-
-
Notifications
You must be signed in to change notification settings - Fork 75
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RHEL 8 - Error: COMMAND_FAILED: 'python-nftables' failed #319
Comments
Red Hat Support found the problem:
That "module" parameter did not cause problems in RHEL 7, but RHEL 8.5 really does not like it. |
Help me out here, please. |
More details from Red Hat: That parameter shows in /etc/firewalld/services/.xml as Red Hat says changing it to And it does work, but how do I get it that way using this module ? |
From where $module is used in the code
I'd chalk this one up to changes between RHEL 7 and RHEL 8, and the documentation not perfectly reflecting that. Have you tried setting the Side note: |
I can try putting Does anyone have references for netfilter kernel helper modules ? About |
With either To paraphrase Professor HIggins, "By George1 I think we've got it !" |
Now if I only knew what it does and why I would want to include it … |
Hmmmm, yeah. Despite the deprecation notice, there isn't a parameter set up to take a hiera hash of firewalld_custom_services. What I do in situations like this is something like
profile/firewalld.pp
As I was typing this out, I see you posted another message with success. Huzzah! |
I have to admit, I copied it from the example given in the documentation. About Hiera, could we get the needed parameter before |
I think in your stated case (allowing connections into the Puppet server), you don't need the netbios-ns helper. Puppet's not using netbios, so you probably don't need it.
That part I can't speak to. I'm just a Puppet user who happens to work heavily with firewalls at work. :-) puppet-firewalld/manifests/init.pp Line 122 in 3aaf4f4
firewalld_custom_service { $key:
|
Just noting that we've experienced outages due to this issue twice in the last 3 months, against both RHEL 8.9 and 9.3, but we do not have any modules declared against our custom services (and can not yet reliably reproduce the problem). I've also raised a case with Red Hat to try and determine root cause. |
Red Hat analysis of the SOS Report seems to indicate that the Puppet Firewalld module may have a bug in the order that it processes the various components/rules. Here is a verbatim extract of just the summary of their case findings:
Looking in more detail at the open issues against this module, I found two which seem to concur:
This seems to be evidence that dependencies need to be investigated at a wider level. Firewalld logs on affected hosts show 3 error lines which repeat multiple times:
Our declaration of the firewalld class in is as follows:
All of the firewall rules are defined in hiera, with the base ruleset in "common.yaml", and where needed additional host rules at the hiera node level. See the below hiera extract (with other rules excluded for clarity)
Happy to provide further information and run tests as needed to get to the bottom of this. |
Affected Puppet, Ruby, OS and module versions/distributions
Puppet: PE 2021.4
RHEL 8.5
How to reproduce (e.g Puppet code you use)
This was for an initial Code Manager deployment, using code that ran OK on RHEL/CentOS 7
What are you seeing
In the puppet log, when it tried to reload firewalld, it spewed this:
Error: COMMAND_FAILED: 'python-nftables' failed: internal:0:0-0: Error: Could not process rule: No such file or directory
internal:0:0-0: Error: Could not process rule: No such file or directory
internal:0:0-0: Error: Could not process rule: No such file or directory
internal:0:0-0: Error: Could not process rule: No such file or directory
internal:0:0-0: Error: Could not process rule: No such file or directory
internal:0:0-0: Error: Could not process rule: No such file or directory
internal:0:0-0: Error: Could not process rule: No such file or directory
internal:0:0-0: Error: Could not process rule: No such file or directory
JSON blob:
{"nftables": [{"metainfo": {"json_schema_version": 1}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT_ZONES", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "ens192"}}, {"goto": {"target": "filter_IN_drop"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD_OUT_ZONES", "expr": [{"match": {"left": {"meta": {"key": "oifname"}}, "op": "==", "right": "ens192"}}, {"goto": {"target": "filter_FWDO_drop"}}]}}}, {"insert": {"rule": {"family": "ip", "table": "firewalld", "chain": "nat_POSTROUTING_ZONES", "expr": [{"match": {"left": {"meta": {"key": "oifname"}}, "op": "==", "right": "ens192"}}, {"goto": {"target": "nat_POST_drop"}}]}}}, {"insert": {"rule": {"family": "ip6", "table": "firewalld", "chain": "nat_POSTROUTING_ZONES", "expr": [{"match": {"left": {"meta": {"key": "oifname"}}, "op": "==", "right": "ens192"}}, {"goto": {"target": "nat_POST_drop"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD_IN_ZONES", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "ens192"}}, {"goto": {"target": "filter_FWDI_drop"}}]}}}, {"insert": {"rule": {"family": "ip", "table": "firewalld", "chain": "nat_PREROUTING_ZONES", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "ens192"}}, {"goto": {"target": "nat_PRE_drop"}}]}}}, {"insert": {"rule": {"family": "ip6", "table": "firewalld", "chain": "nat_PREROUTING_ZONES", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "ens192"}}, {"goto": {"target": "nat_PRE_drop"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING_ZONES", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "ens192"}}, {"goto": {"target": "mangle_PRE_drop"}}]}}}]}
Firewalld is now broken.
I put in a help ticket to Red Hat, but I wanted to see if you folks have seen this mess before.
The text was updated successfully, but these errors were encountered: