On Fri, 2019-01-25 at 17:07 +0000, Patrick O'Callaghan wrote:
On Fri, 2019-01-25 at 15:51 +0000, Patrick O'Callaghan wrote:
Pings in both directions fail, in case that wasn't clear. BTW the Windows guest also fails in the same way.
I'm at a loss.
Just to add that I attempted to set up a fresh Fedora server guest (from a netinst.iso), using the default virt-manager settings. Anaconda couldn't find the network.
I'm 99% sure it has something to do with the firewall. Thing is, I haven't touched the firewall rules. Nevertheless I see this:
$ systemctl status firewalld ● firewalld.service - firewalld - dynamic firewall daemon Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled; vendor preset: enabled) Active: active (running) since Fri 2019-01-25 21:37:32 GMT; 42min ago Docs: man:firewalld(1) Main PID: 2421 (firewalld) Tasks: 3 (limit: 4915) Memory: 28.2M CGroup: /system.slice/firewalld.service └─2421 /usr/bin/python3 /usr/sbin/firewalld --nofork --nopid
Jan 25 21:37:32 bree firewalld[2421]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -w --table filter --delete FORWARD --destination 192.168.122.0/24 --out-in> Jan 25 21:37:32 bree firewalld[2421]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -w --table filter --delete FORWARD --source 192.168.122.0/24 --in-interfac> Jan 25 21:37:32 bree firewalld[2421]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -w --table filter --delete FORWARD --in-interface virbr0 --out-interface v> Jan 25 21:37:32 bree firewalld[2421]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -w --table filter --delete FORWARD --out-interface virbr0 --jump REJECT' f> Jan 25 21:37:32 bree firewalld[2421]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -w --table filter --delete FORWARD --in-interface virbr0 --jump REJECT' fa> Jan 25 21:37:32 bree firewalld[2421]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -w --table filter --delete INPUT --in-interface virbr0 --protocol udp --de> Jan 25 21:37:32 bree firewalld[2421]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -w --table filter --delete INPUT --in-interface virbr0 --protocol tcp --de> Jan 25 21:37:33 bree firewalld[2421]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -w --table filter --delete OUTPUT --out-interface virbr0 --protocol udp --> Jan 25 21:37:33 bree firewalld[2421]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -w --table filter --delete INPUT --in-interface virbr0 --protocol udp --de> Jan 25 21:37:33 bree firewalld[2421]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -w --table filter --delete INPUT --in-interface virbr0 --protocol tcp --de>
I tried reloading firewalld and got the same result. I fired up the firewall applet and suddenly the guests had network access, even though I didn't change anything. I quit the applet and boom, the guests lost network access again. Fired it up once more, but this time the guest access didn't come back.
I don't know if any of this is repeatable. Time to slaughter a chicken by the light of the moon?
poc