Amanda-Users

Re: False alarm in e-mail report

2006-08-28 07:43:48
Subject: Re: False alarm in e-mail report
From: Toomas Aas <toomas.aas AT raad.tartu DOT ee>
To: amanda-users AT amanda DOT org
Date: Mon, 28 Aug 2006 14:35:29 +0300
Jean-Louis Martineau wrote:

> I looks like the first attempt to dump tsensor.raad.tartu.ee:/usr failed
> but the seconds attempt succeeded.

Yes, I had the look at log and amdump files and looks like this is what 
happened.

> Could you send me the amdump.?? and log.<datestamp> file so that I can
> look at them and be sure of what I said.

OK, I sent them off-list.

> You sent the sendbackup.*.debug file for the successful dump, you should
> have one for the failed dump?

Yes, I have. See below.

> Did you have a problem with tsensor.raad.tartu.ee during that night,
> look at system log.

Yes, I had. Again, the firewall mistakenly blocked some packets at the
time when the failure occurred. Looks like I really have to upgrade the
OS on the client to FreeBSD 6.1 which has a newer version of IPFilter, where
this issue is supposed to be fixed.

Here's the sendbackup debug file from failed dump:

--------- cut --------
sendbackup: debug 1 pid 91056 ruid 1002 euid 1002: start at Thu Aug 24 22:16:47 
2006
/usr/local/libexec/amanda/sendbackup: version 2.4.5
  parsed request as: program `DUMP'
                     disk `/usr'
                     device `/usr'
                     level 0
                     since 1970:1:1:0:0:0
                     options `|;auth=BSD;index;'
sendbackup: try_socksize: send buffer size is 65536
sendbackup: time 0.000: stream_server: waiting for connection: 0.0.0.0.11085
sendbackup: time 0.001: stream_server: waiting for connection: 0.0.0.0.11086
sendbackup: time 0.001: stream_server: waiting for connection: 0.0.0.0.11087
sendbackup: time 0.001: waiting for connect on 11085, then 11086, then 11087
sendbackup: time 30.003: stream_accept: timeout after 30 seconds
sendbackup: time 30.003: timeout on data port 11085
sendbackup: time 58.601: stream_accept: connection from 194.126.106.100.11091
sendbackup: time 58.645: stream_accept: connection from 194.126.106.100.11080
sendbackup: time 58.645: pid 91056 finish time Thu Aug 24 22:17:46 2006
--------- cut --------

And from my firewall logs:

--------- cut --------
Aug 24 22:17:01 tsensor ipmon[298]: 22:17:00.258059 fxp0 @0:28 b 
194.126.106.100,11087 -> 213.35.176.146,11085 PR tcp len 20 48 -S IN OOW
Aug 24 22:17:04 tsensor ipmon[298]: 22:17:03.460014 fxp0 @0:28 b 
194.126.106.100,11087 -> 213.35.176.146,11085 PR tcp len 20 48 -S IN OOW
Aug 24 22:17:10 tsensor ipmon[298]: 22:17:09.659603 fxp0 @0:28 b 
194.126.106.100,11087 -> 213.35.176.146,11085 PR tcp len 20 48 -S IN OOW
Aug 24 22:17:22 tsensor ipmon[298]: 22:17:21.862321 fxp0 @0:28 b 
194.126.106.100,11087 -> 213.35.176.146,11085 PR tcp len 20 48 -S IN OOW
--------- cut --------

This indicates that some packets were dropped because they were considered as
being "out of window" by the firewall. Note that the port numbers and timestamps
in these two logs match.

--
Toomas Aas

<Prev in Thread] Current Thread [Next in Thread>