Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Another Netgate with storage failure, 6 in total so far

    Scheduled Pinned Locked Moved Official Netgate® Hardware
    302 Posts 37 Posters 59.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • w0wW
      w0w
      last edited by

      Netgate has finally implemented the fix.
      https://redmine.pfsense.org/issues/16210#change-76840
      Thank you, @marcosm, @fireodo, @andrew_cb

      P 1 Reply Last reply Reply Quote 5
      • P
        Patch @w0w
        last edited by Patch

        Looks like it changes the vfs.zfs.txg.timeout default from
        FreeBSD vfs.zfs.txg.timeout = 5
        pfsense vfs.zfs.txg.timeout = 30

        So not as high as 120 suggested but consistent with andrew_cb recommendation

        1 Reply Last reply Reply Quote 1
        • M
          mvikman
          last edited by mvikman

          That patch code also has this: "zfs set sync=always pfSense/ROOT/default/cf"
          Looking at my own system, I don't have that path, as I have only manually named Boot Environments, I have paths like "pfSense/ROOT/24.11_stable/cf ", so that part would fail.

          Should the command be run manually on the current default/active BE path, "pfSense/ROOT/24.11_stable/cf " in my case?

          pfSense Plus 24.11-RELEASE (amd64)
          Dell Optiplex 7040 SFF
          Core i5-6500, 8GB RAM, 2x 240GB SSD (ZFS Mirror)
          HPE 561T (X540-AT2), 2-port 10Gb RJ45
          HPE 562SFP+ (X710-DA2), 2-port 10Gb SFP+

          1 Reply Last reply Reply Quote 3
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Yup. Fix incoming.

            JonathanLeeJ M 2 Replies Last reply Reply Quote 3
            • JonathanLeeJ
              JonathanLee @stephenw10
              last edited by

              @stephenw10 should the timeout be 120 or 30?

              Make sure to upvote

              1 Reply Last reply Reply Quote 1
              • JonathanLeeJ
                JonathanLee @andrew_cb
                last edited by

                @andrew_cb

                zfs set sync=always pfSense/ROOT/default/cf

                does not work on my 2100 I have a SSD should I run a different command for this?

                Make sure to upvote

                1 Reply Last reply Reply Quote 0
                • M
                  marcosm Netgate
                  last edited by

                  A fix will be provided once it's ready on the following redmine:
                  https://redmine.pfsense.org/issues/16212

                  1 Reply Last reply Reply Quote 1
                  • M
                    marcosm Netgate
                    last edited by marcosm

                    A patch is now available for testing on the redmine.

                    1 Reply Last reply Reply Quote 3
                    • M
                      Mission-Ghost @stephenw10
                      last edited by

                      @stephenw10 is there a way to stop python pfblocker logging? I’ve tried to shut off all logging in pfblocker but the python module keeps on logging.

                      I’d prefer to keep using the python module for its benefits but the logging I don’t use often consumes my ssd lifetime at all other times without benefit.

                      S 1 Reply Last reply Reply Quote 0
                      • S
                        SteveITS Galactic Empire @Mission-Ghost
                        last edited by

                        @Mission-Ghost What logging are you seeing?

                        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                        Upvote 👍 helpful posts!

                        M 1 Reply Last reply Reply Quote 0
                        • M
                          Mission-Ghost @SteveITS
                          last edited by

                          @SteveITS dnsbl.log just keeps going and going:

                          d3cf0c7e-cd41-460d-8eec-4290a36600f8-image.png

                          This is useful on rare occasions when I need to find a site to white-list, but I'd like to turn it on only on such occasions and off the rest of the time.

                          S 1 Reply Last reply Reply Quote 1
                          • S
                            SteveITS Galactic Empire @Mission-Ghost
                            last edited by SteveITS

                            @Mission-Ghost That's set for all lists here:
                            968e538d-da94-4239-817b-192c8225874c-image.png

                            or else on each list, e.g. on Firewall/pfBlockerNG/IP/IPv4.

                            With the logging off we have:

                            File successfully loaded: Total Lines: 0
                            Log/File Path: /var/log/pfblockerng/dnsbl.log
                            

                            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                            Upvote 👍 helpful posts!

                            M 1 Reply Last reply Reply Quote 1
                            • M
                              Mission-Ghost @SteveITS
                              last edited by Mission-Ghost

                              @SteveITS Thank you!

                              I found and set it on the master configuration:

                              cefdeb75-2539-44f0-b66b-9420b67b975a-image.png

                              The master setting seems to be working so far.

