User Details
- User Since
- Jun 2 2016, 12:52 PM (461 w, 5 d)
Dec 27 2021
Although this works, there’s still some mandatory config statements that are required. You can just lob everything into a file to be included.
Aug 9 2019
Jul 14 2019
Woah hang on.... we actually consulted the documentation on this?! That’s cheating
Jul 11 2019
From the slack discussion, we found there should be a single forward-zones-recurse line as the last one takes precedence
Jun 7 2019
For completeness, this was discussed in slack:
Apr 13 2019
Apr 1 2018
I agree with the above, this is actually how I'm dealing with custom options with dhcpd at the moment, however the same can't be done with openvpn as the functionality to include files doesn't exist within openvpn's config format, whereas it does with dhcpd.
Mar 31 2018
Not just for inputting alot of commands, but making it possible to simply specifiy an opevnpn config instead of having to re-implement every possible openvpn setting using the VyOS syntax would be a huge benefit.
Not to mention the automation aspects.. copy config, load it. done.
Jan 7 2018
I'm using ntop-ng + nprobe.
Jan 5 2018
Looks good!
This appears to operate as expected.
So by reverting, the file /opt/vyatta/sbin/vyatta-netflow.pl contains:
328 sub acct_add_nflog_target { 329 my ($intf) = @_; 330 331 my ($table_chain) = acct_get_table_chain(); 332 while (my ($chain, $table) = each(%$table_chain)) { 333 my $cmd = "iptables -t $table -I $chain 1 -i $intf -j NFLOG" ." --nflog-group 2"; 334 if (defined $nflog_range) { 335 $cmd .= " --nflog-range $nflog_range"; 336 } 337 if (defined $nflog_threshold) { 338 $cmd .= " --nflog-threshold $nflog_threshold"; 339 } 340 my $ret = system($cmd); 341 if ($ret >> 8) { 342 die "Error: [$cmd] failed - $?\n"; 343 } 344 } 345 }
Do you know how I can restore the previous version so I can see if it was this package that changed it?
I applied your patch but now iptables has reverted to using the ULOG target instead of NFLOG:
squeeb@gw1# commit [ system flow-accounting interface eth2 ] iptables: No chain/target/match by that name. Error: [iptables -t raw -I VYATTA_CT_PREROUTING_HOOK 1 -i eth2 -j ULOG --ulog-nlgroup 2 --ulog-cprange 64 --ulog-qthreshold 10] failed - 256
Changing the following lines to the excerpt below in /opt/vyatta/sbin/vyatta-netflow.pl seems to work:
# show system flow-accounting interface pppoe0 interface eth2.2 interface eth2.3 sflow { agent-address 192.168.64.1 sampling-rate 10 server 192.168.64.10 { port 2055 } }
Nov 16 2017
Another workaround is the following: