Re: [Puppet Users] Re: Puppetlabs Firewall

2014-07-10 Thread Cristian Falcas
Hi, We where hitting the same issue also. We solved it like this: - we have a fact that makes sure the iptables service is up on the machine. Otherwise if the service is down, there will be no purge and we still get the previous rules. - we put the purge resource in a special class (something like

Re: [Puppet Users] Re: Puppetlabs Firewall

2014-07-04 Thread Ken Barber
So puppetlabs-firewall is an active provider, whenever it 'runs' in the catalog it applies the rule straight away. You are probably seeing this because you're applying a blocking rule (like a DROP or default DROP for the table) before the SSH allowance rule gets applied. Take a close look at the p

[Puppet Users] Re: Puppetlabs Firewall

2014-07-04 Thread Danny Roberts
To clarify; we have to use SSH to connect to the servers in this environment, they are all VMs & the hosting provider does not give any means of accessing a console (not ideal but sadly beyond our control). Our standard process is after building a new server to have manually run Puppet once to

[Puppet Users] Re: Puppetlabs Firewall

2014-07-02 Thread jcbollinger
On Tuesday, July 1, 2014 9:30:57 AM UTC-5, Danny Roberts wrote: > > I am using the Puppetlabs firewall module to manage our firewall. All > servers get our core ruleset: > > *[...]*This worked perfectly when I spun up a server with no role (and > therefore no extra rules. However when I spun up

Re: [Puppet Users] Re: puppetlabs-firewall issue

2014-07-02 Thread Pablo Morales
Cory Thank you very much!!! that was the issue... target prot opt source destination ACCEPT icmp -- 0.0.0.0/00.0.0.0/0 /* 000 accept all icmp */ ACCEPT all -- 0.0.0.0/00.0.0.0/0 /* 001 accept all to lo interface *

Re: [Puppet Users] Re: puppetlabs-firewall issue

2014-07-02 Thread Cory Stoker
Hmm... Do you have plugin sync turned on in the agent config? Should see something like pluginsync = true in your puppet.conf. The error specified seems to be having an issue fining the type which is sync'ed from the master to the agents through plugin sync. On Tue, Jul 1, 2014 at 1:50 PM, Pabl

[Puppet Users] Re: Puppetlabs Firewall

2014-07-01 Thread Danny Roberts
Just a slight update this seems to happen on any server now, not just those with the extra rules. -- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To unsubscribe from this group and stop receiving emails from it, send an email to puppet-users+u

[Puppet Users] Re: puppetlabs-firewall issue

2014-07-01 Thread Pablo Morales
If it helps this is what I see when running in debug mode: debug: /Stage[main]/My_fw::Post/Firewall[999 drop all]/require: requires Class[My_fw::Pre] debug: /Stage[main]/My_fw::Pre/Firewall[001 accept all to lo interface]/before: requires Firewall[002 accept related established rules] debug: /St

[Puppet Users] Re: puppetlabs-firewall question

2014-03-21 Thread Race Boyer
I have been wondering this myself, I think the best way to find out is to try it! So that's exactly what I'm going to do and I will report back what happens. On Thursday, January 23, 2014 2:49:58 PM UTC-6, Ygor wrote: > > In the documentation, it says: > > With the latest version, we now have in

[Puppet Users] Re: Puppetlabs firewall module

2013-04-22 Thread Ask Bjørn Hansen
On Wednesday, March 27, 2013 12:32:27 PM UTC-7, David Warden wrote: > > I'm also running in to this. Has anyone managed to get the puppet firewall > module to manage both iptables and ip6tables? > >> You can add rules to ip6tables by specifying provider => 'ip6tables' on each firewall {} statem

[Puppet Users] Re: Puppetlabs firewall module

2013-03-27 Thread David Warden
I'm also running in to this. Has anyone managed to get the puppet firewall module to manage both iptables and ip6tables? On Monday, December 3, 2012 6:38:17 PM UTC-5, David Mesler wrote: > > Julia, did you ever figure this out? I'm running into this issue as well. > > --david > > On Tuesday, May

