I'm reposting this information to preserve the thread
[root@pkfn pf]# ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
link/ether 00:50:56:a5:98:cf brd ff:ff:ff:ff:ff:ff
inet6 fe80::250:56ff:fea5:98cf/64 scope link
valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
link/ether 00:50:56:a5:c2:1a brd ff:ff:ff:ff:ff:ff
inet 10.50.156.54/23 brd 10.50.157.255 scope global eth1
inet6 fe80::250:56ff:fea5:c21a/64 scope link
valid_lft forever preferred_lft forever
4: eth0.110@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue
state UP
link/ether 00:50:56:a5:98:cf brd ff:ff:ff:ff:ff:ff
inet 10.67.248.2/24 brd 10.67.248.255 scope global eth0.110
inet6 fe80::250:56ff:fea5:98cf/64 scope link
valid_lft forever preferred_lft forever
5: eth0.111@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue
state UP
link/ether 00:50:56:a5:98:cf brd ff:ff:ff:ff:ff:ff
inet 10.67.252.2/24 brd 10.67.252.255 scope global eth0.111
inet6 fe80::250:56ff:fea5:98cf/64 scope link
valid_lft forever preferred_lft forever
[root@pkfn pf]# cat conf/pf.conf |sed 's/pass\=.*$/pass=top_secret/'
[general]
#
# general.domain
#
# Domain name of PacketFence system.
domain=wadsworth.org
#
# general.hostname
#
# Hostname of PacketFence system. This is concatenated with the domain in
Apache rewriting rules and therefore must be resolvable by clients.
hostname=pkfn
#
# general.dnsservers
#
# Comma-delimited list of DNS servers. Passthroughs are created to allow
queries to these servers from even "trapped" nodes.
dnsservers=199.184.30.42,199.184.28.129
#
# general.dhcpservers
#
# Comma-delimited list of DHCP servers. Passthroughs are created to allow DHCP
transactions from even "trapped" nodes.
dhcpservers=199.184.30.27,10.50.156.21,10.49.66.7,10.57.48.14,199.184.28.130
#
# general.maintenance_interval
#
# Interval at which Packetfence runs its maintenance tasks.
#maintenance_interval=1200s
[trapping]
#
# trapping.range
#
# Comma-delimited list of address ranges/CIDR blocks that PacketFence will
monitor/detect/trap on. Gateway, network, and
# broadcast addresses are ignored.
range=10.67.248.0/24,10.67.252.0/24
#
# trapping.passthrough
#
# When enabled, pfdns will resolve the real IP addresses of passthroughs and
add them in the ipset session to give access
# to trapped devices. Don“t forget to enable ip_forward on your server.
passthrough=enabled
#
# trapping.proxy_passthroughs
#
# Comma-delimited list of domains to be use for apache passthrough
proxy_passthroughs=inside.wadsworth.org,admin.wadsworth.org,loki.wadsworth.org,info.wadsworth.org
#
# trapping.interception_proxy
#
# When enabled, packetfence will intercept proxy request to somes specified port
interception_proxy=enabled
#
# trapping.interception_proxy_port
#
# Comma-delimited list of port used to intercept proxy traffic
interception_proxy_port=3128,8080
#
# registration.range
#
#
#range=10.67.248.0/24
[guests_admin_registration]
#
# guests_admin_registration.access_duration_choices
#
# These are all the choices offered in the guest management interface as
# possible access duration values for a given registration.
access_duration_choices=1DF+0D,1WF+0D,3MF+0D,1YF+1D,3YF
#
# guests_admin_registration.default_access_duration
#
# This is the default access duration value selected in the dropdown on the
# guest management interface.
default_access_duration=3MF+0D
[alerting]
#
# alerting.emailaddr
#
# Email address to which notifications of rogue DHCP servers, violations with
an action of "email", or any other
# PacketFence-related message goes to.
[email protected]
#
# alerting.smtpserver
#
# Server through which to send messages to the above emailaddr. The default is
localhost - be sure you're running an SMTP
# host locally if you don't change it!
smtpserver=smtp.wadsworth.org
#
# alerting.subjectprefix
#
#Subject prefix for email notifications of rogue DHCP servers, violations with
an action of "email", or any other
#PacketFence-related message.
