Luke Kanies <l...@madstop.com> writes: > Run puppetd with --trace --no-daemonize --debug and leave it running > like that. The stack trace should point you to where the problem is > in your iptables module.
Ah, this certainly looks like more of a stack trace, though I'm not really sure how to interpret it. The first couple lines look like: err: Could not create 01 localhost spoofing in: undefined method `+' for false:FalseClass /var/lib/puppet/lib/puppet/type/iptables.rb:451:in `initialize' /usr/lib/ruby/1.8/puppet/type.rb:1129:in `new' /usr/lib/ruby/1.8/puppet/type.rb:1129:in `create' /usr/lib/ruby/1.8/puppet/transportable.rb:91:in `to_type' /usr/lib/ruby/1.8/puppet/transportable.rb:198:in `to_catalog' /usr/lib/ruby/1.8/puppet/transportable.rb:126:in `each' And line 451 (and surrounding) of iptables.rb is: 447 def initialize(args) 448 super(args) 449 450 invalidrule = false 451 @@total_rule_count += 1 452 453 table = value(:table).to_s 454 @@rules[table] = [] unless @@rules[table] I'm not really sure how to interpret this. I suspect it's beyond my ability as a programmer, so I'm hoping someone has seen it before. Or that someone has a pointer to an iptables module. seph --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Puppet Users" group. To post to this group, send email to puppet-users@googlegroups.com To unsubscribe from this group, send email to puppet-users+unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/puppet-users?hl=en -~----------~----~----~----~------~----~------~--~---