Re: [Puppet Users] Re: puppetlabs-firewall source array not working as expected

2012-12-15 Thread Jakov Sosic
On 12/04/2012 03:56 PM, Terry Z. wrote: I believe you have stumbled into the same issue I ran into when attempting to workaround this with defined resources and unfortunately I had to continue using the legacy bobsh-iptables module as a result (which has its own inherent issues but at least prope

[Puppet Users] Re: puppetlabs-firewall source array not working as expected

2012-12-04 Thread Dusty Doris
On Tuesday, December 4, 2012 10:02:42 AM UTC-5, jcbollinger wrote: > > > On Monday, December 3, 2012 5:25:58 PM UTC-6, Dusty Doris wrote: >> >> [...] I'm trying to figure out how I can re-write this to make it work, >> but it appears the puppet dsl only acts on arrays when they are the name >>

[Puppet Users] Re: puppetlabs-firewall source array not working as expected

2012-12-04 Thread jcbollinger
On Monday, December 3, 2012 5:25:58 PM UTC-6, Dusty Doris wrote: > > [...] I'm trying to figure out how I can re-write this to make it work, > but it appears the puppet dsl only acts on arrays when they are the name > variable and then calls the resource once for each item in the array, > pas

[Puppet Users] Re: puppetlabs-firewall source array not working as expected

2012-12-04 Thread Terry Z.
I believe you have stumbled into the same issue I ran into when attempting to workaround this with defined resources and unfortunately I had to continue using the legacy bobsh-iptables module as a result (which has its own inherent issues but at least properly accepts an array in source.) It is

[Puppet Users] Re: Puppetlabs firewall module

2012-12-03 Thread David Mesler
Julia, did you ever figure this out? I'm running into this issue as well. --david On Tuesday, May 22, 2012 5:28:05 AM UTC-4, Julia Smith wrote: > > I'm trying to use the firewall resource and it works fine for me for > iptables. > > However, I'm not sure how I purge ip6tables? > > doing... >

[Puppet Users] Re: puppetlabs-firewall source array not working as expected

2012-12-03 Thread Dusty Doris
Thanks for the reply. I will take a look at that patch. I have been trying to accomplish this with defined resources, unfortunately my particular case isn't working well for that. Here is my attempt, perhaps anyone has some suggestions? define myfirewall::accept($proto='tcp', $ports) { fir

[Puppet Users] Re: puppetlabs-firewall source array not working as expected

2012-12-03 Thread Bezerker
Dusty, I actually had the same issue and brought this up with Ken Barber at PuppetConf. I believe he and several others have looked into this briefly but nothing much has come from it. There was a puppet bug report where another user had managed to have it take arrays without too much issue:

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-06-19 Thread Ioannis Aslanidis
Thanks a lot for the example. I managed to make it work. Turns out that in fw::post my firewall rules need to have the parameter before => undef in order to work. On Tue, Jun 19, 2012 at 4:18 PM, Christian McHugh wrote: > I have this working in our environment as a module, which I will attempt to

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-06-19 Thread Christian McHugh
I have this working in our environment as a module, which I will attempt to describe. module: casfirewall init.pp class casfirewall { include casfirewall::default, casfirewall::fwpre, casfirewall::fwpost file {"/etc/iptables": ensure => "directory", owner => "root", group => "ro

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-06-19 Thread Ioannis Aslanidis
Hello, Thanks for the reply. I hope this is really not something related to an incompatibility with puppet 2.7. Did anyone get this working using puppet 2.7? I have tried this with stages and I get the cyclic dependency problem. Then I tried this solution using require => Class["fw::pre"] and bef

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-06-19 Thread jcbollinger
On Tuesday, June 19, 2012 4:30:38 AM UTC-5, Ioannis wrote: [...] Stages generate cycles. > Yes, stages are prone to that. Your solution tells me it cannot find the pre class: > No, *your application* of Ken's example tells you that. Tue Jun 19 05:20:23 -0400 2012 Puppet (err): Failed to appl

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-06-19 Thread Ioannis
Not working for me. Stages generate cycles. Your solution tells me it cannot find the pre class: Tue Jun 19 05:20:23 -0400 2012 Puppet (err): Failed to apply catalog: Could not find dependency Class[Fw::Pre] for Firewall[100 accept http connections] at It definitely does not like: Firewall {

[Puppet Users] Re: puppetlabs-firewall: negate operator?

