Hi Raja,
Please find below further explanation of our problem.
Legend:
cn-a-0-28 - source compute node, underlay ip:
10.187.1.28
cn-a-0-27 - destination compute node, underlay ip:
10.187.1.27
SourceVM - located on cn-a-0-28, ip: 10.189.85.25/24, mac:
02:a8:f3:9c:c1:01, tap: tapa8f39cc1-01
DestinationVM - located on cn-a-0-27, ip: 10.189.85.19/24, mac:
02:59:4f:9c:af:9e, tap: tap594f9caf-9e
ProblematicVM - located on cn-a-0-27, ip: 10.189.85.22/24, mac:
02:0c:f1:96:75:22, tap: tap0cf19675-22
Test traffic HTTP:
[root@SourceVM~]# time curl -s -o /dev/null 'http://10.189.85.19/'
real 0m1.010s
user 0m0.003s
sys 0m0.003s
Respone after 0m1.010s
#Traffic dump:
#ProblematicVM - get first SYN
root@cn-a-0-27:~# tcpdump -eni tap0cf19675-22 port 80
tcpdump: WARNING: tap0cf19675-22: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tap0cf19675-22, link-type EN10MB (Ethernet), capture size
65535 bytes
18:57:19.364293 02:a8:f3:9c:c1:01 > 02:59:4f:9c:af:9e, ethertype IPv4
(0x0800), length 74: 10.189.85.25.58260 > 10.189.85.19.80: Flags [S],
seq 3662446385, win 14600, options [mss 1460,sackOK,TS val 269329475 ecr
0,nop,wscale 7], length 0
#DestinationVM - after second SYN established connection
root@cn-a-0-27:~# tcpdump -eni tap594f9caf-9e port 80 [
tcpdump: WARNING: tap594f9caf-9e: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tap594f9caf-9e, link-type EN10MB (Ethernet), capture size
65535 bytes
18:57:20.363719 02:a8:f3:9c:c1:01 > 02:59:4f:9c:af:9e, ethertype IPv4
(0x0800), length 74: 10.189.85.25.58260 > 10.189.85.19.80: Flags [S],
seq 3662446385, win 14600,
options [mss 1460,sackOK,TS val 269330476 ecr 0,nop,wscale 7], length 0
18:57:20.363944 02:59:4f:9c:af:9e > 02:a8:f3:9c:c1:01, ethertype IPv4
(0x0800), length 74: 10.189.85.19.80 > 10.189.85.25.58260: Flags [S.],
seq 1036913679, ack 366244
6386, win 14480, options [mss 1460,sackOK,TS val 190985773 ecr
269330476,nop,wscale 7], length 0
18:57:20.364312 02:a8:f3:9c:c1:01 > 02:59:4f:9c:af:9e, ethertype IPv4
(0x0800), length 66: 10.189.85.25.58260 > 10.189.85.19.80: Flags [.],
ack 1, win 115, options [no
p,nop,TS val 269330476 ecr 190985773], length 0
18:57:20.364325 02:a8:f3:9c:c1:01 > 02:59:4f:9c:af:9e, ethertype IPv4
(0x0800), length 142: 10.189.85.25.58260 > 10.189.85.19.80: Flags [P.],
seq 1:77, ack 1, win 115,
options [nop,nop,TS val 269330476 ecr 190985773], length 76
18:57:20.364446 02:59:4f:9c:af:9e > 02:a8:f3:9c:c1:01, ethertype IPv4
(0x0800), length 66: 10.189.85.19.80 > 10.189.85.25.58260: Flags [.],
ack 77, win 114, options [n
op,nop,TS val 190985774 ecr 269330476], length 0
18:57:20.364778 02:59:4f:9c:af:9e > 02:a8:f3:9c:c1:01, ethertype IPv4
(0x0800), length 2962: 10.189.85.19.80 > 10.189.85.25.58260: Flags [.],
seq 1:2897, ack 77, win 1
14, options [nop,nop,TS val 190985774 ecr 269330476], length 2896
18:57:20.364850 02:59:4f:9c:af:9e > 02:a8:f3:9c:c1:01, ethertype IPv4
(0x0800), length 1108: 10.189.85.19.80 > 10.189.85.25.58260: Flags [P.],
seq 2897:3939, ack 77, w
in 114, options [nop,nop,TS val 190985774 ecr 269330476], length 1042
18:57:20.365135 02:a8:f3:9c:c1:01 > 02:59:4f:9c:af:9e, ethertype IPv4
(0x0800), length 66: 10.189.85.25.58260 > 10.189.85.19.80: Flags [.],
ack 2897, win 160, options
...