                              Why does "Null Block (no logging)" log?

                              Why does "No Global mode" not log?

                              Is it just, me, or do the bullet points on the master DNSBL page fail to explain this clearly?

                              By my way of reading this, "No Global Mode" tells me that the individual settings on each Group will prevail. It doesn't tell me that it is overriding the individual settings on each Group, and sure doesn't tell me that logging is disabled, unlike "no logging" which says it's disabled but it isn't.

                              I feel like I'm taking crazy pills!

                              S 1 Reply Last reply Reply Quote 0
                              • S
                                SteveITS Galactic Empire @Mission-Ghost
                                last edited by

                                @Mission-Ghost No Global should mean it doesn’t override the individual settings. I just set it when creating each list so if the global settings aren’t working I profess ignorance. :)

                                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                Upvote 👍 helpful posts!

                                M 1 Reply Last reply Reply Quote 0
                                • M
                                  Mission-Ghost @SteveITS
                                  last edited by Mission-Ghost

                                  @SteveITS said in Another Netgate with storage failure, 6 in total so far:

                                  @Mission-Ghost No Global should mean it doesn’t override the individual settings. I just set it when creating each list so if the global settings aren’t working I profess ignorance. :)

                                  Well, I guess it should mean it, but in context to some of of us who didn't develop the software, it isn't clear, particularly when adjacent options include "no logging" which apparently could not mean 'no' logging.

                                  Seems like getting an English major (>gasp!<) intern to help redefine the labels to be more meaningful to customers would be a low cost, easy improvement to the usability of the product.

                                  In any case, thank you for your generous help clarifying this. My problem is solved.

                                  1 Reply Last reply Reply Quote 1
                                  • S
                                    SteveITS Galactic Empire @andrew_cb
                                    last edited by

                                    @andrew_cb said in Another Netgate with storage failure, 6 in total so far:

                                    25% of the blocks are not available for wear leveling

                                    In the same vein, this is a bit of an edge case, but I've strung a few bugs together.

                                    1. there is a bug in Plus 24.03 and 24.11 where /conf/backup is not limited to 30 files (not auto pruned). Fixed in 25.03. https://redmine.pfsense.org/issues/15994, or the release notes. Workaround is to open the /diag_confbak.php config history page in the web GUI, and wait until it either loads or times out.

                                    2. there's a longstanding bug in pfBlocker where if DNSBL is not enabled it will still update the config file at every cron interval, e.g. hourly.
                                      https://forum.netgate.com/topic/174231/pfblockerng-fills-pfsense-config-history
                                      https://redmine.pfsense.org/issues/14409

                                    3. there's another longstanding bug in pfBlocker for HA setups where changes are not synced to the secondary router unless one manually runs a Force Reload (not a force update). Thus if you have, say, disabled a list, at every cron/update it will remove it from the backup and then when the same cron also runs on the secondary pfBlocker will add it again, generating two historical config files on the secondary router.
                                      https://redmine.pfsense.org/issues/15994
                                      https://forum.netgate.com/topic/179060/pfblockerng-sync-not-working/

                                    With these, one poster in my thread https://forum.netgate.com/topic/197685/config-history-not-pruning-on-ha-pair-has-3400-files/ has 20000 config files on disk. At our file sizes of ~300k that is in the 6 GB range, though it should be compressed on disk, if using ZFS.

                                    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                    Upvote 👍 helpful posts!

                                    M 1 Reply Last reply Reply Quote 4
                                    • M
                                      marcosm Netgate @SteveITS
                                      last edited by

                                      @SteveITS FWIW #2 should be fixed with the version in the 2.8.0/25.03 branch. As for #3 that may be fixed with https://redmine.pfsense.org/issues/16231 though the change may only take effect once the cron job runs on the secondary.

                                      1 Reply Last reply Reply Quote 2
                                      • A
                                        andrew_cb
                                        last edited by

                                        Wow, I stop checking the forum for a bit and come back to find that the ZFS patch has been released! 👏

                                        Thank you to @marcosm @stephenw10 @cmcdonald @dennypage @arri @w0w @SteveITS @Gertjan @fireodo @chrcoluk and everyone else that has contributed to this discussion and process.

                                        Hopefully, this change will help reduce the change of storage failure for all devices running pfSense, especially those using small-sized and/or eMMC storage.

                                        It is encouraging to see that additional areas have been identified for further improvements to storage wear and space usage.

                                        We have progressed a long way from "you're holding it wrong." 😉

                                        1 Reply Last reply Reply Quote 5
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.