Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 1473790 Details for
Bug 1613066
Reboot of v3.10 master looses iptables rules/chain
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
after reboot iptables output
iptables.out.after-reboot (text/plain), 7.67 KB, created by
Øystein Bedin
on 2018-08-06 22:34:39 UTC
(
hide
)
Description:
after reboot iptables output
Filename:
MIME Type:
Creator:
Øystein Bedin
Created:
2018-08-06 22:34:39 UTC
Size:
7.67 KB
patch
obsolete
>Chain INPUT (policy ACCEPT 0 packets, 0 bytes) > pkts bytes target prot opt in out source destination > 5603 1145K KUBE-FIREWALL all -- * * 0.0.0.0/0 0.0.0.0/0 > 4110 1060K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED > 736 53191 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 > 939 56340 INPUT_direct all -- * * 0.0.0.0/0 0.0.0.0/0 > 939 56340 INPUT_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0 > 939 56340 INPUT_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0 > 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID > 936 56160 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited > >Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) > pkts bytes target prot opt in out source destination > 0 0 DOCKER-ISOLATION all -- * * 0.0.0.0/0 0.0.0.0/0 > 0 0 DOCKER all -- * docker0 0.0.0.0/0 0.0.0.0/0 > 0 0 ACCEPT all -- * docker0 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED > 0 0 ACCEPT all -- docker0 !docker0 0.0.0.0/0 0.0.0.0/0 > 0 0 ACCEPT all -- docker0 docker0 0.0.0.0/0 0.0.0.0/0 > 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED > 0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 > 0 0 FORWARD_direct all -- * * 0.0.0.0/0 0.0.0.0/0 > 0 0 FORWARD_IN_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0 > 0 0 FORWARD_IN_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0 > 0 0 FORWARD_OUT_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0 > 0 0 FORWARD_OUT_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0 > 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID > 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited > >Chain OUTPUT (policy ACCEPT 5038 packets, 1010K bytes) > pkts bytes target prot opt in out source destination > 5038 1010K KUBE-FIREWALL all -- * * 0.0.0.0/0 0.0.0.0/0 > 5195 1027K OUTPUT_direct all -- * * 0.0.0.0/0 0.0.0.0/0 > >Chain DOCKER (1 references) > pkts bytes target prot opt in out source destination > >Chain DOCKER-ISOLATION (1 references) > pkts bytes target prot opt in out source destination > 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 > >Chain FORWARD_IN_ZONES (1 references) > pkts bytes target prot opt in out source destination > 0 0 FWDI_public all -- eth0 * 0.0.0.0/0 0.0.0.0/0 [goto] > 0 0 FWDI_public all -- + * 0.0.0.0/0 0.0.0.0/0 [goto] > >Chain FORWARD_IN_ZONES_SOURCE (1 references) > pkts bytes target prot opt in out source destination > >Chain FORWARD_OUT_ZONES (1 references) > pkts bytes target prot opt in out source destination > 0 0 FWDO_public all -- * eth0 0.0.0.0/0 0.0.0.0/0 [goto] > 0 0 FWDO_public all -- * + 0.0.0.0/0 0.0.0.0/0 [goto] > >Chain FORWARD_OUT_ZONES_SOURCE (1 references) > pkts bytes target prot opt in out source destination > >Chain FORWARD_direct (1 references) > pkts bytes target prot opt in out source destination > >Chain FWDI_public (2 references) > pkts bytes target prot opt in out source destination > 0 0 FWDI_public_log all -- * * 0.0.0.0/0 0.0.0.0/0 > 0 0 FWDI_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0 > 0 0 FWDI_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0 > 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 > >Chain FWDI_public_allow (1 references) > pkts bytes target prot opt in out source destination > >Chain FWDI_public_deny (1 references) > pkts bytes target prot opt in out source destination > >Chain FWDI_public_log (1 references) > pkts bytes target prot opt in out source destination > >Chain FWDO_public (2 references) > pkts bytes target prot opt in out source destination > 0 0 FWDO_public_log all -- * * 0.0.0.0/0 0.0.0.0/0 > 0 0 FWDO_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0 > 0 0 FWDO_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0 > >Chain FWDO_public_allow (1 references) > pkts bytes target prot opt in out source destination > >Chain FWDO_public_deny (1 references) > pkts bytes target prot opt in out source destination > >Chain FWDO_public_log (1 references) > pkts bytes target prot opt in out source destination > >Chain INPUT_ZONES (1 references) > pkts bytes target prot opt in out source destination > 939 56340 IN_public all -- eth0 * 0.0.0.0/0 0.0.0.0/0 [goto] > 0 0 IN_public all -- + * 0.0.0.0/0 0.0.0.0/0 [goto] > >Chain INPUT_ZONES_SOURCE (1 references) > pkts bytes target prot opt in out source destination > >Chain INPUT_direct (1 references) > pkts bytes target prot opt in out source destination > >Chain IN_public (2 references) > pkts bytes target prot opt in out source destination > 939 56340 IN_public_log all -- * * 0.0.0.0/0 0.0.0.0/0 > 939 56340 IN_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0 > 939 56340 IN_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0 > 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 > >Chain IN_public_allow (1 references) > pkts bytes target prot opt in out source destination > 3 180 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW > >Chain IN_public_deny (1 references) > pkts bytes target prot opt in out source destination > >Chain IN_public_log (1 references) > pkts bytes target prot opt in out source destination > >Chain KUBE-FIREWALL (2 references) > pkts bytes target prot opt in out source destination > 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes firewall for dropping marked packets */ mark match 0x8000/0x8000 > >Chain OUTPUT_direct (1 references) > pkts bytes target prot opt in out source destination
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1613066
:
1473789
| 1473790