#Test traffic ICMP
[root@SourceVM ~]# ping 10.189.85.19 -c 2 -W 1
PING 10.189.85.19 (10.189.85.19) 56(84) bytes of data.
64 bytes from 10.189.85.19: icmp_seq=2 ttl=64 time=0.676 ms
--- 10.189.85.19 ping statistics ---
2 packets transmitted, 1 received, 50% packet loss, time 999ms
rtt min/avg/max/mdev = 0.676/0.676/0.676/0.000 ms
#ProblematicVM
root@cn-a-0-27:~# tcpdump -eni tap0cf19675-22 icmp
tcpdump: WARNING: tap0cf19675-22: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tap0cf19675-22, link-type EN10MB (Ethernet), capture size
65535 bytes
20:15:48.819471 02:a8:f3:9c:c1:01 > 02:59:4f:9c:af:9e, ethertype IPv4
(0x0800), length 98: 10.189.85.25 > 10.189.85.19: ICMP echo request, id
9075, seq 1, length 64
#DestinationVM
root@cn-a-0-27:~# tcpdump -eni tap594f9caf-9e icmp
tcpdump: WARNING: tap594f9caf-9e: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tap594f9caf-9e, link-type EN10MB (Ethernet), capture size
65535 bytes
20:15:49.816581 02:a8:f3:9c:c1:01 > 02:59:4f:9c:af:9e, ethertype IPv4
(0x0800), length 98: 10.189.85.25 > 10.189.85.19: ICMP echo request, id
9075, seq 2, length 64
20:15:49.816890 02:59:4f:9c:af:9e > 02:a8:f3:9c:c1:01, ethertype IPv4
(0x0800), length 98: 10.189.85.19 > 10.189.85.25: ICMP echo reply, id
9075, seq 2, length 64
Our debug steps:
## Check path from source compute node
## Get source vif, rt and nh for DestinationVM
root@cn-a-0-28:/# vif --get 3
Vrouter Interface Table
Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
L2=Layer 2
D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
Offload, Mon=Interface is Monitored
Uuf=Unknown Unicast Flood
vif0/3 OS: tapa8f39cc1-01
Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:0
Vrf:1 Flags:PL3L2 MTU:9160 Ref:6
RX packets:4005754 bytes:3214446570 errors:0
TX packets:4912399 bytes:517166392 errors:0
root@cn-a-0-28:/# rt --dump 1 | egrep "10.189.85.19/32|Dest"
Destination PPL Flags Label Nexthop Stitched
MAC(Index)
10.189.85.19/32 32 LP 22 35
2:59:4f:9c:af:9e(100440)
root@cn-a-0-28:/# nh --get 35
Id:35 Type:Tunnel Fmly: AF_INET Flags:Valid, MPLSoUDP,
Rid:0 Ref_cnt:75 Vrf:0
Oif:0 Len:14 Flags Valid, MPLSoUDP, Data:ec f4 bb d9 20
e0 ec f4 bb d9 5e c4 08 00
Vrf:0 Sip:10.187.1.28 Dip:10.187.1.27
root@cn-a-0-28:/# vif --get 0
Vrouter Interface Table
Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
L2=Layer 2
D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
Offload, Mon=Interface is Monitored
Uuf=Unknown Unicast Flood
vif0/0 OS: bond1 (Speed 10000, Duplex 1)
Type:Physical HWaddr:ec:f4:bb:d9:5e:c4 IPaddr:0
Vrf:0 Flags:TcL3L2Vp MTU:1514 Ref:8
RX packets:5633720 bytes:1088261052 errors:0
TX packets:4608455 bytes:3497980076 errors:0
#get info about DestinationVM on destination compute node
#get vif, rt and nh
root@cn-a-0-27:~# vif --get 4
Vrouter Interface Table
Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
L2=Layer 2
D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
Offload, Mon=Interface is Monitored
Uuf=Unknown Unicast Flood
vif0/4 OS: tap594f9caf-9e
Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:0
Vrf:2 Flags:PL3L2D MTU:9160 Ref:6
RX packets:167708 bytes:142198914 errors:0
TX packets:210585 bytes:16691702 errors:0
root@cn-a-0-27:~# rt --dump 2 | egrep "10.189.85.19\/32|Dest"
Destination PPL Flags Label Nexthop Stitched
MAC(Index)
10.189.85.19/32 32 P - 35
2:59:4f:9c:af:9e(131480)
root@cn-a-0-27:~# nh --get 35
Id:35 Type:Encap Fmly: AF_INET Flags:Valid, Policy,
Rid:0 Ref_cnt:6 Vrf:2
EncapFmly:0806 Oif:4 Len:14 Data:02 59 4f 9c af 9e 00 00
5e 00 01 00 08 00
#get ProblematicVM vif, rt, nh on destination compute node
root@cn-a-0-27:~# vif --list | grep tap0cf19675-22
vif0/17 OS: tap0cf19675-22
root@cn-a-0-27:~# vif --get 17
Vrouter Interface Table
Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
L2=Layer 2
D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
Offload, Mon=Interface is Monitored
Uuf=Unknown Unicast Flood
vif0/17 OS: tap0cf19675-22
Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:0
Vrf:2 Flags:PL3L2D MTU:9160 Ref:6
RX packets:5110 bytes:374284 errors:0
TX packets:40265 bytes:2987278 errors:0
