Hello David,

Can you show the output of the top command and show it here?

Thanks

Ludovic Zammit
Product Support Engineer Principal Lead

Cell: +1.613.670.8432
Akamai Technologies - Inverse
145 Broadway
Cambridge, MA 02142
Connect with Us:         <https://community.akamai.com/>  
<http://blogs.akamai.com/>  <https://twitter.com/akamai>  
<http://www.facebook.com/AkamaiTechnologies>  
<http://www.linkedin.com/company/akamai-technologies>  
<http://www.youtube.com/user/akamaitechnologies?feature=results_main>

> On Jan 29, 2024, at 5:49 PM, David Moore <dave.mo...@outlook.com> wrote:
> 
> 13.0, before that I'm not sure, but it was 12.x
> 
> Get Outlook for Android 
> <https://urldefense.com/v3/__https://aka.ms/AAb9ysg__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKtBonPiU$>
> 
> From: Zammit, Ludovic <luza...@akamai.com>
> Sent: Monday, January 29, 2024 4:27:55 PM
> To: PacketFence-users <packetfence-users@lists.sourceforge.net>
> Cc: David Moore <dave.mo...@outlook.com>
> Subject: Re: [PacketFence-users] Help with IP Tables and Processor usage 
> question
> 
> Hello David,
> 
> What was the previous PF version before the upgrade?
> 
> Thanks,
> 
> Ludovic Zammit
> Product Support Engineer Principal Lead
> 
> Cell: +1.613.670.8432
> Akamai Technologies - Inverse
> 145 Broadway
> Cambridge, MA 02142
> Connect with Us:       <https://community.akamai.com/>  
> <http://blogs.akamai.com/>  
> <https://urldefense.com/v3/__https://twitter.com/akamai__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXK0citiyA$>
>   
> <https://urldefense.com/v3/__http://www.facebook.com/AkamaiTechnologies__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKmB9CJFY$>
>   
> <https://urldefense.com/v3/__http://www.linkedin.com/company/akamai-technologies__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXK82QPJ78$>
>   
> <https://urldefense.com/v3/__http://www.youtube.com/user/akamaitechnologies?feature=results_main__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKcEpHcjA$>
> 
>> On Jan 25, 2024, at 10:02 AM, David Moore via PacketFence-users 
>> <packetfence-users@lists.sourceforge.net> wrote:
>> 
>> I recently upgraded to PF 13.1 and have had a few issues, most of which I 
>> have been able to resolve. The only lingering issue I'm aware of is with IP 
>> Tables, but I'm not positive it's something to be concerned about because PF 
>> is working. 
>> 
>> My PF server is ZEN running in VMWare ESXi the assigned hardware is 32 GB of 
>> RAM, 4 Processors and 300 GB of disk space, my network consists of about 30 
>> nodes authenticating with 802.1x (Active Directory and MAC Auth for non-AD 
>> devices) memory and disk space are fine but the CPU is constantly at 5Ghz of 
>> consumption (is that normal for the processor?)
>> 
>> Please see the details from packetfence.log and from systemctl status 
>> packetfence-iptables below:
>> 
>> packetfence.log:
>> Jan 25 09:43:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(14) 
>> INFO: [mac:[undef]] getting security_events triggers for accounting cleanup 
>> (pf::accounting::acct_maintenance)
>> Jan 25 09:43:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(17) 
>> INFO: [mac:[undef]] processed 0 security_events during security_event 
>> maintenance (1706193787.30847 1706193787.36479) 
>> (pf::security_event::security_event_maintenance)
>> Jan 25 09:43:15 fence packetfence[562283]: -e(562283) INFO: saving existing 
>> iptables to /usr/local/pf/var/iptables.bak (pf::iptables::iptables_save)
>> Jan 25 09:43:15 fence packetfence[562283]: -e(562283) WARN: We are using 
>> IPSET (pf::ipset::iptables_generate)
>> Jan 25 09:43:15 fence packetfence[562283]: -e(562283) INFO: flushing 
>> iptables (pf::ipset::iptables_flush_mangle)
>> Jan 25 09:43:15 fence packetfence[562283]: -e(562283) INFO: Adding Forward 
>> rules to allow connections to the OAuth2 Providers and passthrough. 
>> (pf::iptables::generate_passthrough_rules)
>> Jan 25 09:43:15 fence packetfence[562283]: -e(562283) INFO: Adding IP based 
>> passthrough for connectivitycheck.gstatic.com 
>> <https://urldefense.com/v3/__http://connectivitycheck.gstatic.com/__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKYfy49kk$>
>>  (pf::iptables::generate_passthrough_rules)
>> Jan 25 09:43:15 fence packetfence[562283]: -e(562283) INFO: Adding NAT 
>> Masquerade statement. (pf::iptables::generate_passthrough_rules)
>> Jan 25 09:43:15 fence packetfence[562283]: -e(562283) INFO: restoring 
>> iptables from /usr/local/pf/var/conf/iptables.conf 
>> (pf::iptables::iptables_restore)
>> Jan 25 09:43:15 fence packetfence[562283]: -e(562283) WARN: Problem trying 
>> to run command: LANG=C /sbin/iptables-restore < 
>> /usr/local/pf/var/conf/iptables.conf called from iptables_restore. Child 
>> exited with non-zero value 2 (pf::util::pf_run)
>> Jan 25 09:44:06 fence pfperl-api-docker-wrapper[562338]: pfperl-api(19) 
>> INFO: [mac:[undef]] processed 0 security_events during security_event 
>> maintenance (1706193846.10912 1706193846.12021) 
>> (pf::security_event::security_event_maintenance)
>> Jan 25 09:44:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(15) 
>> INFO: [mac:[undef]] Using 300 resolution threshold 
>> (pf::pfcron::task::cluster_check::run)
>> Jan 25 09:44:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(14) 
>> INFO: [mac:[undef]] getting security_events triggers for accounting cleanup 
>> (pf::accounting::acct_maintenance)
>> Jan 25 09:44:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(15) 
>> INFO: [mac:[undef]] All cluster members are running the same configuration 
>> version (pf::pfcron::task::cluster_check::run)
>> Jan 25 09:44:16 fence packetfence[562283]: -e(562283) INFO: saving existing 
>> iptables to /usr/local/pf/var/iptables.bak (pf::iptables::iptables_save)
>> Jan 25 09:44:16 fence packetfence[562283]: -e(562283) WARN: We are using 
>> IPSET (pf::ipset::iptables_generate)
>> Jan 25 09:44:16 fence packetfence[562283]: -e(562283) INFO: flushing 
>> iptables (pf::ipset::iptables_flush_mangle)
>> Jan 25 09:44:16 fence packetfence[562283]: -e(562283) INFO: Adding Forward 
>> rules to allow connections to the OAuth2 Providers and passthrough. 
>> (pf::iptables::generate_passthrough_rules)
>> Jan 25 09:44:16 fence packetfence[562283]: -e(562283) INFO: Adding IP based 
>> passthrough for connectivitycheck.gstatic.com 
>> <https://urldefense.com/v3/__http://connectivitycheck.gstatic.com/__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKYfy49kk$>
>>  (pf::iptables::generate_passthrough_rules)
>> Jan 25 09:44:16 fence packetfence[562283]: -e(562283) INFO: Adding NAT 
>> Masquerade statement. (pf::iptables::generate_passthrough_rules)
>> Jan 25 09:44:16 fence packetfence[562283]: -e(562283) INFO: restoring 
>> iptables from /usr/local/pf/var/conf/iptables.conf 
>> (pf::iptables::iptables_restore)
>> Jan 25 09:44:16 fence packetfence[562283]: -e(562283) WARN: Problem trying 
>> to run command: LANG=C /sbin/iptables-restore < 
>> /usr/local/pf/var/conf/iptables.conf called from iptables_restore. Child 
>> exited with non-zero value 2 (pf::util::pf_run)
>> Jan 25 09:45:06 fence pfperl-api-docker-wrapper[562338]: pfperl-api(13) 
>> INFO: [mac:[undef]] processed 0 security_events during security_event 
>> maintenance (1706193906.17069 1706193906.18816) 
>> (pf::security_event::security_event_maintenance)
>> Jan 25 09:45:06 fence pfperl-api-docker-wrapper[562338]: pfperl-api(12) 
>> INFO: [mac:[undef]] getting security_events triggers for accounting cleanup 
>> (pf::accounting::acct_maintenance)
>> Jan 25 09:45:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(13) 
>> INFO: [mac:[undef]] Using 300 resolution threshold 
>> (pf::pfcron::task::cluster_check::run)
>> Jan 25 09:45:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(13) 
>> INFO: [mac:[undef]] All cluster members are running the same configuration 
>> version (pf::pfcron::task::cluster_check::run)
>> Jan 25 09:45:16 fence packetfence[562283]: -e(562283) INFO: saving existing 
>> iptables to /usr/local/pf/var/iptables.bak (pf::iptables::iptables_save)
>> Jan 25 09:45:16 fence packetfence[562283]: -e(562283) WARN: We are using 
>> IPSET (pf::ipset::iptables_generate)
>> Jan 25 09:45:16 fence packetfence[562283]: -e(562283) INFO: flushing 
>> iptables (pf::ipset::iptables_flush_mangle)
>> Jan 25 09:45:17 fence packetfence[562283]: -e(562283) INFO: Adding Forward 
>> rules to allow connections to the OAuth2 Providers and passthrough. 
>> (pf::iptables::generate_passthrough_rules)
>> Jan 25 09:45:17 fence packetfence[562283]: -e(562283) INFO: Adding IP based 
>> passthrough for connectivitycheck.gstatic.com 
>> <https://urldefense.com/v3/__http://connectivitycheck.gstatic.com/__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKYfy49kk$>
>>  (pf::iptables::generate_passthrough_rules)
>> Jan 25 09:45:17 fence packetfence[562283]: -e(562283) INFO: Adding NAT 
>> Masquerade statement. (pf::iptables::generate_passthrough_rules)
>> Jan 25 09:45:17 fence packetfence[562283]: -e(562283) INFO: restoring 
>> iptables from /usr/local/pf/var/conf/iptables.conf 
>> (pf::iptables::iptables_restore)
>> Jan 25 09:45:17 fence packetfence[562283]: -e(562283) WARN: Problem trying 
>> to run command: LANG=C /sbin/iptables-restore < 
>> /usr/local/pf/var/conf/iptables.conf called from iptables_restore. Child 
>> exited with non-zero value 2 (pf::util::pf_run)
>> Jan 25 09:46:06 fence pfperl-api-docker-wrapper[562338]: pfperl-api(15) 
>> INFO: [mac:[undef]] processed 0 security_events during security_event 
>> maintenance (1706193966.18047 1706193966.2038) 
>> (pf::security_event::security_event_maintenance)
>> Jan 25 09:46:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(15) 
>> INFO: [mac:[undef]] getting security_events triggers for accounting cleanup 
>> (pf::accounting::acct_maintenance)
>> Jan 25 09:46:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(16) 
>> INFO: [mac:[undef]] Using 300 resolution threshold 
>> (pf::pfcron::task::cluster_check::run)
>> Jan 25 09:46:07 fence pfperl-api-docker-wrapper[562338]: pfperl-api(16) 
>> INFO: [mac:[undef]] All cluster members are running the same configuration 
>> version (pf::pfcron::task::cluster_check::run)
>> Jan 25 09:46:17 fence packetfence[562283]: -e(562283) INFO: saving existing 
>> iptables to /usr/local/pf/var/iptables.bak (pf::iptables::iptables_save)
>> 
>> 
>> systemctl status packetfence-iptables:
>> ● packetfence-iptables.service - PacketFence Iptables configuration
>>      Loaded: loaded (/lib/systemd/system/packetfence-iptables.service; 
>> enabled; vendor preset: enabled)
>>      Active: active (running) since Wed 2024-01-24 14:15:55 EST; 1h 17min ago
>>    Main PID: 562283 (perl)
>>       Tasks: 1 (limit: 38474)
>>      Memory: 188.3M
>>         CPU: 46.312s
>>      CGroup: /packetfence.slice/packetfence-iptables.service
>>              └─562283 /usr/bin/perl -I/usr/local/pf/lib 
>> -I/usr/local/pf/lib_perl/lib/perl5 -Mpf::db 
>> -Mpf::services::manager::iptables -e my $db ; while(!$db) { eval { $db = 
>> db_ping() } ; sleep 1 } ; 
>> pf::services::manager::iptables->new()->startAndCheck()
>> 
>> Jan 24 15:33:11 fence.sixmoore.com 
>> <https://urldefense.com/v3/__http://fence.sixmoore.com/__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKburw20k$>
>>  sudo[752059]: pam_unix(sudo:session): session closed for user root
>> Jan 24 15:33:11 fence.sixmoore.com 
>> <https://urldefense.com/v3/__http://fence.sixmoore.com/__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKburw20k$>
