Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    XMLRPC sync errors since upgrade to 2.4.4

    Scheduled Pinned Locked Moved HA/CARP/VIPs
    64 Posts 13 Posters 14.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      netblues @stephenw10
      last edited by netblues

      on the secondary...

      @stephenw10

      /root: df -h
      Filesystem                                         Size    Used   Avail Capacity  Mounted on
      /dev/gptid/5bd4713a-8d68-11e8-aed9-5b3c92e7c0e9     18G    1.0G     16G     6%    /
      devfs                                              1.0K    1.0K      0B   100%    /dev
      /dev/md0                                           3.4M    156K    3.0M     5%    /var/run
      devfs                                              1.0K    1.0K      0B   100%    /var/dhcpd/dev
      
      code
      
       ps -alx | grep unb
       59 91398     1   0  20  0 48640 23480 kqread   Is    -      0:00.16 /usr/local/sbin/unbound -c /var/unbound/unbound.conf
        0 86919 48899   0  20  0  6564  2456 piperd   S+    0      0:00.00 grep unb
      
      code
      

      and no it is not happening if I save settings on secondary on dns resolv

      1 Reply Last reply Reply Quote 0
      • N
        netblues
        last edited by

        So I reverted everything to http

        nginx: 2018/12/19 10:01:20 [alert] 91226#100384: *10 writev() failed (13: Permission denied) while sending to client, client: 192.168.50.3, server: , request: "POST /xmlrpc.php HTTP/1.1", upstream: "fastcgi://unix:/var/run/php-fpm.socket", host: "192.168.50.4" 
        
        
        

        It is not an ssl issue too.
        Where does this permission denied comes from?

        1 Reply Last reply Reply Quote 0
        • jimpJ
          jimp Rebel Alliance Developer Netgate
          last edited by

          Permission denied in the nginx log means something cut it off, like a state being killed/removed or possibly a firewall rule prevented the outbound connection.

          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          N C 2 Replies Last reply Reply Quote 0
          • N
            netblues @jimp
            last edited by

            @jimp Well, definitely not on the configuration. It is repeatable on every config update, and others have it too.
            If it was linux I would look at selinux...
            Now, since we are talking freebsd here, it looks like an audit denial (but my freebsd knowledge is limited)

            1 Reply Last reply Reply Quote 0
            • C
              Caligari @jimp
              last edited by Caligari

              @jimp said in XMLRPC sync errors since upgrade to 2.4.4:

              Permission denied in the nginx log means something cut it off, like a state being killed/removed or possibly a firewall rule prevented the outbound connection.

              We have been suffering this problem since 2.4.4 upgrade and insisted with 2.4.4-p1...

              Does 2.4.4-p2 solve this problem? (it announces a lot of bugfixes with nginx/php)

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by Derelict

                XMLRPC sync is working fine for lots and lots of people in 2.4.4, 2.4.4-p1 or 2.4.4-p2. It is something else unique to your setup.

                Do you have State Killing on Gateway Failure enabled? (System > Advanced, Miscellaneous)

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                D N C 3 Replies Last reply Reply Quote 1
                • D
                  DrNick 0 @Derelict
                  last edited by

                  @derelict Perhaps that should be "setups"? Problem still exists for me too with my config described above on -p1.

                  1 Reply Last reply Reply Quote 0
                  • N
                    netblues @Derelict
                    last edited by

                    @derelict xmlrpc sync IS working fine even with the error.
                    And yes, state killing on gateway failure seems to nail it.
                    Unchecking the box eliminates xmlrpcsync errors.
                    I don't recall anymore why this was checked in the first place, but IMHO looks like a bug to me.

                    B DerelictD 2 Replies Last reply Reply Quote 0
                    • B
                      bbrendon @netblues
                      last edited by

                      It seems to me the pfsense devs are still in denial about this one. The syncing is working so I just ignore it.

                      1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate @netblues
                        last edited by

                        @netblues said in XMLRPC sync errors since upgrade to 2.4.4:

                        I don't recall anymore why this was checked in the first place, but IMHO looks like a bug to me.

                        If you are killing the state XMLRPC sync is using the connection will fail in different ways.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • jimpJ
                          jimp Rebel Alliance Developer Netgate
                          last edited by

                          There is no bug. There is nothing to be in denial about.

                          • You chose the option to kill states on gateway failure
                          • You have a gateway down
                          • XMLRPC sync triggers a filter reload
                          • Firewall notices the down gateway and kills states
                          • XMLRPC dies because the state died

                          It's doing exactly what you told it to do. It may not be what you intended it to do, but it's doing what you told it to do.

                          Fix the down gateway or unset that option.

                          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                          Need help fast? Netgate Global Support!

                          Do not Chat/PM for help!

                          N 1 Reply Last reply Reply Quote 1
                          • N
                            netblues @jimp
                            last edited by

                            @jimp So what you say is that whenever I update a firewall rule I have a gateway down?

                            1 Reply Last reply Reply Quote 1
                            • jimpJ
                              jimp Rebel Alliance Developer Netgate
                              last edited by

                              Any time there is a filter reload (applying firewall rules, interface events, schedules, etc) it checks for down gateways and kills states if you have that option enabled.

                              Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                              Need help fast? Netgate Global Support!

                              Do not Chat/PM for help!

                              1 Reply Last reply Reply Quote 0
                              • C
                                Caligari @Derelict
                                last edited by

                                @derelict said in XMLRPC sync errors since upgrade to 2.4.4:

                                Do you have State Killing on Gateway Failure enabled? (System > Advanced, Miscellaneous)

                                Yes! Checked on primary and unchecked on secondary, but unchecked both and the problem has disappeared โœŒ

                                Now, I am wondering in what way "state killing on gw failure" is related to the "xmlrpc sync"... ๐Ÿ‘€

                                Thank you for the support!

                                N 1 Reply Last reply Reply Quote 0
                                • N
                                  netblues @Caligari
                                  last edited by

                                  It wouldn't be the case in a pre 2.4.4 setup for sure.

                                  So it is really All states killing in gateway failure, not just the ones related to the gateway.
                                  In my case I have 2 gateways being down on secondary (because they are used by primary)
                                  Disabling the check on secondary and keeping it on primary (which has no down gw normaly) works fine.

                                  I suppose that if all states are killed, nginx looses the connection while expecting the final ok from standby peer thus complaining.
                                  I just wonder in @Caligari situation if state kiling on primary also affects the admin http connection.

                                  1 Reply Last reply Reply Quote 0
                                  • jimpJ
                                    jimp Rebel Alliance Developer Netgate
                                    last edited by

                                    It's been the same since 2.3.x, not a new change. If it worked before, it was only by accident.

                                    Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                                    Need help fast? Netgate Global Support!

                                    Do not Chat/PM for help!

                                    N 1 Reply Last reply Reply Quote 0
                                    • N
                                      netblues @jimp
                                      last edited by

                                      @jimp So, an accidental feature then :). Which makes me wonder if kill all states was really working on a pre 2.4.4 setup.
                                      I do recall switching from master to backup whlie checking voip connections and not loosing them or the https connection to the console.
                                      I just checked and it now affects the web console as the case should be. @2.4.4p2

                                      win win situation :P

                                      1 Reply Last reply Reply Quote 0
                                      • N
                                        netblues
                                        last edited by

                                        Now I know why I have kill states on gateway failover.
                                        sip states!!
                                        Without that, sip registrations don't work after failover until states are cleared manually.
                                        Funny thing is that current calls via pf aren't lost and keep working via the f/o peer.
                                        However new calls don't work.
                                        Obviously at the same time sip host can ping all sip remote gw via pfsense just fine.

                                        I believe we need an exclusion here. Sync interface is a special use interface, and doesn't have a gateway too.
                                        How about a feature of not clearing states on interfaces that do NOT have a gateway?
                                        Will that break anything ?
                                        (it would be better to fix sip issue as it dates back years too)

                                        1 Reply Last reply Reply Quote 0
                                        • jimpJ
                                          jimp Rebel Alliance Developer Netgate
                                          last edited by

                                          The only way that happens is if you have a gateway somewhere that is down. The sync interface wouldn't normally be considered at all, it's just an innocent bystander. Look at your gateway list and see what shows as 'down', and fix that.

                                          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                                          Need help fast? Netgate Global Support!

                                          Do not Chat/PM for help!

                                          N 1 Reply Last reply Reply Quote 0
                                          • N
                                            netblues @jimp
                                            last edited by

                                            @jimp Innocent it is. however it does produce lots or noise emails.
                                            As for the gateways, well, nothing is down apart from openvpn bound to carp interfaces that go up when secondary node kicks in.
                                            So.. it is technically down but it cannot be "fixed" since it aint broken :)

                                            I understand, its a feature, but......

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.