Re: [ntp:questions] Regular spike_detect on syslog

2018-09-16 Thread Sean Austin Critica


Hello,


> I assume that yours is a Class A device

I think this particular hardware model is shipped as either A or B. In this 
case it is probably class A.

> Whereas these options do modulate the clock frequency, they do so with
> the knowledge of the operating system. The OS is therefore able to take

Just wondering if there is a reliable test to differentiate if this is a 
hardware/BIOS configuration issue or an NTP configuration issue?
Trying to toggle each BIOS setting on/off and observing would cause a lot of 
downtime.

> that into account in its timekeeping (for example by selecting a
> timekeeping clock source that remains constant notwithstanding Turbo
> Boost and all the rest of it).

Can I directly observe these sources and see which ones are stable (maybe by 
dumping them periodically, remotely from a machine with a known stable clock)? 
The OS in this case is RedHat EL 7.


Regards,
Sean
___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Regular spike_detect on syslog

2018-09-16 Thread Sean Austin Critica

Thanks, Mike & Jan.


I’m running on bare metal HP Gen9 blade. I have started looking at the BIOS 
settings and as far as I can tell there are a lot of options that affect CPU 
frequency and they are turned on.

I will check tomorrow if ‘Spread Spectrum’ is available and is turned on as I 
don’t have access to the machine right now.

I do know that settings like Intel Turbo Boost, and dynamic power control are 
on. Although HP support says that they are not aware of any settings that 
impact NTP on the host.


Regards,
Sean
From: Jan Ceuleers
Sent: Sunday, September 16, 2018 3:30 PM
To: questions@lists.ntp.org
Subject: Re: [ntp:questions] Regular spike_detect on syslog

On 15/09/18 22:55, Mike Cook wrote:
> Maybe your server is frequency shifting . Check your BIOS settings . 
Sean: plug "bios spread spectrum" into your favourite search engine for
more info.
You want to disable that for accurate timekeeping.
___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Regular spike_detect on syslog

2018-09-16 Thread Mike Cook

> Le 16 sept. 2018 à 16:34, Jan Ceuleers  a écrit :
> 
> On 16/09/18 14:15, Sean Austin Critica wrote:
>>  
>> 
>> Can I directly observe these sources and see which ones are stable
>> (maybe by dumping them periodically, remotely from a machine with a
>> known stable clock)? The OS in this case is RedHat EL 7.
>> 
>>  
>> 

you might check out 
https://www.pantz.org/software/cpufreq/usingcpufreqonlinux.html

I don’t have Redhat but I expect similar commands are available for showing 
scaling info.
The webpage mentions a Redhead package cpuspeed.
You should be able to get speed change stats from that. Works for Debian with 
their cpufrequtils commands.

It would be useful to check that you do not have any processes other than ntpd 
running or scheduled by cron, that set the clock.
Also check the clock drift rate without ntpd running. Best to do this after 
cold boot in case previous frequency mods are active.

> 
> "Directly observe": no. But you can look at the kernel log to see which
> clock source the OS has selected:
> 
> # dmesg | grep clocksource
> [0.00] clocksource: refined-jiffies: mask: 0x
> max_cycles: 0x, max_idle_ns: 7645519600211568 ns
> [0.00] clocksource: hpet: mask: 0x max_cycles:
> 0x, max_idle_ns: 79635855245 ns
> [0.053021] clocksource: jiffies: mask: 0x max_cycles:
> 0x, max_idle_ns: 764504178510 ns
> [0.181027] clocksource: Switched to clocksource hpet
> [0.198695] clocksource: acpi_pm: mask: 0xff max_cycles:
> 0xff, max_idle_ns: 2085701024 ns
> [0.906180] clocksource: tsc: mask: 0x max_cycles:
> 0x2879c5f06f2, max_idle_ns: 440795220049 ns
> [1.931401] clocksource: Switched to clocksource tsc
> 
> You can then look in your CPU's manual to determine whether the selected
> clocksource is influenced by SpeedStep (or whatever dynamic CPU speed
> changes are called these days).
> 
> HTH, Jan
> ___
> questions mailing list
> questions@lists.ntp.org
> http://lists.ntp.org/listinfo/questions

People have only as much liberty as they have the intelligence to want and the 
courage to take.