root@cn-a-0-27:~# rt --dump 2 | egrep "10.189.85.22\/32|Dest"
Destination PPL Flags Label Nexthop Stitched
MAC(Index)
10.189.85.22/32 32 P - 112
2:c:f1:96:75:22(197908)
root@cn-a-0-27:~# nh --get 112
Id:112 Type:Encap Fmly: AF_INET Flags:Valid, Policy,
Rid:0 Ref_cnt:6 Vrf:2
EncapFmly:0806 Oif:17 Len:14 Data:02 0c f1 96 75 22 00 00
5e 00 01 00 08 00
Further observations
We can't get vif --kernel for tested VM
root@cn-a-0-28:/# vif --get 3 --kernel
Vrouter Interface Table
Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
L2=Layer 2
D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
Offload, Mon=Interface is Monitored
Uuf=Unknown Unicast Flood
No such file or directory
root@cn-a-0-27:~# vif --get 17 --kernel
Vrouter Interface Table
Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
L2=Layer 2
D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
Offload, Mon=Interface is Monitored
Uuf=Unknown Unicast Flood
No such file or directory
root@cn-a-0-27:~# vif --get 4 --kernel
Vrouter Interface Table
Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
L2=Layer 2
D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
Offload, Mon=Interface is Monitored
Uuf=Unknown Unicast Flood
No such file or directory
For some we can get this info but is it correct?
root@cn-a-0-27:~# vif --get 34
Vrouter Interface Table
Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
L2=Layer 2
D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
Offload, Mon=Interface is Monitored
Uuf=Unknown Unicast Flood
vif0/34 OS: tap6d1f56cf-c0
Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:0
Vrf:1 Flags:PL3L2D MTU:9160 Ref:6
RX packets:37583 bytes:23041676 errors:0
TX packets:30149 bytes:2358733 errors:0
root@cn-a-0-27:~# vif --get 34 --kernel
Vrouter Interface Table
Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
L2=Layer 2
D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
Offload, Mon=Interface is Monitored
Uuf=Unknown Unicast Flood
vif0/4 OS: tap594f9caf-9e
Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:0
Vrf:2 Flags:PL3L2D MTU:9160 Ref:6
RX packets:167713 bytes:142199268 errors:0
TX packets:210587 bytes:16691786 errors:0
Value should be 49 (os_ifindex), am I right?
root@cn-a-0-27:~# ip link show | grep tap6d1f56cf-c0
49: tap6d1f56cf-c0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc
pfifo_fast state UP mode DEFAULT group default qlen 500
root@cn-a-0-27:~# ip link show | grep tap594f9caf-9e
34: tap594f9caf-9e: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc
pfifo_fast state UP mode DEFAULT group default qlen 500
On http://10.187.0.27:8085/Snh_ItfReq?x=tap594f9caf-9e, os_ifindex looks
fine
Kind Regards
Jacek Czerniak
W dniu 14.10.2015 o 07:30, [email protected] pisze:
Send Users mailing list submissions to
[email protected]
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.opencontrail.org/mailman/listinfo/users_lists.opencontrail.org
or, via email, send a message with subject or body 'help' to
[email protected]
You can reach the person managing the list at
[email protected]
When replying, please edit your Subject line so it is more specific
than "Re: Contents of Users digest..."
Today's Topics:
1. Re: Drops of the first SYN packet (Rajagopalan Sivaramakrishnan)
----------------------------------------------------------------------
Message: 1
Date: Wed, 14 Oct 2015 05:30:39 +0000
From: Rajagopalan Sivaramakrishnan <[email protected]>
To: Piotr P <[email protected]>
Cc: "<[email protected]>" <[email protected]>
Subject: Re: [Users] Drops of the first SYN packet
Message-ID: <d2433529.5b7f3%[email protected]>
Content-Type: text/plain; charset="windows-1252"
Hi Piotr,
I didn't fully understand your description below, so I?ll describe the expected
behavior. The first packet of the flow should be sent to the vrouter agent over the
pkt0 interface. Subsequently, the agent should create a flow with the flow action
set to forward (which should be visible in ?flow ?l?). For the packet that gets
dropped, do you see it in ?tcpdump ?ni pkt0 ?x? (you might get some messages from
tcpdump indicating bad header length, but you can ignore those) and ?flow ?l".