subjectprefix=PKFN ALERT:
[scan]
#
# scan.engine
#
# Which scan engine to use to perform client-side policy compliance.
engine=nessus
#
# scan.duration
#
# Approximate duration of a scan. User being scanned on registration are
presented a progress bar
# for this duration, afterwards the browser refreshes until scan is complete.
duration=10m
#
# scan.host
#
# Host the scanning engine is running on. For performance reasons, we
# recommend running the scanning engine on a remote server. A passthrough will
# be automagically created.
host=vnix.wadsworth.org
#
# scan.user
#
# Username to log into scanning engine with.
user=pkfn
#
# scan.pass
#
# Password to log into scanning engine with.
pass=top_secret
#
# scan.nessus_clientpolicy
#
# Name of the remote policy on the nessus server
nessus_clientpolicy=basic-policy
[database]
#
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=top_secret
#
# database.user
#
# Username of the account with access to the mysql database used by PacketFence.
user=pkfn
[expire]
#
# expire.node
#
# Time before a node is removed due to inactivity.
# A value of 0D disables expiration.
# example:
# node=90D
node=120D
#
# expire.iplog
#
# Time which you would like to keep logs on IP/MAC information.
# A value of 0D disables expiration.
# example:
# iplog=180D
iplog=120D
#
# expire.traplog
#
# Time which you would like to keep logs on trap information.
# A value of 0D disables expiration.
# example:
# traplog=180D
traplog=60D
#
# expire.locationlog
#
# Time which you would like to keep logs on location information
# Please note that this table should not become too big since it
# could degrade pfsetvlan performance.
# A value of 0D disables expiration.
# example:
# locationlog=180D
locationlog=60D
[services]
#
# services.iptables
#
# Should iptables be managed by PacketFence?
iptables=disabled
[captive_portal]
#
# captive_portal.network_detection_ip
#
# This IP is used as the webserver who hosts the
common/network-access-detection.gif which is used to detect if network
# access was enabled.
# It cannot be a domain name since it is used in registration or quarantine
where DNS is blackholed.
# It is recommended that you allow your users to reach your packetfence server
and put your LAN's PacketFence IP.
# By default we will make this reach PacketFence's website as an easy solution.
#
network_detection_ip=199.184.30.46
#
# captive_portal.secure_redirect
#
# If secure_redirect is enabled, the captive portal uses HTTPS when redirecting
# captured clients. This is the default behavior.
secure_redirect=disabled
[interface eth0.111]
enforcement=vlan
ip=10.67.252.2
type=internal
mask=255.255.255.0
[interface eth0.110]
enforcement=vlan
ip=10.67.248.2
type=internal
mask=255.255.255.0
[interface eth1]
ip=10.50.156.54
type=management
mask=255.255.254.0
[root@pkfn pf]# cat conf/networks.conf
[10.67.252.0]
dns=10.67.252.2
dhcp_start=10.67.252.10
gateway=10.67.252.2
domain-name=pkfn-isolation.wadsworth.org
named=enabled
dhcp_max_lease_time=3600
dhcpd=enabled
type=vlan-isolation
netmask=255.255.255.0
dhcp_end=10.67.252.246
dhcp_default_lease_time=300
[10.67.248.0]
dns=10.67.248.2
dhcp_start=10.67.248.10
gateway=10.67.248.2
domain-name=pkfn-registration.wadsworth.org
named=enabled
dhcp_max_lease_time=3600
dhcpd=enabled
type=vlan-registration
netmask=255.255.255.0
dhcp_end=10.67.248.254
dhcp_default_lease_time=300
[10.67.249.0]
dns=10.67.248.2
next_hop=10.67.248.1
gateway=10.67.249.1
dhcp_start=10.67.249.10
domain-name=vlan-registration.wadsworth.org
named=enabled
dhcp_max_lease_time=3600
dhcpd=enabled
netmask=255.255.255.0
type=vlan-registration
dhcp_end=10.67.249.254
dhcp_default_lease_time=300
[10.67.253.0]
dns=10.67.252.2
next_hop=10.67.252.1
gateway=10.67.253.1
dhcp_start=10.67.253.10
domain-name=vlan-isolation.wadsworth.org
named=enabled
dhcp_max_lease_time=3600
dhcpd=enabled
netmask=255.255.255.0
type=vlan-isolation
dhcp_end=10.67.253.254
dhcp_default_lease_time=300