Emma Goldman

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Regular spike_detect on syslog

2018-09-16 Thread Mike Cook

> Le 16 sept. 2018 à 16:34, Jan Ceuleers  a écrit :
> 
> "

People have only as much liberty as they have the intelligence to want and the 
courage to take.

Emma Goldman

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Regular spike_detect on syslog

2018-09-16 Thread Jan Ceuleers
On 16/09/18 14:15, Sean Austin Critica wrote:
>  
>
> Can I directly observe these sources and see which ones are stable
> (maybe by dumping them periodically, remotely from a machine with a
> known stable clock)? The OS in this case is RedHat EL 7.
>
>  
>

"Directly observe": no. But you can look at the kernel log to see which
clock source the OS has selected:

# dmesg | grep clocksource
[    0.00] clocksource: refined-jiffies: mask: 0x
max_cycles: 0x, max_idle_ns: 7645519600211568 ns
[    0.00] clocksource: hpet: mask: 0x max_cycles:
0x, max_idle_ns: 79635855245 ns
[    0.053021] clocksource: jiffies: mask: 0x max_cycles:
0x, max_idle_ns: 764504178510 ns
[    0.181027] clocksource: Switched to clocksource hpet
[    0.198695] clocksource: acpi_pm: mask: 0xff max_cycles:
0xff, max_idle_ns: 2085701024 ns
[    0.906180] clocksource: tsc: mask: 0x max_cycles:
0x2879c5f06f2, max_idle_ns: 440795220049 ns
[    1.931401] clocksource: Switched to clocksource tsc

You can then look in your CPU's manual to determine whether the selected
clocksource is influenced by SpeedStep (or whatever dynamic CPU speed
changes are called these days).

HTH, Jan
___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Regular spike_detect on syslog

2018-09-16 Thread Jan Ceuleers
On 16/09/18 13:24, Sean Austin Critica wrote:
>  
>
> I’m running on bare metal HP Gen9 blade. I have started looking at the
> BIOS settings and as far as I can tell there are a lot of options that
> affect CPU frequency and they are turned on.
>
>  
>
> I will check tomorrow if ‘Spread Spectrum’ is available and is turned
> on as I don’t have access to the machine right now.
>


I assume that yours is a Class A device, where the need to resort to
spread spectrum is less (because the Class A EMC requirements aren't as
strict as the Class B requirements which apply to consumer devices), so
you may not find this option in the BIOS, in which case your problem is
caused by something else.
 
>
> I do know that settings like Intel Turbo Boost, and dynamic power
> control are on. Although HP support says that they are not aware of
> any settings that impact NTP on the host.
>
>  
>

Whereas these options do modulate the clock frequency, they do so with
the knowledge of the operating system. The OS is therefore able to take
that into account in its timekeeping (for example by selecting a
timekeeping clock source that remains constant notwithstanding Turbo
Boost and all the rest of it).
___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Regular spike_detect on syslog

2018-09-16 Thread Jan Ceuleers
On 15/09/18 22:55, Mike Cook wrote:
> Maybe your server is frequency shifting . Check your BIOS settings . 
Sean: plug "bios spread spectrum" into your favourite search engine for
more info.
You want to disable that for accurate timekeeping.
___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Regular spike_detect on syslog

2018-09-15 Thread Mike Cook

> Le 14 sept. 2018 à 10:50, Sean Austin Critica  a 
> écrit :
> 
> Hello,
> 
> 
> I'm new to configuring NTP, and am having a bit of trouble figuring out why
> there are regular spike_detect messages on my syslog.
> 
> I already checked the connection to the NTP server and it is stable with no
> packet drops.
> Additionally, that same NTP server is used by another machine on the same
> network and it is synchronizing fine. So it seems isolated to this
> particular machine.
> 
> 
> I find one particular sequence curious. From 17:30 to 18:53, there was a
> positive spike, followed by a negative spike, followed by a positive spike
> interleaved with clock_sync.
> Can you give me some hints regarding what may be causing this?