2012-04-24 Thread Mohamed Lrhazi
I also need to figure out how to code this rule: -A POSTROUTING -o virbr0 -p udp -m udp --dport 68 -j CHECKSUM --checksum-fill --checksum-fill is not supported, in puppet-iptables, right? or can arbitrary iptables parameters be passed along somehow? I am using the purge option How would you

[Puppet Users] Re: puppetlabs-firewall: negate operator?

2012-04-22 Thread Mohamed Lrhazi
If negation is not possible, then maybe I can just use two rules? firewall { '100 snat for network foo2': chain => 'POSTROUTING', action => 'accept', proto => 'all', source => ['192.168.122.0/24'], destination => ['192.168.122.0/24'], table => 'nat', } firewall { '101 snat for netwo

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-03-14 Thread Ken Barber
> Since the whole fwpre class is run before everything else, is it necessary > to define each resource with dependencies with firewall {"002 testing": > ...}->firewall {... as in your gist? No its not. > Anyway, works great for us now. Thanks much! Good to hear - I'll get the documentation fixed

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-03-14 Thread Christian McHugh
Super, it all works great! Since the whole fwpre class is run before everything else, is it necessary to define each resource with dependencies with firewall {"002 testing": ...}->firewall {... as in your gist? Anyway, works great for us now. Thanks much! All that remains is waiting for a new

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-03-14 Thread Ken Barber
> You said: >> >> the numbers in the namevar are ultimately for how they get >> ordered in the file ruleset as you state - but not what order >> they are _inserted_. > > Which makes me still think that the order various modules kick can affect > the firewall rules. Thus, a stage after main is still

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-03-14 Thread Christian McHugh
Great! ... almost? The Firewall notify dependency check almost covers everything. I really like its elegance. The one problem I can still think of is that the firewall module is not the only one setting firewall rules. In the puppetlabs/apache module, for example, it attempts to open up port 8

[Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-03-14 Thread jcbollinger
On Mar 13, 4:24 pm, Christian McHugh wrote: > I appreciate the interest but I don't understand how you can tell me you > don't have any experience with the module but yet know that I'm doing it > wrong. I didn't say you were doing it wrong. I said you were incorrect that run stages are the on

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-03-13 Thread Ken Barber
This ordering behaviour is as you state, and the numbers in the namevar are ultimately for how they get ordered in the file ruleset as you state - but not what order they are _inserted_. Ideally it would be great to have insertion order and order in the firewall list to be the same - but this doesn

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-03-13 Thread Christian McHugh
In the pre main stage I have defined rules to allow outbound and allow related and established. In the post main stage, it does a drop all. Before this was organized into stages, occasionally the drop all would get applied before keep established and allow outbound, and thus the client could los

[Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-03-13 Thread Christian McHugh
I appreciate the interest but I don't understand how you can tell me you don't have any experience with the module but yet know that I'm doing it wrong. The puppetlabs firewall module does not have classes or anything else to base a dependency on. I agree, I would rather not use stages, which i

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-03-13 Thread Mohamed Lrhazi
The numbering in the firewall resource names is not meant for ordering their executing, but for guaranteeing their uniqueness. I too found that using stages is the only usable way out of this. Just out of curiosity, what do you mean by: > We ended > up in situations where the drop rules would ki

[Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-03-12 Thread jcbollinger
On Feb 15, 1:00 pm, Christian McHugh wrote: > Hi all, > > I'm attempting to use the puppetlabs-firewall module. In testing, > rules are enabled in a random order, so it seems necessary to utilize > puppet stages to guarantee proper ordering. It is incorrect that you must use run stages to achi

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-03-10 Thread Christian McHugh
Sounds interesting. As far as I've seen, the puppetlabs-firewall resource activates instantly. I've not tried to have them all write out to a file and trigger an exec iptables-restore. If the firewall resource kicks the only way I think it can, then we had an issue of firewall ordering. While

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-03-09 Thread tujwww
Looks like you are applying the rules in Pre, Main and Post stage using firewall, i wonder what could be the requirement to apply the rules in different stages instead of creating a File resource, Service notify trigger using Exec iptables-restore, if you don't mind giving a little elaboration.

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-03-09 Thread Christian McHugh
> > Thus far I've only been able to get puppet to run without making the > firewall persistent. > In the case of running the exec save-rules in the post: it's no good if your hosts are at all dynamic since it only runs after the main stage. So if you have an existing host, add another normal f

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-03-09 Thread Mohamed Lrhazi
I just tried something which seems to workaround the cyclic dependency issue: - put the exec definition in the class that runs in the post stage. - in site.pp put the default: Firewall { notify => Exec["persist-firewall"], } Thanks, Mohamed. On Fri, Mar 9, 2012 at 9:47 AM, Mohamed Lrhazi wr

Re: [Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-03-09 Thread Mohamed Lrhazi
Hi Christian, I am running into this same issue... Did you resolve it? Thanks a lot, Mohamed. On Wed, Feb 15, 2012 at 3:36 PM, Christian McHugh wrote: > I've got slightly more info. In trying to figure this out I ran across > http://projects.puppetlabs.com/issues/10665 where it was suggested >

[Puppet Users] Re: puppetlabs-firewall stages and persistence

2012-02-15 Thread Christian McHugh
I've got slightly more info. In trying to figure this out I ran across http://projects.puppetlabs.com/issues/10665 where it was suggested that the persist-firewall bits (already shown in the previous message) get placed into site.pp. This almost worked perfectly. I've placed the following inside a

Re: [Puppet Users] Re: puppetlabs firewall module

2012-01-03 Thread Grant Byers
On 4 January 2012 07:33, bel wrote: > I'd reverse my stages if I were you. Seems like that will fix it. > > On Dec 27 2011, 11:02 am, Jure Pečar wrote: > > On Tue, 27 Dec 2011 04:32:03 -0800 (PST) > > > > bel wrote: > > > You could use stages as described in documentation: > > > > >http://forge

[Puppet Users] Re: puppetlabs firewall module

2012-01-03 Thread bel
I'd reverse my stages if I were you. Seems like that will fix it. On Dec 27 2011, 11:02 am, Jure Pečar wrote: > On Tue, 27 Dec 2011 04:32:03 -0800 (PST) > > bel wrote: > > You could use stages as described in documentation: > > >http://forge.puppetlabs.com/puppetlabs/firewall > > Now I've implem

Re: [Puppet Users] Re: puppetlabs firewall module

2011-12-27 Thread Simon KP
Your iptables rules are wrong, that is why you lose SSH connection. I'd look into those before worrying about Puppet. On Wed, Dec 28, 2011 at 3:02 AM, Jure Pečar wrote: > On Tue, 27 Dec 2011 04:32:03 -0800 (PST) > bel wrote: > > > You could use stages as described in documentation: > > > > http

Re: [Puppet Users] Re: puppetlabs firewall module

2011-12-27 Thread Jure Pečar
On Tue, 27 Dec 2011 04:32:03 -0800 (PST) bel wrote: > You could use stages as described in documentation: > > http://forge.puppetlabs.com/puppetlabs/firewall Now I've implemented stages and indeed output of puppet agent makes me think they are in place: notice: /Firewall[002 allow icmp on et

[Puppet Users] Re: puppetlabs firewall module

2011-12-27 Thread bel
You could use stages as described in documentation: http://forge.puppetlabs.com/puppetlabs/firewall On Dec 27, 1:48 am, Mark Walkom wrote: > It's because puppet doesn't read sequentially but randomly accesses the > module/class. > You might be able to get around this by using a template. > > O

Re: [Puppet Users] Re: puppetlabs-firewall: hostnames Vs IP addresses

2011-12-07 Thread Mohamed Lrhazi
I run into a problem when I tried applying my new firewall module based config on RedHat version 5 systems... the problem is that th iptables-save behaves differently than the one on RedHat 6: # /sbin/iptables --version iptables v1.3.5 # /sbin/iptables-save | grep SSH -A INPUT -s 10.128.0.0/255.12

Re: [Puppet Users] Re: puppetlabs-firewall: hostnames Vs IP addresses

2011-11-30 Thread Ken Barber
Agreed. On Wed, Nov 30, 2011 at 5:31 PM, Mohamed Lrhazi wrote: > Right. hostnames are attractive ideal use case: > > - Allow all from nagios.my.dom.ain > > If someone changes the IP address of the monitor server, puppet would > find out and fix the rule on all the monitored nodes! > > Maybe s

Re: [Puppet Users] Re: puppetlabs-firewall: hostnames Vs IP addresses

2011-11-30 Thread Mohamed Lrhazi
Right. hostnames are attractive ideal use case: - Allow all from nagios.my.dom.ain If someone changes the IP address of the monitor server, puppet would find out and fix the rule on all the monitored nodes! Maybe such a simplistic and ideal case is rare in the real world, but it is attractiv

Re: [Puppet Users] Re: puppetlabs-firewall: hostnames Vs IP addresses

2011-11-30 Thread Ken Barber
Yeah - I'm glad you spotted that I was just about to point it out. Its a hairy problem - Jonathan has submitted a patch for it but its stil in review. Generally the feeling is that having iptables use hostnames can be flakey at times - especially if you try to add a rule for a host where DNS is mi

Re: [Puppet Users] Re: puppetlabs-firewall: How does it work?

2011-11-30 Thread Ken Barber
> Thank a lot Ken... Just to be sure and clear, the "lockout" problem is > not about locking puppet agent itself out, that is : > > - All the rules, part of the catalogue, are retrieved from the puppet > master in one go, then applied one after another, in unpredictable > order, but there is no cha

[Puppet Users] Re: puppetlabs-firewall: hostnames Vs IP addresses

2011-11-30 Thread Mohamed Lrhazi
Just saw this bug report: http://projects.puppetlabs.com/issues/10723 Sorry. Thanks. On Tue, Nov 29, 2011 at 8:50 PM, Mohamed Lrhazi wrote: > Hello, > > The source and destination parameters accept both IP address or a > hostname. If using a hostname, the firewall module thinks the rule > change

Re: [Puppet Users] Re: puppetlabs-firewall: How does it work?

2011-11-30 Thread Mohamed Lrhazi
Thank a lot Ken... Just to be sure and clear, the "lockout" problem is not about locking puppet agent itself out, that is : - All the rules, part of the catalogue, are retrieved from the puppet master in one go, then applied one after another, in unpredictable order, but there is no chance of fire

Re: [Puppet Users] Re: puppetlabs-firewall: How does it work?

2011-11-30 Thread Ken Barber
The rule order is lexical based on comment, however the order which they get applied to the running ruleset during a puppet run, without proper puppet ordering can be effectively random. This follows the same rules as any puppet resource without explicit/implicit ordering. Because of this, you may

[Puppet Users] Re: puppetlabs-firewall: How does it work?

2011-11-29 Thread Mohamed Lrhazi
To clarify why I am asking how does this work...The doc has this intriguing advise: "If you wish to ensure any reject rules are executed last, try using stages..." Isn't the "rule order" integer in the resource name solving that problem? Thanks, Mohamed. On Tue, Nov 29, 2011 at 2:30 PM, Mohamed L