[10.67.250.0]
dns=10.67.248.2
next_hop=10.67.248.1
gateway=10.67.250.1
dhcp_start=10.67.250.10
domain-name=vlan-registration.wadsworth.org
named=enabled
dhcp_max_lease_time=3600
dhcpd=enabled
netmask=255.255.255.0
type=vlan-registration
dhcp_end=10.67.250.254
dhcp_default_lease_time=300
[10.67.254.0]
dns=10.67.252.2
next_hop=10.67.252.1
gateway=10.67.254.1
dhcp_start=10.67.254.10
domain-name=vlan-isolation.wadsworth.org
named=enabled
dhcp_max_lease_time=3600
dhcpd=enabled
netmask=255.255.255.0
type=vlan-isolation
dhcp_end=10.67.254.254
dhcp_default_lease_time=300
[10.67.251.0]
dns=10.67.248.2
next_hop=10.67.248.1
gateway=10.67.251.1
dhcp_start=10.67.251.10
domain-name=vlan-registration.wadsworth.org
named=enabled
dhcp_max_lease_time=3600
dhcpd=enabled
netmask=255.255.255.0
type=vlan-registration
dhcp_end=10.67.251.254
dhcp_default_lease_time=300
[10.67.255.0]
dns=10.67.252.2
next_hop=10.67.252.1
gateway=10.67.255.1
dhcp_start=10.67.255.10
domain-name=vlan-isolation.wadsworth.org
named=enabled
dhcp_max_lease_time=3600
dhcpd=enabled
netmask=255.255.255.0
type=vlan-isolation
dhcp_end=10.67.255.254
dhcp_default_lease_time=300
[root@pkfn pf]#
-----Original Message-----
From: [email protected]
[mailto:[email protected]]
Sent: Friday, April 24, 2015 12:28 PM
To: [email protected]
Subject: PacketFence-users Digest, Vol 84, Issue 86
Send PacketFence-users mailing list submissions to
[email protected]
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.sourceforge.net/lists/listinfo/packetfence-users
or, via email, send a message with subject or body 'help' to
[email protected]
You can reach the person managing the list at
[email protected]
When replying, please edit your Subject line so it is more specific than "Re:
Contents of PacketFence-users digest..."
Today's Topics:
1. pfsetvlan high cpu, innodb deadlocks no outgoing switch
management evident (Muller, Daniel (HEALTH))
2. Re: pfsetvlan high cpu, innodb deadlocks no outgoing switch
management evident (Louis Munro)
----------------------------------------------------------------------
Message: 1
Date: Fri, 24 Apr 2015 15:11:22 +0000
From: "Muller, Daniel (HEALTH)" <[email protected]>
Subject: [PacketFence-users] pfsetvlan high cpu, innodb deadlocks no
outgoing switch management evident
To: "[email protected]"
<[email protected]>
Cc: "Cuttler, Brian \(HEALTH\)" <[email protected]>, "Auger,
Ivan \(ITS\)" <[email protected]>
Message-ID:
<sn1pr09mb0894c5e7a1a743603f91fd28a5...@sn1pr09mb0894.namprd09.prod.outlook.com>
Content-Type: text/plain; charset="us-ascii"
This is PacketFence 4.5.1, centos-release-6-6.el6.centos.12.2.x86_64 (perl
5.10, mysql 5.1) VMware ESX.
I had a working out-of-band installation with 213 switches, mix of HP Procurve
& Cisco Catalyst.
I attempted an upgrade to 5.0 last week and then attempted to abandon this
effort by rolling back to a VMware snapshot.
To my unhappy surprise the installation is very broken now and I am at a loss.
What I'm seeing essentially is my SNMP traps are received however pfsetvlan is
not taking any action.
I set the log level in conf/log.conf to DEBUG and still the only relevant line
seen in packetfence.log is the start lines.
I tried stepping through pfsetvlan in the perl debugger and I basically saw it
load the switch configuration and start the tail on snmptrapd.log but there are
never any actions on the switches.
All the time, even in the debug session I see pfsetvlan using 100% CPU and
InnoDB deadlocks are seen in mysql.
One thing I can note and I'm unclear what this means; in the web interface I
see no management interface, actually only see a button to configure routed
networks.
In pf.conf and networks.conf my network is correctly described.
I tried running the web configurator and it did not offer a way to configure
the physical network; ( as if it was not detected).
I'm using VMXNET3 drivers and vmware-tools-core-9.0.0-2
Any guidance would be greatly appreciated.