>  kernel 0.059 PPM
> Jun  5 14:50:21 info localhost ntpd[13659]:  0.0.0.0 c615 05 clock_sync
> Jun  5 15:03:36 info localhost ntpd[13659]:  0.0.0.0 0618 08 no_sys_peer

I think that it is probably your servers clock. NTP is unable to decide if a 
potential peer is stable enough. 

> Jun  5 15:07:55 info localhost ntpd[13659]:  0.0.0.0 0613 03 spike_detect
> +0.269228 s
> Jun  5 15:16:37 info localhost ntpd[13659]:  0.0.0.0 061c 0c clock_step
> +0.303049 s

  +64 PPM if my sums are OK

> Jun  5 15:16:37 info localhost ntpd[13659]:  0.0.0.0 0614 04 freq_mode
> Jun  5 15:16:38 info localhost ntpd[13659]:  0.0.0.0 c618 08 no_sys_peer
> Jun  5 15:31:55 info localhost ntpd[13659]:  0.0.0.0 c612 02 freq_set
> kernel -186.040 PPM

Now -ve

This is anomalous . Not yet outside NTPs limit of 500ppm but modern hardware is 
usually much better.
Maybe your server is frequency shifting . Check your BIOS settings . 
Are you using VMWARE or something like it. If it is not configured correctly 
virtual systems can get duff clock states. 

< snip rest >

> 
> 
> Regards,
> Sean Critica
> ___
> questions mailing list
> questions@lists.ntp.org
> http://lists.ntp.org/listinfo/questions

People have only as much liberty as they have the intelligence to want and the 
courage to take.

Emma Goldman

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


[ntp:questions] Regular spike_detect on syslog

2018-09-15 Thread Sean Austin Critica
Hello,


I'm new to configuring NTP, and am having a bit of trouble figuring out why
there are regular spike_detect messages on my syslog.

I already checked the connection to the NTP server and it is stable with no
packet drops.
Additionally, that same NTP server is used by another machine on the same
network and it is synchronizing fine. So it seems isolated to this
particular machine.


I find one particular sequence curious. From 17:30 to 18:53, there was a
positive spike, followed by a negative spike, followed by a positive spike
interleaved with clock_sync.
Can you give me some hints regarding what may be causing this?