>>  sudo[752062]:     root : PWD=/ ; USER=root ; COMMAND=/usr/sbin/ipset --add 
>> pfsession_passthrough 172.217.13.99,443
>> Jan 24 15:33:11 fence.sixmoore.com 
>> <https://urldefense.com/v3/__http://fence.sixmoore.com/__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKburw20k$>
>>  sudo[752062]: pam_unix(sudo:session): session opened for user root(uid=0) 
>> by (uid=0)
>> Jan 24 15:33:11 fence.sixmoore.com 
>> <https://urldefense.com/v3/__http://fence.sixmoore.com/__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKburw20k$>
>>  sudo[752062]: pam_unix(sudo:session): session closed for user root
>> Jan 24 15:33:11 fence.sixmoore.com 
>> <https://urldefense.com/v3/__http://fence.sixmoore.com/__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKburw20k$>
>>  packetfence[562283]: -e(562283) INFO: Adding NAT Masquerade statement. 
>> (pf::iptables::generate_passthrough_rules)
>> Jan 24 15:33:11 fence.sixmoore.com 
>> <https://urldefense.com/v3/__http://fence.sixmoore.com/__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKburw20k$>
>>  packetfence[562283]: -e(562283) INFO: restoring iptables from 
>> /usr/local/pf/var/conf/iptables.conf (pf::iptables::iptables_restore)
>> Jan 24 15:33:11 fence.sixmoore.com 
>> <https://urldefense.com/v3/__http://fence.sixmoore.com/__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKburw20k$>
>>  perl[752066]: iptables-restore v1.8.7 (nf_tables): invalid port/service 
>> `%%httpd_collector_port%%' specified
>> Jan 24 15:33:11 fence.sixmoore.com 
>> <https://urldefense.com/v3/__http://fence.sixmoore.com/__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKburw20k$>
>>  perl[752066]: Error occurred at line: 62
>> Jan 24 15:33:11 fence.sixmoore.com 
>> <https://urldefense.com/v3/__http://fence.sixmoore.com/__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKburw20k$>
>>  perl[752066]: Try `iptables-restore -h' or 'iptables-restore --help' for 
>> more information.
>> Jan 24 15:33:11 fence.sixmoore.com 
>> <https://urldefense.com/v3/__http://fence.sixmoore.com/__;!!GjvTz_vk!T36FG1sm3qbNIPKsJSVIMXnKsXJUr1m8P2KW5kw773SsHSB61HxKpA18FIL7HL8jyXnG-pdTGRXKburw20k$>
>>  packetfence[562283]: -e(562283) WARN: Problem trying to run command: LANG=C 
>> /sbin/iptables-restore < /usr/local/pf/var/conf/iptables.conf called from 
>> iptables_restore. Child exited with non-zero value 2 (pf::util::pf_run) 
>> 
>> I looked at the /usr/local/pf/var/conf/iptables.conf file and line 62 reads: 
>> -A input-management-if --protocol tcp --match tcp --dport 
>> %%httpd_collector_port%% --jump ACCEPT
>> 
>> 
>> Thanks
>> Dave
>> _______________________________________________
>> PacketFence-users mailing list
>> PacketFence-users@lists.sourceforge.net 
>> <mailto:PacketFence-users@lists.sourceforge.net>
>> https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!W7iDMR4-NGQYg2tqf9z2ToridNJj_dYDYn6ZAwKwbiwCtAc3O0rHn0tkPtUi9_h6LVad5cCvHyzMhFsldRoPu-QPOgTOHIeR8hJNXQ$
> 
> 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to