summaryrefslogtreecommitdiff
path: root/interface-definitions/include
AgeCommit message (Collapse)Author
2025-02-03syslog: T6989: remove "file" logging destinationChristian Breunig
2025-01-24Merge pull request #4216 from HollyGurza/T6641Daniil Baturin
T6641: Add vyos-network-event-logger Service
2025-01-21T6895: Merge the hsflowd-based sFlow and uacctd-based sFlow (#4310)Nataliia S.
2025-01-21T6641: Add vyos-network-event-logger Servicekhramshinr
The service parses and logs network events for improved monitoring and diagnostics. Supported event types include: - `RTM_NEWROUTE`, `RTM_DELROUTE` - `RTM_NEWLINK`, `RTM_DELLINK` - `RTM_NEWADDR`, `RTM_DELADDR` - `RTM_NEWNEIGH`, `RTM_DELNEIGH`, `RTM_GETNEIGH` - `RTM_NEWRULE`, `RTM_DELRULE` Added operational mode commands for filtered log retrieval: - `show log network-event <event-type> <interface>`: Retrieve logs filtered by event type and interface. - `show interfaces <type> <name> event-log <event-type>`: Display interface-specific logs filtered by event type.
2025-01-13Merge pull request #4217 from aapostoliuk/T2326-circinusChristian Breunig
nhrp: T2326: NHRP migration to FRR
2025-01-09nhrp: T2326: NHRP migration to FRRaapostoliuk
NHRP migration to FRR
2025-01-09Merge pull request #4293 from indrajitr/haproxy-backend-completionChristian Breunig
haproxy: T5222: Enable backend completion in service ruleset
2025-01-09xml: T5738: Reuse predefined regex constraintIndrajit Raychaudhuri
2025-01-09haproxy: T5222: Enable backend completion in service rulesetIndrajit Raychaudhuri
Enable completion for backend in haproxy service ruleset like so: ``` set load-balancing haproxy service NAME rule 10 set backend ```
2025-01-06T6841: firewall: improve config parsing for ZBF when using VRFs and ↵Nicolas Fort
interfaces attached to VRFs
2024-12-31T6949: adds blackbox exporter (#4255)Nicolas Vollmar
* T6949: adds blackbox exporter * T6949: adds basic config generation * T6949: extract shared module config options * T6949: switch to ipv4/6 literals * T6949: moves config file to /run * T6949: adds dns query name option * T6949: adds dns query type values * T6949: adds blackbox exporter to debian/control
2024-12-23xml: T5738: re-use XML building blocks for interfaces as much as possibleChristian Breunig
Change XML definitions to re-use already existing building blocks, or merge two building block sinto one (e.g. static route interfaces).
2024-12-20Merge pull request #4242 from nvollmar/T6953Christian Breunig
T6953: merges node and frr exporter under prometheus section
2024-12-19T6953: add migration for old configurationNicolas Vollmar
2024-12-18Merge pull request #4233 from HollyGurza/T6934Christian Breunig
T6934: Add preshared key for zabbix-agent monitoring service
2024-12-18Merge pull request #4223 from HollyGurza/T6874Christian Breunig
T6874: [QoS] Add class filter by ether
2024-12-18Merge pull request #4236 from opswill/currentDaniil Baturin
T6918: Accept invalid PPPoE Session in stateful bridge firewall.
2024-12-18T6874: [QoS] Add class filter by etherkhramshinr
Implement a command to configure QoS policy filters by ether properties. The supported match types include: - Destination: Specify the Ethernet destination address. - Protocol: Define the Ethernet protocol. - Source: Set the Ethernet source address. `set qos policy <type> <name> class <id> match <match-id> ether <destination|protocol|source> <val>`
2024-12-17T6918: Fix punctuationopswill
Co-authored-by: Daniil Baturin <daniil@baturin.org>
2024-12-16static: T6746: migrate BFD CLI nodesChristian Breunig
Migrate "set protocols static route <x.x.x.x/x> next-hop <y.y.y.y> bfd multi-hop source <z.z.z.z> profile <NAME>" to: "set protocols static route <x.x.x.x/x> next-hop <y.y.y.y> bfd profile bar" FRR supports only one source IP address per BFD multi-hop session. VyOS had CLI cupport for multiple source addresses which made no sense.
2024-12-16frr: T6747: migrate protocols to unified FRRender classChristian Breunig
With FRR 10.0 daemons started to be migrated to integrated FRR mgmtd and a northbound interface. This led to some drawbacks in the current state how changes to FRR are handled. The current implementation will use frr-reload.py and specifies excatly WHICH daemon needs a config update and will only replace this part inside FRR. With FRR10 and mgmtd when a partial configuration is sent to mgmtd, it will remove configuration parts from other daemons like bgpd or ospfd which have not yet been migrated to mgmtd. It's not possible to call frr-reload.py with daemon mgmtd - it will error out. This commit will also change the CLI for static routes: CLI command "set protocols static route 10.0.0.0/8 next-hop 1.2.3.4 bfd multi-hop source 1.1.1.1" will be split into: * set protocols static route 10.0.0.0/8 next-hop 1.2.3.4 bfd source-address 1.1.1.1 * set protocols static route 10.0.0.0/8 next-hop 1.2.3.4 bfd multi-hop To make the XML blocks reusable, and comply with the FRR CLI - this was actually a wrong implementation from the beginning as you can not have multiple BFD source addresses. CLI command "set protocols static route 10.0.0.0/8 next-hop 1.2.3.4 bfd multi-hop source 1.1.1.1 profile bar" is changed to: * set protocols static route 10.0.0.0/8 next-hop 1.2.3.4 bfd profile bar CLI commands "set protocols static multicast interface-route" is moved to: * set protocols static multicast route <x.x.x.x/x> interface To have an identical look and feel with regular static routes.
