OPNsense
  • Home
  • Help
  • Search
  • Login
  • Register

  • OPNsense Forum »
  • Profile of jphylips »
  • Show Posts »
  • Messages
  • Profile Info
    • Summary
    • Show Stats
    • Show Posts...
      • Messages
      • Topics
      • Attachments

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

  • Messages
  • Topics
  • Attachments

Messages - jphylips

Pages: [1]
1
23.1 Legacy Series / Re: IPv6 PD not work after update OPNSense from 22.7.11->23.1_6
« on: March 20, 2023, 03:20:32 pm »
@gpb, if this happens again, could you execute this:

/usr/local/etc/rc.configure_interface wan

Maybe that will restore things?

2
22.7 Legacy Series / Re: Constant CPU Spikes
« on: January 02, 2023, 01:55:39 pm »
Hi,
I see them too. Maybe they are caused by this cron job:

*   *   *   *   *   (/usr/local/bin/flock -n -E 0 -o /tmp/filter_update_tables.lock /usr/local/opnsense/scripts/filter/update_tables.py) > /dev/null

This job  runs every minute and causes my CPU (same as yours) to spike for about 10 seconds.

3
22.7 Legacy Series / Re: Lower cpu load during idle in 22.7.5 when using suricata
« on: October 07, 2022, 11:06:10 am »
Hi,
I noticed a drop in CPU load as well. I have proof in a Zabbix graph, which I'm unable to upload I'm afraid.

Franco,
No negativity from my end. You guys are doing an excellent job. Better support than many enterprises deliver these days. So keep up the fantastic work and many thanks from a former pfSense user.

4
22.1 Legacy Series / Re: ZPOOL Features - any recommendations ?
« on: March 17, 2022, 03:03:19 pm »
Hi Patrick,

I'm in the same boat as devhunter55, where zroot requires a zfs upgrade. However, I don't want to render my firewall unbootable after running the 'zpool upgrade zroot' command. Would it be a risk or inadvisable not to upgrade the pool?

Kind regards
Jan-Willem

5
Intrusion Detection and Prevention / Re: Apply policy from the commandline
« on: November 14, 2021, 05:18:12 pm »
Hi Fright,

Thanks for this and replying so quickly.
The commands ran without an issue, so that seems solved.

No irregular activity can be found in the Diagnostics are there.

I guess case closed.

Thanks again.

6
Intrusion Detection and Prevention / Apply policy from the commandline
« on: November 14, 2021, 02:44:18 pm »
Hi,

I try to apply a suricata policy from the GUI but keep getting errors. It seems like a timeout of some sorts. The configd.log says the following:

unable to sendback response [OK ] for [ids][install][['rules']] {6fc08c2d-8d49-491a-8cdf-ac51ec4a6fc2}, message was Traceback (most recent call last):   File "/usr/local/opnsense/service/modules/processhandler.py", line 202, in run     self.connection.sendall(('%s\n' % result).encode()) BrokenPipeError: [Errno 32] Broken pipe

Is there a way to apply a policy using the console, by using configctl?

Thanks.

Pages: [1]
OPNsense is an OSS project © Deciso B.V. 2015 - 2023 All rights reserved
  • SMF 2.0.19 | SMF © 2021, Simple Machines
    Privacy Policy
    | XHTML | RSS | WAP2