Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    25.07 unbound - pfblocker - python - syslog

    Scheduled Pinned Locked Moved General pfSense Questions
    39 Posts 4 Posters 1.1k Views 5 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J Offline
      jrey @stephenw10
      last edited by

      @stephenw10 @postilion

      Cool, that you can replicate..

      Just for a little more clarity
      One of my servers is a Graylog, the other is not (Synology repository, that's all it does is collect the same data). the two are not linked in anyway. they are completely different systems.

      it doesn't matter which one I take of line however the result is the same, when it comes back comms do not resume to that one, but still continue to the other

      So don't think we can assume it is specifically related to Graylog

      I can run for days, as long as I don't take one of the syslog servers offline (which in the case of 1 server happens twice a week (Monday and Thursday)

      Again based on unbound pid -
      had been running fine until yesterday morning, then a little bit of colour while I was writing a script and doing some thing things until about noon, then from noonish yesterday until the gap this morning, the orange(ish) on the right is after the script figured out it needed to take action and the green is when pfblocker thought unbound needed a restart because of some change that had been download --- all pretty normal except now having to have the script intervention to restart the syslog/unbound combo

      Screenshot 2025-08-11 at 11.27.49 AM.png

      It will likely run clean now until Thrusday, or unless I see something else I want to "try" sometime between now and then unbound will normally be restarted at least 1 based on a pfblocker download/change -- just like this morning I don't expect it will cause any issues. other than a noted change in pid for unbound.

      1 Reply Last reply Reply Quote 0
      • stephenw10S Online
        stephenw10 Netgate Administrator
        last edited by

        Yeah it look like this only happens when the remote host actually responds with 'refused'. So local hosts that don't respond to arp or just don't respond at all to the syslog packets will not trigger it.

        J 1 Reply Last reply Reply Quote 0
        • J Offline
          jrey @stephenw10
          last edited by

          @stephenw10

          thanks for digging in

          Interesting - that honestly seems different than the previous version.

          The behaviour of the server goes down/ comes up hasn't really changed.

          once it gets a "refused". does it ever retry ? (say when the next message is sent)

          a "default" syslog system supports retries interval and max retries options for "refused connections" are those options available to us ?

          Seems it was working (without any options before) because after any logging server went down under 24.11 logging just resumed when the server came back, as you would expect a syslog sender to do without intervention. and is the case with every other system on the network sending logs to the server..

          I'm guess the answer to supporting that options is no ?
          hint: I tried adding them to a new conf file I created in /var/etc/syslog.d directory assuming it would process any/all conf files in the directory. sadly the service would not start so removed that config file and restarted it. I'm guessing either pfSense syslog doesn't support those options or it didn't like the second conf file in the directory ? I also just tried adding the options to existing conf file (ya the one that says do not edit 😊 It started, but when I checked the conf the options had been removed from the config. so it didn't like me adding them there. 😢 😞

          I'll just use my script in the interim it works -- in monitors and after the server goes down, then when it comes up, wait a couple of minutes and restarts. syslog and unbound -- everything works perfectly from then on.

          1 Reply Last reply Reply Quote 0
          • stephenw10S Online
            stephenw10 Netgate Administrator
            last edited by

            Whether or not it reties it definitely shouldn't kill syslogd! https://redmine.pfsense.org/issues/16362

            I would expect it to keep trying though.

            J 1 Reply Last reply Reply Quote 1
            • J Offline
              jrey @stephenw10
              last edited by

              @stephenw10

              but that's not exactly the case -- it only stops logging and does not resume to the server that went down and came back up --

              I would not say it killed syslogd completely because it is still logging to a second server if configured even though it may have received a "refused connection" from either one of the two configured it is only the one going down does not resume. The other just carries on happily receiving logs.

              Now perhaps if both remote servers go offline it might stop the syslog service completely (or maybe if there is only one) - I haven't tried shutting them both down at the same time and I haven't tried only having one remote configured - I guess I could try that when things are a little less busy some evening.

              I guess you are saying that the retry options are not available in the pfsense version. from the documentation of a standard syslog setup, these options are specifically referenced in the context of a "refused connection" and how many times it should retry at what interval, which is exactly what the case is. Oddly enough not of the other system I have that are sending logs to the same servers are having a problem and have no specific options set.

              either way thanks for the investigation. I appreciate it.

