thanks for the reply Ben,

Some vms are facing packet loss ~40% ,i am trying to understand why its
happening,(*lost: *field is 0)

As mentioned in the early mail,*used* counter for both drop action and vlan
action is increasing:

*in_port(2),*eth(src=00:26:0a:24:b0:00,dst=fe:34:37:a3:fd:9d),eth_type(0x8100),vlan(vid=32,pcp=0),encap(eth_type(0x0800),ipv4(src=109.x.x.111,dst=15.x.x.105,proto=6,tos=0,ttl=56,frag=no),tcp(src=46811,dst=80)),
packets:1, bytes:74, u*sed:0.361s*, *actions:*drop


*in_port(1),*eth(src=00:26:0a:24:b0:00,dst=fe:34:37:a3:fd:9d),eth_type(0x8100),vlan(vid=32,pcp=0),encap(eth_type(0x0800),ipv4(src=109.x.x.111,dst=15.x.x.105,proto=6,tos=0,ttl=56,frag=no),tcp(src=46811,dst=80)),
packets:1, bytes:74, *used:0.359s,* *actions:*
pop_vlan,9,5,6,22,11,push_vlan(vid=32,pcp=0),0,pop_vlan,10

These source and destination vms are not on the host where dump-flow has
been taken.Can you please suggest some way to fix it.

Regards,
Ananthan









On Mon, Oct 21, 2013 at 10:28 PM, Ben Pfaff <[email protected]> wrote:

> On Mon, Oct 21, 2013 at 10:25:50PM +0530, ananthan wrote:
> > For some guest there is packet loss,can this be because of this drop
> action
> > in eth0, its "*used"* value is also getting updated.
> >
> >
> in_port(2),eth(src=00:26:0a:24:b0:00,dst=ff:ff:ff:ff:ff:ff),eth_type(0x8100),vlan(vid=32,pcp=0),encap(eth_type(0x0806),arp(sip=15.x.x.130,tip=15.x.x.210,op=1,sha=00:26:0a:24:b0:00,tha=00:00:00:00:00:00)),
> > packets:1, bytes:60, used:0.564s, actions:drop
> >
> > in_port(2),eth(src=5c:26:0a:dc:31:00,dst=01:80:c2:00:00:00), packets:31,
> > bytes:1860, used:1.454s, actions:drop
> >
> > Is there any way to prevent genuine packets from being dropped.
>
> If you use active-backup, you have to ensure that "genuine" packets only
> come in on the active interface.  Generally MAC learning on the next-hop
> switch is sufficient.  You seem to have found some other case.
>
_______________________________________________
discuss mailing list
[email protected]
http://openvswitch.org/mailman/listinfo/discuss

Reply via email to