iptables weird behavior after reboot #9047
-
Hello everybody!!!. After a few days of hard work I have managed to deploy an SO (2.3.140 - onpremisse - iso version) that is ingesting events sent by various servers through syslog. I have allowed the servers source IP with so-allow/so-firewall, customized the pipelines, dashboards and everything was working fine, until a reboot has been done: only the logs of some servers are being ingested (same pipeline, same index...). After some testing it seems that the traffic from some servers matches the iptables INPUT rule (and the traffic is dropped) and others the FORWARD rule (and the events are routed to elastic docker and ingested): same syslog format, same protocol (UDP), same port, etc... (verified with custom LOG rules in tcpdump and logs in messages). The first time i see this weird behavior. The IPs of all the servers are in the chain DOCKER-USER with same config, and as can see, some rules match traffic and others don't, even though the traffic is arriving (verified with tcpdump)
2252K 440M ACCEPT udp -- * * 10.1.100.35 0.0.0.0/0 udp dpt:514 Any idea what is happening? thank you all in advance and thanks for this great platform. [after reboot and after seeing this behavior, I have tried restarting services (so-elastic-restart, so-elasticsearch-restart, removing and adding IPs (so-allow, so-firewall, so-firewall apply, iptables...)...] |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 2 replies
-
Done!!! Restart rsyslog on the servers and everything works fine again. |
Beta Was this translation helpful? Give feedback.
Done!!! Restart rsyslog on the servers and everything works fine again.