              1 Reply Last reply Reply Quote 0
              • stephenw10S Online
                stephenw10 Netgate Administrator
                last edited by

                Well in my test setup I can reliably reproduce it killing syslogd. It's fixed in internal dev versions though so something needs back porting.

                Now it could be that it keeps functioning as long as at least one remote server is available... 🤔

                P J 2 Replies Last reply Reply Quote 1
                • P Offline
                  postilion @stephenw10
                  last edited by postilion

                  @stephenw10
                  In our experience syslogd dies if any target is unreachable, as noted above.
                  -nic

                  1 Reply Last reply Reply Quote 2
                  • J Offline
                    jrey @stephenw10
                    last edited by

                    @stephenw10

                    This is just information -
                    I started up my 2.8 test box

                    Pointed to a single syslog server on a different subnet - the subnet is reachable (one that I can log to if I select the correct IP) but has NO syslog server at the IP I selected. this ended in a Connection Refused (9.25:44)
                    The service was still running, but I hit restart anyway (from the services page) also Connection Refused (9:30:25)
                    Yup in both cases the IP has no server (offline)

                    Service still running. Changed the IP to a destination on the local subnet (no exception that there is a working server on this IP either).
                    Notice there is no "Connection Refused" in this case, but rather ends in "Host is down"
                    The service itself hasn't "died" at least not yet (time of posting this) but radio silence from syslogd (nothing else in the logs)

                    Screenshot 2025-08-12 at 9.45.31 AM.jpg

                    J 1 Reply Last reply Reply Quote 0
                    • J Offline
                      jrey @jrey
                      last edited by

                      @stephenw10

                      Something must be wanting to write syslog (maybe) it has just started aggressively logging this and many times per second (wonder if it is heading for a crash)

                      Screenshot 2025-08-12 at 10.49.32 AM.jpg

                      This really aggressive syslog host is down lasted until 10:54 (so about 10 minutes) then the stopped logging, the service is still running.
                      I'm guessing these messages are generated with something is trying to write to syslog - and it feels the constant urge to log that the host is down.

                      (funny I don't see this on the production box when the syslog server is down) that might be a result of the production box having two destinations setup)
                      Should be able to verify this on the test box.
                      start case1 - with syslog1 (.35). to a host that goes down, syslog2 (.2) to a valid service. (this would simulate production)
                      then flip them case 2 - syslog2 (.2) always up, syslog1 (.35) goes down for maintenance (offline)

                      since I don't see "host is down" messages on production (or "connection Refused" for that matter) I'd almost guess the order in which they are listed makes a difference to the message. If the valid service is second on the config it is "overwriting (masking)" failure messages from first server that is offline)

                      Overall then the system "thinks" the message to both was "sent", even though the first one never got it.

                      J 1 Reply Last reply Reply Quote 0
                      • stephenw10S Online
                        stephenw10 Netgate Administrator
                        last edited by

                        Yup that's what I see with a target that doesn't respond to arp. I'd guess it gets into a loop logging the host is down and then trying to send that to the syslog server. Repeat!

                        I was only able to replicate the service failing when using a target that actually responds to the traffic with refused.

                        1 Reply Last reply Reply Quote 0
                        • J Offline
                          jrey @jrey
                          last edited by

                          @stephenw10

                          Screenshot 2025-08-12 at 11.40.06 AM.jpg

                          There you go, order matters (but also n both cases there is no indication of a Host is Down or connection refused.

                          bottom up in the log changed to add a working server in the second spot
                          (.35) (.2) .35 is offline
                          switch them
                          (.2) (.35) . 35 is offline

                          notice nginx logged it but syslog itself says nothing in either case ...

                          That explains why I don't see host down or connection refused in production. it is being masked by having two servers, (in both cases)

                          I'm going to flip the order in production to see if it changes the overall "it resumes logging" when it goes off line and comes back up.

                          J 1 Reply Last reply Reply Quote 1
                          • J Offline
                            jrey @jrey
                            last edited by

                            @stephenw10

                            so flipping the order on production (.2) (.35). taking .35 offline and back. did not resume the logging to that IP - I still had to kick it. (.2) as before got everything in both cases

                            Syslog itself still didn't log (down or refused) but at least I have another reference, the nginx message now shows,
                            same as on the test box. which is at least better then nothing.

                            back to using my auto kick start script for now.

                            Carry on.
                            Thanks

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.