[root@pkfn pf]# tail logs/snmptrapd.log
(6 redundant lines removed)
2015-04-24|15:01:47|UDP:
2015-04-24|[10.56.105.202]:1028->[10.50.156.54]|0.0.0.0|BEGIN TYPE 0 END
2015-04-24|TYPE BEGIN SUBTYPE 0 END SUBTYPE BEGIN VARIABLEBINDINGS
2015-04-24|.1.3.6.1.2.1.1.3.0 = Timeticks: (8155487)
2015-04-24|22:39:14.87|.1.3.6.1.6.3.1.1.4.1.0 = OID:
2015-04-24|.1.3.6.1.4.1.9.9.315.0.0.1|.1.3.6.1.2.1.2.2.1.1.7 = Wrong
2015-04-24|Type (should be INTEGER): Gauge32:
2015-04-24|7|.1.3.6.1.2.1.31.1.1.1.1.7 = STRING:
2015-04-24|GigabitEthernet1/0/5|.1.3.6.1.4.1.9.9.315.1.2.1.1.10.7 =
2015-04-24|Hex-STRING: 00 01 E6 35 0F 89 END VARIABLEBINDINGS
2015-04-24|15:01:48|UDP:
2015-04-24|[10.56.105.215]:54976->[10.50.156.54]|0.0.0.0|BEGIN TYPE 0
2015-04-24|END TYPE BEGIN SUBTYPE 0 END SUBTYPE BEGIN VARIABLEBINDINGS
2015-04-24|.1.3.6.1.2.1.1.3.0 = Timeticks: (1077737866) 124 days,
2015-04-24|17:42:58.66|.1.3.6.1.6.3.1.1.4.1.0 = OID:
2015-04-24|.1.3.6.1.4.1.9.9.315.0.0.1|.1.3.6.1.2.1.2.2.1.1.10129 = Wrong
2015-04-24|Type (should be INTEGER): Gauge32:
2015-04-24|10129|.1.3.6.1.2.1.31.1.1.1.1.10129 = STRING:
2015-04-24|GigabitEthernet0/29|.1.3.6.1.4.1.9.9.315.1.2.1.1.10.10129 =
2015-04-24|Hex-STRING: 5C 26 0A 36 81 73 END VARIABLEBINDINGS
2015-04-24|15:01:49|UDP:
2015-04-24|[10.56.105.202]:1028->[10.50.156.54]|0.0.0.0|BEGIN TYPE 0 END
2015-04-24|TYPE BEGIN SUBTYPE 0 END SUBTYPE BEGIN VARIABLEBINDINGS
2015-04-24|.1.3.6.1.2.1.1.3.0 = Timeticks: (8155669)
2015-04-24|22:39:16.69|.1.3.6.1.6.3.1.1.4.1.0 = OID:
2015-04-24|.1.3.6.1.4.1.9.9.315.0.0.1|.1.3.6.1.2.1.2.2.1.1.7 = Wrong
2015-04-24|Type (should be INTEGER): Gauge32:
2015-04-24|7|.1.3.6.1.2.1.31.1.1.1.1.7 = STRING:
2015-04-24|GigabitEthernet1/0/5|.1.3.6.1.4.1.9.9.315.1.2.1.1.10.7 =
2015-04-24|Hex-STRING: 00 01 E6 35 0F 89 END VARIABLEBINDINGS
2015-04-24|15:01:49|UDP:
2015-04-24|[10.56.105.215]:54976->[10.50.156.54]|0.0.0.0|BEGIN TYPE 0
2015-04-24|END TYPE BEGIN SUBTYPE 0 END SUBTYPE BEGIN VARIABLEBINDINGS
2015-04-24|.1.3.6.1.2.1.1.3.0 = Timeticks: (1077738019) 124 days,
2015-04-24|17:43:00.19|.1.3.6.1.6.3.1.1.4.1.0 = OID:
2015-04-24|.1.3.6.1.4.1.9.9.315.0.0.1|.1.3.6.1.2.1.2.2.1.1.10129 = Wrong
2015-04-24|Type (should be INTEGER): Gauge32:
2015-04-24|10129|.1.3.6.1.2.1.31.1.1.1.1.10129 = STRING:
2015-04-24|GigabitEthernet0/29|.1.3.6.1.4.1.9.9.315.1.2.1.1.10.10129 =
2015-04-24|Hex-STRING: 5C 26 0A 36 81 73 END VARIABLEBINDINGS
[root@pkfn pf]# tail logs/packetfence.log Apr 24 11:01:19 pfcmd.pl(3105) DEBUG:
cache get for namespace='configfiles', key='/usr/local/pf/conf/switches.conf',
cache='File:l1_cache:l1_cache', time='0ms': HIT (CHI::Driver::_log_get_result)
Apr 24 11:01:19 pfcmd.pl(3105) DEBUG: cache get for
namespace='configfilesdata', key='SwitchConfig', cache='File:l1_cache',
time='0ms': HIT (CHI::Driver::_log_get_result) Apr 24 11:01:19 pfcmd.pl(3105)
INFO: pidof -x snmptrapd returned 2700 (pf::services::manager::pidFromFile)
Apr 24 11:01:19 pfcmd.pl(3105) INFO: verifying process 2700
(pf::services::manager::removeStalePid)
Apr 24 11:01:19 pfcmd.pl(3105) INFO: pidof -x snmptrapd returned 2700
(pf::services::manager::pidFromFile)
Apr 24 11:01:19 pfcmd.pl(3105) INFO: pidof -x snmptrapd returned 2700
(pf::services::manager::pidFromFile)
Apr 24 11:01:19 pfcmd.pl(3105) DEBUG: Starting Daemon pfsetvlan with command
/usr/local/pf/sbin/pfsetvlan -d (pf::services::manager::launchService)
Apr 24 11:01:21 pfcmd.pl(3105) INFO: Daemon pfsetvlan took 1.563 seconds to
start. (pf::services::manager::launchService)
Apr 24 11:01:21 pfsetvlan(3115) INFO: pfsetvlan starting and writing 3118 to
/usr/local/pf/var/run/pfsetvlan.pid (pf::services::util::createpid) Apr 24
11:01:21 pfsetvlan(3115) INFO: Process started (main::)
-------------- next part --------------
An HTML attachment was scrubbed...
------------------------------
Message: 2
Date: Fri, 24 Apr 2015 12:27:22 -0400
From: Louis Munro <[email protected]>
Subject: Re: [PacketFence-users] pfsetvlan high cpu, innodb deadlocks
no outgoing switch management evident
To: [email protected]
Message-ID: <[email protected]>
Content-Type: text/plain; charset="windows-1252"
On Apr 24, 2015, at 11:11 , Muller, Daniel (HEALTH)
<[email protected]> wrote:
> This is PacketFence 4.5.1, centos-release-6-6.el6.centos.12.2.x86_64 (perl
> 5.10, mysql 5.1) VMware ESX.
>
> I had a working out-of-band installation with 213 switches, mix of HP
> Procurve & Cisco Catalyst.
>
> I attempted an upgrade to 5.0 last week and then attempted to abandon this
> effort by rolling back to a VMware snapshot.
>
> To my unhappy surprise the installation is very broken now and I am at a loss.
>
> What I?m seeing essentially is my SNMP traps are received however pfsetvlan
> is not taking any action.
>
> I set the log level in conf/log.conf to DEBUG and still the only relevant
> line seen in packetfence.log is the start lines.
>
> I tried stepping through pfsetvlan in the perl debugger and I basically saw
> it load the switch configuration and start the tail on snmptrapd.log but
> there are never any actions on the switches.
>
> All the time, even in the debug session I see pfsetvlan using 100% CPU and
> InnoDB deadlocks are seen in mysql.
>
> One thing I can note and I?m unclear what this means; in the web interface I
> see no management interface, actually only see a button to configure routed
> networks.
>
> In pf.conf and networks.conf my network is correctly described.
>
> I tried running the web configurator and it did not offer a way to configure
> the physical network; ( as if it was not detected).
>
> I?m using VMXNET3 drivers and vmware-tools-core-9.0.0-2
>
> Any guidance would be greatly appreciated.
>
Hi Daniel,
Did you roll back the database at the same time as the rest of PF?
I.e. does the current db schema match what is expected of a 4.5.1 install?
Which queries are deadlocking in mysql?
You could also do worse than posting your pf.conf, network.conf and output from
# ip a
Stripped of passwords etc.
Regards,
--
Louis Munro
[email protected] :: www.inverse.ca
+1.514.447.4918 x125 :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)
-------------- next part --------------
An HTML attachment was scrubbed...
------------------------------
------------------------------------------------------------------------------
One dashboard for servers and applications across Physical-Virtual-Cloud Widest
out-of-the-box monitoring support with 50+ applications Performance metrics,
stats and reports that give you Actionable Insights Deep dive visibility with
transaction tracing using APM Insight.
http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
------------------------------
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
End of PacketFence-users Digest, Vol 84, Issue 86
*************************************************
------------------------------------------------------------------------------
One dashboard for servers and applications across Physical-Virtual-Cloud
Widest out-of-the-box monitoring support with 50+ applications
Performance metrics, stats and reports that give you Actionable Insights
Deep dive visibility with transaction tracing using APM Insight.
http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users