Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Services Gateway Issue #3625

Closed
cmb991 opened this issue Aug 3, 2019 · 16 comments
Closed

Services Gateway Issue #3625

cmb991 opened this issue Aug 3, 2019 · 16 comments
Assignees
Labels
cleanup Low impact changes

Comments

@cmb991
Copy link

cmb991 commented Aug 3, 2019

Important notices
Our forum is located at https://forum.opnsense.org , please consider joining discussions there in stead of using GitHub for these matters.

Before you ask a new question, we ask you kindly to acknowledge the following:

[X] I have read the contributing guide lines at https://github.com/opnsense/core/blob/master/CONTRIBUTING.md

[X] I have searched the existing issues and I'm convinced that mine is new.

I'm trying to delete some dpinger services manually. It seems that if you go to your gateways > New > create a new gateway, it won't show the gateway in the gateways but it still makes a dpinger for it. What is the best way to do this?

dpinger

@cmb991 cmb991 added the support Community support label Aug 3, 2019
@AdSchellevis
Copy link
Member

AdSchellevis commented Aug 3, 2019

can you post a screenshot of your gateways (without addresses)? It might be a bug, since dpinger reads the config directly there might be items that are not valid anymore which we now hide (since 19.7). If that's the case and you're not in a huge hurry, I'll try to look into it in the following days.

The workaround is to remove the item(s) from your config.xml manually.

@cmb991
Copy link
Author

cmb991 commented Aug 3, 2019 via email

@AdSchellevis
Copy link
Member

@cmb991 it looks like your attachments lost, can you try pasting them online?

@cmb991
Copy link
Author

cmb991 commented Aug 4, 2019

Sorry. Here are the pictures. The setup is Xfinity as the primary connection and Verizon as the failover. Although, I’m noticing Verizon is taking the primary spot when I plug it in, so I’m not sure what that is about.
F1D9A24D-E53D-48BC-A379-39D6609744A5
431D8C6E-302D-4803-89A3-616252FDB972
F9D9608C-CF7C-4D61-8B26-17CC2B0B9B3D
4A3E61BB-236A-4C7E-9BDF-BD3336E4C08B
23DF4653-B3EB-4E96-BB2F-6CDDE468D004
03568A4A-79C0-4401-B8B0-B4DC827CBEBA
4BCAFD06-7FC8-4066-AC00-37591A80CE90
A65550F5-EB06-49D4-BBB7-B3B72B09995E

@AdSchellevis
Copy link
Member

@cmb991 93bbe1e should fix the visibility issue. It's probably best to wait for 19.7.2 tomorrow and apply this patch on top (there are some other changes stashed in the same files).

image

@AdSchellevis AdSchellevis added cleanup Low impact changes and removed support Community support labels Aug 4, 2019
@AdSchellevis AdSchellevis self-assigned this Aug 5, 2019
AdSchellevis added a commit that referenced this issue Aug 5, 2019
AdSchellevis added a commit that referenced this issue Aug 5, 2019
…e should remove the container to to prevent leaving an empty item. found while working on #3625
@AdSchellevis
Copy link
Member

I missed a spot (74ff647) and found another small presentation issue while working on this item bb6833d.

To install all changes on OPNsense 19.7.2:

opnsense-patch 93bbe1e 74ff647 bb6833d

@cmb991
Copy link
Author

cmb991 commented Aug 5, 2019

Everything seems to be working now, I just had a question about this setup now; the firewall rules, I only have the one LAN rule in a gateway group called failover. Does that local DNS route firewall rule that the guide says to put in need to have the failover gateway or no since its locally doing the DNS reroute? Screenshot below
firewall rules

@AdSchellevis
Copy link
Member

@cmb991 thanks for confirming, let's close the issue then.

The port 53 rule prevents dns traffic being send to the gateway, which is needed if you are using a local forwarder (unbound for example)

@skl283
Copy link

skl283 commented Aug 7, 2019

opnsense-patch 93bbe1e 74ff647 bb6833d

@AdSchellevis it works! Thank you! The Gateways are now displayed. But i've found a litte Problem with the Checkbox in front of the entries. If i mark all entries and klick on the trash. Some will be present. I have to purge every single item in the list.

@AdSchellevis
Copy link
Member

@skl283 I haven't seen the select all issue yet, but I'll try it out on a box over here.

@skl283
Copy link

skl283 commented Aug 7, 2019

No Problem.Had just issue while delete all "testing"entries before applying the patches ;-)

@alexanderharm
Copy link

I had a similar issue since upgrading to 19.7.2. One issue remains though: after applying your patches I cannot modify the automatically generated gateway of a DHCP WAN connection! See attached screenshot. How can I set upstream gateway or priority now? Or do I need a gateway group by default if one WAN connection is DHCP based?

Screen Shot 2019-08-08 at 08 57 55

@AdSchellevis
Copy link
Member

@alexanderharm the buttons aren't shown on the right? can you resize your screen a bit? when it's a bit smaller it should resize to xs and show the buttons again. You should also be able to scroll to the right (the buttons should be there, there just don't seem to be enough space there).

@alexanderharm
Copy link

Thanks, resizing the screen did the job.

@AdSchellevis
Copy link
Member

we might use "table-condensed" to strip some of the margins, same as we did recently on the firewall pages.

AdSchellevis added a commit that referenced this issue Aug 8, 2019
@AdSchellevis
Copy link
Member

@alexanderharm 1aad01c should be better. (although it can still break out in some situations)

fichtner pushed a commit that referenced this issue Aug 23, 2019
(cherry picked from commit 74ff647)
(cherry picked from commit 93bbe1e)
(cherry picked from commit bb6833d)
(cherry picked from commit 1aad01c)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cleanup Low impact changes
Development

No branches or pull requests

4 participants