25 09:45:17 fence packetfence[562283]: -e(562283) INFO: Adding IP based passthrough for connectivitycheck.gstatic.com<http://connectivitycheck.gstatic.com/> (pf::iptables::generate_passthrough_rules) Jan 25 09:45:17 fence packetfence[562283]: -e(562283) INFO: Adding NAT Masquerade statement. (pf::iptables::generate_passthrough_rules) Jan 25 09:45:17 fence packetfence[562283]: -e(562283) INFO: restoring iptables from /usr/local/pf/var/conf/iptables.conf (pf::iptables::iptables_restore) Jan 25 09:45:17 fence packetfence[562283]: -e(562283) WARN: Problem trying to run command: LANG=C /sbin/iptables-restore < /usr/local/pf/var/conf/iptables.conf called from iptables_restore. Child exited with non-zero value 2 (pf::util::pf_run) Jan 25 09:46:06 fence pfperl-api-docker-wrapper[562338]: pfperl-api(15) INFO: [mac:[undef]] processed 0 security_events during security_event maintenance (1706193966.18047 1706193966.2038) (pf::security_event::security_event_maintenance) Jan 25 09:46:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(15) INFO: [mac:[undef]] getting security_events triggers for accounting cleanup (pf::accounting::acct_maintenance) Jan 25 09:46:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(16) INFO: [mac:[undef]] Using 300 resolution threshold (pf::pfcron::task::cluster_check::run) Jan 25 09:46:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(16) INFO: [mac:[undef]] All cluster members are running the same configuration version (pf::pfcron::task::cluster_check::run) Jan 25 09:46:17 fence packetfence[562283]: -e(562283) INFO: saving existing iptables to /usr/local/pf/var/iptables.bak (pf::iptables::iptables_save) systemctl status packetfence-iptables: ● packetfence-iptables.service - PacketFence Iptables configuration Loaded: loaded (/lib/systemd/system/packetfence-iptables.service; enabled; vendor preset: enabled) Active: active (running) since Wed 2024-01-24 14:15:55 EST; 1h 17min ago Main PID: 562283 (perl) Tasks: 1 (limit: 38474) Memory: 188.3M CPU: 46.312s CGroup: /packetfence.slice/packetfence-iptables.service └─562283 /usr/bin/perl -I/usr/local/pf/lib -I/usr/local/pf/lib_perl/lib/perl5 -Mpf::db -Mpf::services::manager::iptables -e my $db ; while(!$db) { eval { $db = db_ping() } ; sleep 1 } ; pf::services::manager::iptables->new()->startAndCheck() Jan 24 15:33:11 fence.sixmoore.com<http://fence.sixmoore.com/> sudo[752059]: pam_unix(sudo:session): session closed for user root Jan 24 15:33:11 fence.sixmoore.com<http://fence.sixmoore.com/> sudo[752062]: root : PWD=/ ; USER=root ; COMMAND=/usr/sbin/ipset --add pfsession_passthrough 172.217.13.99,443 Jan 24 15:33:11 fence.sixmoore.com<http://fence.sixmoore.com/> sudo[752062]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Jan 24 15:33:11 fence.sixmoore.com<http://fence.sixmoore.com/> sudo[752062]: pam_unix(sudo:session): session closed for user root Jan 24 15:33:11 fence.sixmoore.com<http://fence.sixmoore.com/> packetfence[562283]: -e(562283) INFO: Adding NAT Masquerade statement. (pf::iptables::generate_passthrough_rules) Jan 24 15:33:11 fence.sixmoore.com<http://fence.sixmoore.com/> packetfence[562283]: -e(562283) INFO: restoring iptables from /usr/local/pf/var/conf/iptables.conf (pf::iptables::iptables_restore) Jan 24 15:33:11 fence.sixmoore.com<http://fence.sixmoore.com/> perl[752066]: iptables-restore v1.8.7 (nf_tables): invalid port/service `%%httpd_collector_port%%' specified Jan 24 15:33:11 fence.sixmoore.com<http://fence.sixmoore.com/> perl[752066]: Error occurred at line: 62 Jan 24 15:33:11 fence.sixmoore.com<http://fence.sixmoore.com/> perl[752066]: Try `iptables-restore -h' or 'iptables-restore --help' for more information. Jan 24 15:33:11 fence.sixmoore.com<http://fence.sixmoore.com/> packetfence[562283]: -e(562283) WARN: Problem trying to run command: LANG=C /sbin/iptables-restore < /usr/local/pf/var/conf/iptables.conf called from iptables_restore. Child exited with non-zero value 2 (pf::util::pf_run) I looked at the /usr/local/pf/var/conf/iptables.conf file and line 62 reads: -A input-management-if --protocol tcp --match tcp --dport %%httpd_collector_port%% --jump ACCEPT Thanks Dave _______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net<mailto:PacketFence-users@lists.sourceforge.net> https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!W7iDMR4-NGQYg2tqf9z2ToridNJj_dYDYn6ZAwKwbiwCtAc3O0rHn0tkPtUi9_h6LVad5cCvHyzMhFsldRoPu-QPOgTOHIeR8hJNXQ$
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users