You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It is not a large issue, since the set is flushed (empty) and can remain as a leak that doesn't really bothers without any reference and usage, especially if it restart, since the existing set will not cause any error.
Anyway as possible solution (workaround):
actionstop = <_ipt_del_rules>
<actionflush>
- ipset destroy <ipmset>+ # wait a bit if set cannot be destroyed immediately after removal of iptables (still in use):+ ipset destroy <ipmset> 2>/dev/null || { sleep 1; ipset destroy <ipmset>; }
The text was updated successfully, but these errors were encountered:
Stop of fail2ban may cause an error in ipset based actions (by a race condition with "it is in use by a kernel component").
Similar error found on GH that explains the RC.
It is not a large issue, since the set is flushed (empty) and can remain as a leak that doesn't really bothers without any reference and usage, especially if it restart, since the existing set will not cause any error.
Anyway as possible solution (workaround):
The text was updated successfully, but these errors were encountered: