The latest driver also includes a fix for link flapping, which is the issue we are experiencing.
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
All Stories
Oct 24 2020
Oct 23 2020
Oct 22 2020
Besides the command proposal there is a common issue with how we build op-mode commands. The best example is the ping op-mode command where and artifical node.tag folder is created which links (ln -s) back to itself.
The current NTP config always binds to localhost and localhost is not a part of the mgmt VRF thus this error message.
It looks good, I want to ask how other people in the community think about this?
- If the user configures his cluster as a "pool" or a bunch of "server" they should work fine, he can also "allow" them to connect to him if he wishes. I would recommend connecting to a good pool myself, or a low stratum device hosted locally, instead of making some kind of cluster.
- https://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-users/2016/03/msg00001.html
Does anyone understand the meaning of these performance data? I don’t know the unit of these data
- 1. When the user's data source uses NTP cluster, whether switching to the new service may lead to the compatibility problem of NTP cluster network
Yes, absolutely, and if you visit the link in the post you'll see a comparison of them, and at the bottom is some explanation.
Can chronyd completely replace NTP?
Вячеслав @Viacheslav, я не понял вопроса...
В шапке таска лежит рабочий патч
Tested creation on both server and client.
OpenVPN conf file is contains the key-direction
Server and client can connect correctly.
Oct 21 2020
I have ntp listening in vrf mgmt, note that i have not set vrf bind-to-all.
@Viacheslav if we set acct-port=0 it should to disable accounting.
[radius] server=x.x.x.x,secret,auth-port=1812,acct-port=0
@Dmitry Your suggestions? Is it possible?
What parameter do we need to change?
We need to check what's going on here https://github.com/vyos/vyatta-cfg/blob/current/etc/bash_completion.d/vyatta-cfg#L930-L962
Will be fixed in the new LTS release.
@jack9603301 I tried building jool into the VyOS image but because their deb packages uses DKMS which is not compatible with VyOS so somebody has to create a VyOS specific deb package.
Also, while setting up test for T2906:
No problem
I can see why the smoketests pass. They only check if the interface has been removed from the config - not the system.
Possible bug with "admin_state"
@tjh can you edit one file?
Did this work earlier in previous releases? is this a regression in 1.2.6-S1 ?
@c-po What do you propose?
It has passed the GNS test, and the test cases are as follows:
@banditos13 can you send a link to the file, which you suggest to fix, or create PR?
Do we need it for "crux"?
This does not affect the work of VPN service.
@Magnum Can you test it?
@Cheeze_It thank you for testing.
Oct 20 2020
Here is the test for the LDP session time change.
Here is the test for Explicit Null.
Everything seems to be good. Closing case.
Simple R1&R2
R2 will have low priority in HA and other ip-adresses in the same subnet
Thanks @Viacheslav; I'm running other tests with vyos-load-config at the moment, and will check and add.
Can you provide a simple config of R1 R3 and R4?
I want to reproduce it in the test lab.
I cannot check rolling release, but on latest 1.2.6 problem is solved.
What content of "conf-path" ?
Which files in /config/tinc0/hosts ?
Hello everyone, I am integrating tinc. At present, I have passed the basic test in a simple virtual machine. The command line is simplified. Examples are as follows:
Thank you.
Reopen the task or create a new one if you find some problems.
I have investigated it now a bit deeper and found out that this router got migrated to VRF automatically (Our deployment stack automatically migrates upgraded/new deployed routers to VRF usage for OOB/VxLAN communication).
I think it some code like
Submitted second PR
Many thanks!
I can see a case where people deliberately do NOT want to use ISP provided DNS servers (to avoid DNS NX hijacking) (and/or lock to a major internet DNS server like google 8.8.8.8 or Quad9 9.9.9.9 or Cloudflare 1.1.1.1 for example)
Oct 19 2020
This is an example scenario in which this comes handy:
You have three ethernet interfaces
Two are connected to different LANs
The third is connected to WAN (another router)
All networks offer DHCP and def gw
The LANs offer it for internet access
The WAN offers it for branch access
We want to keep def gw received for WAN and ignore internet access offered by those LANs
@Merijn Can you check the latest rolling?
Or write please which commands do you use?
@lbv2rus Can you try the latest rolling release?