Jun  5 14:48:32 info localhost ntpd[13659]:  Listen normally on 48 bond0
10.119.218.249 UDP 123
Jun  5 14:48:32 info localhost ntpd[13659]:  Listen normally on 49 lo ::1
UDP 123
Jun  5 14:48:32 info localhost ntpd[13659]:  Listen normally on 50 bond0
fe80::217:a4ff:fe77:c38 UDP 123
Jun  5 14:48:32 info localhost ntpd[13659]:  Listening on routing socket on
fd #68 for interface updates
Jun  5 14:48:32 info localhost ntpd[13659]:  0.0.0.0 c016 06 restart
Jun  5 14:48:32 info localhost ntpd[13659]:  0.0.0.0 c012 02 freq_set
kernel 0.059 PPM
Jun  5 14:50:21 info localhost ntpd[13659]:  0.0.0.0 c615 05 clock_sync
Jun  5 15:03:36 info localhost ntpd[13659]:  0.0.0.0 0618 08 no_sys_peer
Jun  5 15:07:55 info localhost ntpd[13659]:  0.0.0.0 0613 03 spike_detect
+0.269228 s
Jun  5 15:16:37 info localhost ntpd[13659]:  0.0.0.0 061c 0c clock_step
+0.303049 s
Jun  5 15:16:37 info localhost ntpd[13659]:  0.0.0.0 0614 04 freq_mode
Jun  5 15:16:38 info localhost ntpd[13659]:  0.0.0.0 c618 08 no_sys_peer
Jun  5 15:31:55 info localhost ntpd[13659]:  0.0.0.0 c612 02 freq_set
kernel -186.040 PPM
Jun  5 15:31:55 info localhost ntpd[13659]:  0.0.0.0 c615 05 clock_sync
Jun  5 15:42:11 info localhost ntpd[13659]:  0.0.0.0 0613 03 spike_detect
+0.147942 s
Jun  5 15:56:51 info localhost ntpd[13659]:  0.0.0.0 0618 08 no_sys_peer
Jun  5 16:02:50 info localhost ntpd[13659]:  0.0.0.0 061c 0c clock_step
+0.338653 s
Jun  5 16:02:50 info localhost ntpd[13659]:  0.0.0.0 0615 05 clock_sync
Jun  5 16:02:51 info localhost ntpd[13659]:  0.0.0.0 c618 08 no_sys_peer
Jun  5 16:06:14 info localhost ntpd[13659]:  0.0.0.0 0628 08 no_sys_peer
Jun  5 17:30:59 info localhost ntpd[13659]:  0.0.0.0 0613 03 spike_detect
+0.130410 s
Jun  5 17:33:09 info localhost ntpd[13659]:  0.0.0.0 0615 05 clock_sync
Jun  5 17:47:21 info localhost ntpd[13659]:  0.0.0.0 0613 03 spike_detect
-0.136758 s
Jun  5 18:01:30 info localhost ntpd[13659]:  0.0.0.0 0615 05 clock_sync
Jun  5 18:53:59 info localhost ntpd[13659]:  0.0.0.0 0613 03 spike_detect
+0.165088 s
Jun  5 19:01:40 info localhost ntpd[13659]:  0.0.0.0 0618 08 no_sys_peer
Jun  5 19:03:51 info localhost ntpd[13659]:  0.0.0.0 061c 0c clock_step
+0.306834 s
Jun  5 19:03:51 info localhost ntpd[13659]:  0.0.0.0 0615 05 clock_sync
Jun  5 19:03:52 info localhost ntpd[13659]:  0.0.0.0 c618 08 no_sys_peer
Jun  5 19:31:08 info localhost ntpd[13659]:  0.0.0.0 0628 08 no_sys_peer
Jun  5 19:58:28 info localhost ntpd[13659]:  0.0.0.0 0613 03 spike_detect
+0.130703 s
Jun  5 20:05:00 info localhost ntpd[13659]:  0.0.0.0 061c 0c clock_step
+0.281475 s
Jun  5 20:05:00 info localhost ntpd[13659]:  0.0.0.0 0615 05 clock_sync
Jun  5 20:05:01 info localhost ntpd[13659]:  0.0.0.0 c618 08 no_sys_peer
Jun  5 20:34:30 info localhost ntpd[13659]:  0.0.0.0 0613 03 spike_detect
-0.167769 s
Jun  5 20:36:40 info localhost ntpd[13659]:  0.0.0.0 0618 08 no_sys_peer
Jun  5 20:40:00 info localhost ntpd[13659]:  0.0.0.0 0615 05 clock_sync
Jun  5 20:53:04 info localhost ntpd[13659]:  0.0.0.0 0613 03 spike_detect
+0.184006 s
Jun  5 21:05:06 info localhost ntpd[13659]:  0.0.0.0 061c 0c clock_step
+0.415902 s
Jun  5 21:05:06 info localhost ntpd[13659]:  0.0.0.0 0615 05 clock_sync
Jun  5 21:05:07 info localhost ntpd[13659]:  0.0.0.0 c618 08 no_sys_peer
Jun  5 21:08:28 info localhost ntpd[13659]:  0.0.0.0 0628 08 no_sys_peer
Jun  5 21:32:26 info localhost ntpd[13659]:  0.0.0.0 0638 08 no_sys_peer
Jun  5 22:38:01 info localhost ntpd[13659]:  0.0.0.0 0613 03 spike_detect
+0.132145 s


Regards,
Sean Critica
___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions