Right. hostnames are attractive.... ideal use case:

- Allow all from nagios.my.dom.ain

If someone changes the IP address of the monitor server, puppet would
find out and fix the rule on all the monitored nodes!

Maybe such a simplistic and ideal case is rare in the real world, but
it is attractive.

Regarding DNS being reconfigured, I think that as long as we
understand exactly how puppet would be impacted, it should be OK. DNS
is not supposed to be misconfigured and puppet failure could be seen
as a healthy event.

Thanks,
Mohamed.

On Wed, Nov 30, 2011 at 11:30 AM, Ken Barber <k...@puppetlabs.com> wrote:
> Yeah - I'm glad you spotted that I was just about to point it out.
>
> Its a hairy problem - Jonathan has submitted a patch for it but its
> stil in review. Generally the feeling is that having iptables use
> hostnames can be flakey at times - especially if you try to add a rule
> for a host where DNS is misconfigured or broken for some reason. Maybe
> the hostname doesn't exist yet for example. However - I realise some
> people want to do this regardless of the risks so we are looking to
> fix it.
>
> Anyway - the solution Jonathan has provided is looking reasonably good
> and should be merged in soon.
>
> ken.
>
> On Wed, Nov 30, 2011 at 3:34 PM, Mohamed Lrhazi <lrh...@gmail.com> wrote:
>> Just saw this bug report: http://projects.puppetlabs.com/issues/10723
>>
>> Sorry. Thanks.
>>
>> On Tue, Nov 29, 2011 at 8:50 PM, Mohamed Lrhazi <lrh...@gmail.com> wrote:
>>> Hello,
>>>
>>> The source and destination parameters accept both IP address or a
>>> hostname. If using a hostname, the firewall module thinks the rule
>>> changed each time it runs reporting:
>>>
>>>
>>> notice: /Firewall[300 allow netbackup traffic from
>>> nbmaster2-63.example.com]/source: current_value 192.168.63.42/32,
>>> should be nbmaster2-63.example.com (noop)
>>>
>>>
>>> Is there an easy workaround to this? other than not using hostnames?
>>>
>>> A similar issue is also seen with the value of debug-level. From some
>>> reason it always thinks it needs to be reset:
>>>
>>> notice: /Firewall[998 drop noisy local traffic]/log_level:
>>> current_value , should be warning (noop)
>>>
>>>
>>> # Log everything else, then reject it with the default deny rule
>>> firewall { '998 drop noisy local traffic':
>>>    state       => 'NEW',
>>>    log_level   => warning,
>>>    jump        => 'LOG',
>>> }
>>>
>>> iptables -nL shows this rule as:
>>>
>>> LOG        tcp  --  0.0.0.0/0            0.0.0.0/0           /* 998
>>> drop noisy local traffic */ state NEW LOG flags 0 level 4
>>>
>>> I tried setting "log_level" to 4, instead of "warning" and got :
>>>
>>> notice: /Firewall[998 drop noisy local traffic]/log_level:
>>> current_value , should be 4 (noop)
>>>
>>>
>>> Thanks a lot.
>>> Mohamed.
>>>
>>
>> --
>> You received this message because you are subscribed to the Google Groups 
>> "Puppet Users" group.
>> To post to this group, send email to puppet-users@googlegroups.com.
>> To unsubscribe from this group, send email to 
>> puppet-users+unsubscr...@googlegroups.com.
>> For more options, visit this group at 
>> http://groups.google.com/group/puppet-users?hl=en.
>>
>
> --
> You received this message because you are subscribed to the Google Groups 
> "Puppet Users" group.
> To post to this group, send email to puppet-users@googlegroups.com.
> To unsubscribe from this group, send email to 
> puppet-users+unsubscr...@googlegroups.com.
> For more options, visit this group at 
> http://groups.google.com/group/puppet-users?hl=en.
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-users@googlegroups.com.
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to