<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: twistlock-defender nfqueue errors in Prisma Cloud Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/twistlock-defender-nfqueue-errors/m-p/556061#M1022</link>
    <description>&lt;P&gt;Hi Humberto,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope you're doing well.&amp;nbsp; Based on the error message, it seems that the options length is too long to be appended to the host egress packet, and it's resulting in errors.&amp;nbsp;&lt;SPAN&gt;This seems to be expected behavior if you enable network monitoring feature, it essentially enable partial feature of CNNF( now CNNS)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Typically,&amp;nbsp;&lt;SPAN&gt;when the iptables receives a header longer than 32 it will drop the connection, essentially killing that from ever reestablishing&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The proper protocol and my recommendation is to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;open a support ticket and be sure to provide the Defender support information&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;What defender version are you running?&lt;/LI&gt;
&lt;LI&gt;What type of defender is it&lt;/LI&gt;
&lt;LI&gt;The full defender log...&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN&gt;If possible, also include with the ticket the iptables rules programed at the host with and without CNNS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 31 Aug 2023 23:16:29 GMT</pubDate>
    <dc:creator>WLejulus</dc:creator>
    <dc:date>2023-08-31T23:16:29Z</dc:date>
    <item>
      <title>twistlock-defender nfqueue errors</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/twistlock-defender-nfqueue-errors/m-p/555594#M1021</link>
      <description>&lt;P&gt;Hi everyone,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i'm receive the follow messages in th twistlock-defender&lt;/P&gt;
&lt;P&gt;&amp;#27;[31m ERRO 2023-08-01T14:46:18.613 tracker_network_nfqueue.go:378 &amp;#27;[0m NFQueue packet processing total errors: 70, errors: [2023-08-01T14:30:00.547 failed to append twistlock options in host egress packet of [172.25.208.1:20074 -&amp;gt; 172.25.2.39:6443]: too many options (len: 32, packet len: 72): 0204ffd70402080a85219e5700000000010303071f0c000012400003ca889eba &amp;lt;nil&amp;gt; 2023-08-01T14:40:00.487 failed to append twistlock options in host egress packet of [172.25.208.1:9524 -&amp;gt; 172.25.2.38:6443]: too many options (len: 32, packet len: 72): 0204ffd70402080a852ac5db00000000010303071f0c000012400000f7f96a83 &amp;lt;nil&amp;gt; 2023-08-01T14:44:30.377 failed to append twistlock options in host egress packet of [172.25.74.187:50212 -&amp;gt; 172.25.2.39:6443]: too many options (len: 32, packet len: 72): 020405a00402080a67932c5100000000010303071f0c0007e000000178de8835 &amp;lt;nil&amp;gt; 2023-08-01T14:44:30.385 failed to append twistlock options in host egress packet of [172.25.74.187:50218 -&amp;gt; 172.25.2.38:6443]: too many options (len: 32, packet len: 72): 020405a00402080a67932c5900000000010303071f0c0007e000000178de8835 &amp;lt;nil&amp;gt; 2023-08-01T14:44:30.639 failed to append twistlock options in host egress packet of [172.25.74.187:50234 -&amp;gt; 172.25.2.39:6443]: too many options (len: 32, packet len: 72): 020405a00402080a67932d5600000000010303071f0c0007e000000178de8835 &amp;lt;nil&amp;gt;]&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any idea?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 00:06:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/twistlock-defender-nfqueue-errors/m-p/555594#M1021</guid>
      <dc:creator>HumbertoNeves</dc:creator>
      <dc:date>2023-08-29T00:06:37Z</dc:date>
    </item>
    <item>
      <title>Re: twistlock-defender nfqueue errors</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/twistlock-defender-nfqueue-errors/m-p/556061#M1022</link>
      <description>&lt;P&gt;Hi Humberto,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope you're doing well.&amp;nbsp; Based on the error message, it seems that the options length is too long to be appended to the host egress packet, and it's resulting in errors.&amp;nbsp;&lt;SPAN&gt;This seems to be expected behavior if you enable network monitoring feature, it essentially enable partial feature of CNNF( now CNNS)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Typically,&amp;nbsp;&lt;SPAN&gt;when the iptables receives a header longer than 32 it will drop the connection, essentially killing that from ever reestablishing&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The proper protocol and my recommendation is to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;open a support ticket and be sure to provide the Defender support information&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;What defender version are you running?&lt;/LI&gt;
&lt;LI&gt;What type of defender is it&lt;/LI&gt;
&lt;LI&gt;The full defender log...&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN&gt;If possible, also include with the ticket the iptables rules programed at the host with and without CNNS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2023 23:16:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/twistlock-defender-nfqueue-errors/m-p/556061#M1022</guid>
      <dc:creator>WLejulus</dc:creator>
      <dc:date>2023-08-31T23:16:29Z</dc:date>
    </item>
  </channel>
</rss>