2024-12-16ospf: T6747: add retransmit-window CLI optionChristian Breunig
2024-12-16Merge pull request #4211 from natali-rs1985/T4214Daniil Baturin
static: T4214: Allow several dhcp-interfaces to the same static rote
2024-12-16T6934: Add preshared key for zabbix-agent monitoring servicekhramshinr
- Allow configure preshared key for zabbix-agent - Added op mode command for generatre random psk secret - Removed duplicate xml definition for psk settings Configure authentication mode: ``` # set service monitoring zabbix-agent authentication mode Possible completions: pre-shared-secret Use a pre-shared secret key ``` Configure PSK Settings: ``` # set service monitoring zabbix-agent authentication psk Possible completions: id ID for authentication secret pre-shared secret key ``` Generate Random PSK: ``` $ generate psk random Possible completions: <Enter> Execute the current command size Key size in bytes ```
2024-12-13T6918: Accept invalid PPPoE Session in stateful bridge firewall.opswill
2024-12-12T6863: Fix default distance for PPPoE (#4229)Roman Khramshin
set `default-route-distance` to 1
2024-11-29static: T4214: Allow several dhcp-interfaces to the same static roteNataliia Solomko
2024-11-21T6806: Rework QoS Policy for HFSC Shaper (#4181)Roman Khramshin
- Removed default `m1` and `m2` values from interface definitions - Adjusted filter priorities for shapers - Fixed SFQ qdisc and HFSC class creation to fully support `m1`, `d`, and `m2` parameters - Added validation logic similar to VyOS 1.3 to improve error handling and user experience
2024-11-20T6790: QoS: Improve CAKE Policy (#4173)Roman Khramshin
- Fixed handling of flow isolation parameters. - Corrected support for `nat` and `nonat` in flow isolation. - Extended RTT values to cover the full range supported by `tc`. - Make migration script 2-to-3 qos
2024-11-12babel: T6866: IPv6 distribute-lists in access-list6 format have names not ↵Christian Breunig
numbers
2024-11-12babel: T4977: use common include for IPv4/IPv6 route redistributionChristian Breunig
2024-11-07T3501: Allow using more than one tuned profileNataliia Solomko
2024-10-09haproxy: T6745: Rename `reverse-proxy` to `haproxy`sarthurdev
2024-10-07xml: T6430: add re-usable vrf CLI node for firewall and pbrChristian Breunig
2024-10-04Merge pull request #4110 from jestabro/distinct-apiChristian Breunig
http-api: T6736: move REST API to a node distinct from GraphQL API
2024-10-03T6760: firewall: add packet modifications existing in policy route to ↵Nicolas Fort
regular firewall ruleset.
2024-09-30Merge pull request #4024 from nicolas-fort/T6687Daniil Baturin
T6687: add fqdn support to nat rules.
2024-09-29http-api: T6736: add migration script and update versionJohn Estabrook
2024-09-16T6687: add fqdn support to nat rules.Nicolas Fort
2024-09-12Merge pull request #4021 from natali-rs1985/T6652-currentDaniil Baturin
openfabric: T6652: Add support for OpenFabric protocol
2024-09-10T6698: firewall: add matcher for vlan type. (#4027)Nicolás Fort
2024-09-04openfabric: T6652: Add support for OpenFabric protocolNataliia Solomko
OpenFabric is a routing protocol providing link-state routing with efficient flooding for topologies like spine-leaf networks. FRR implements OpenFabric in a daemon called fabricd
2024-08-28T6647: firewall. Introduce patch for accepting ARP and DHCP replies on ↵Nicolas Fort
stateful bridge firewall. This patch is needed because ARP and DHCP are marked as invalid connections. Also, add ehternet-type matcher in bridge firewall.
2024-08-15T6649: Accel-ppp separate vlan-mon from listen interfacesNataliia Solomko
2024-08-12T6648: dhcpv6-server: align stateless DHCPv6 options with statefulLucas Christian
2024-08-05firewall: T4694: fix GRE key include path in XMLChristian Breunig
2024-08-04firewall: T4694: Adding GRE flags & fields matches to firewall rulesAndrew Topp
* Only matching flags and fields used by modern RFC2890 "extended GRE" - this is backwards-compatible, but does not match all possible flags. * There are no nftables helpers for the GRE key field, which is critical to match individual tunnel sessions (more detail in the forum post) * nft expression syntax is not flexible enough for multiple field matches in a single rule and the key offset changes depending on flags. * Thus, clumsy compromise in requiring an explicit match on the "checksum" flag if a key is present, so we know where key will be. In most cases, nobody uses the checksum, but assuming it to be off or automatically adding a "not checksum" match unless told otherwise would be confusing * The automatic "flags key" check when specifying a key doesn't have similar validation, I added it first and it makes sense. I would still like to find a workaround to the "checksum" offset problem. * If we could add 2 rules from 1 config definition, we could match both cases with appropriate offsets, but this would break existing FW generation logic, logging, etc. * Added a "test_gre_match" smoketest
2024-08-02T4072: change same helpers in xml definitions; add notrack action for ↵Nicolas Fort
prerouting chain; re introduce <set vrf> in policy; change global options for passing traffic to IPvX firewall; update smoketest
2024-08-01T6570: firewall: add global-option to configure sysctl parameter for ↵Nicolas Fort
enabling/disabling sending traffic from bridge layer to ipvX layer
2024-08-01T4072: firewall: extend firewall bridge capabilities, in order to include ↵Nicolas Fort
new chains, priorities, and firewall groups