Can you please check this on the compute node where you see the SYN being dropped?
Are you seeing issues with ping too or is it only with TCP SYN?
Raja
From: Piotr P <[email protected]<mailto:[email protected]>>
Date: Tuesday, October 13, 2015 at 7:53 AM
To: Rajagopalan Sivaramakrishnan <[email protected]<mailto:[email protected]>>
Cc: "<[email protected]<mailto:[email protected]>>"
<[email protected]<mailto:[email protected]>>
Subject: Re: [Users] Drops of the first SYN packet
Hi Raja,
For our tests we took today two new kvm compute nodes with vrouter and without
any Virtual Machines.
What we noticed is that if we spawn up to 4 VM within the same project and
Virtual Network on each compute node everything works all right.
If we add 5th VM on test compute node problem appears , and we can reproduce
this on different physical kvm compute nodes.
On this 5th Virtual machines we are starting seeing first SYN packet for other
VMs located on specific compute node (vrouter) .
All other packets from the transmission is normally delivered to target virtual
machines.
This is visible for all consecutive tcp flows between VM's, and only for first
packet from a new flow.
This 5th VM receives traffic for itself normally. So we end up in situation
where we have affected 4 VM's and one working without problem.
Problem could be resolved if we shutdown virtual port of this 5th VM or delete
it. After this step traffic for other vm is delivered normally.
If we create again new VM problem starts to be visible again.
We cannot see any new flows between client and 5th VM that receives additional
SYN packets that this VM shouldn't see.
All other flows are created successfully.
In the dropstat output we cannot see any changes especially related to the drop
counter.
Following lines you can find example of how we see trafic on this vm where all
first packets are sending
192.168.50.22 - client located on first compute node
192.168.50.27 - 192.168.50.38 - other vm with nginx, located on second compute
node
192.168.50.33 - VM where all first SYN packets are visible
[root@c-cn-28-10 centos]# ip -4 a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN
inet 127.0.0.1/8<http://127.0.0.1/8> scope host lo
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
qlen 1000
inet 192.168.50.33/20<http://192.168.50.33/20> brd 10.189.63.255 scope
global eth0
valid_lft forever preferred_lft forever
[root@c-cn-28-10 centos]# tcpdump "tcp[tcpflags] & (tcp-syn|tcp-ack) != 0" and
port 80
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
14:20:22.626172 IP 192.168.50.22.51823 > 192.168.50.27.http: Flags [S], seq
2741907250, win 14600, options [mss 1460,sackOK,TS val 5010347 ecr 0,nop,wscale
7], length 0
14:20:23.631110 IP 192.168.50.22.60984 > 192.168.50.28.http: Flags [S], seq
3116446858, win 14600, options [mss 1460,sackOK,TS val 5011352 ecr 0,nop,wscale
7], length 0
14:20:24.637322 IP 192.168.50.22.46585 > 192.168.50.29.http: Flags [S], seq
3566871094, win 14600, options [mss 1460,sackOK,TS val 5012359 ecr 0,nop,wscale
7], length 0
14:20:25.643556 IP 192.168.50.22.41182 > 192.168.50.30.http: Flags [S], seq
1739097792, win 14600, options [mss 1460,sackOK,TS val 5013365 ecr 0,nop,wscale
7], length 0
14:20:26.651601 IP 192.168.50.22.36921 > 192.168.50.31.http: Flags [S], seq
3990314127, win 14600, options [mss 1460,sackOK,TS val 5014373 ecr 0,nop,wscale
7], length 0
14:20:27.659212 IP 192.168.50.22.40056 > 192.168.50.32.http: Flags [S], seq
1091797067, win 14600, options [mss 1460,sackOK,TS val 5015380 ecr 0,nop,wscale
7], length 0
14:20:28.665625 IP 192.168.50.22.52838 > 192.168.50.33.http: Flags [S], seq
1936544852, win 14600, options [mss 1460,sackOK,TS val 5016387 ecr 0,nop,wscale
7], length 0
14:20:28.665653 IP 192.168.50.33.http > 192.168.50.22.52838: Flags [S.], seq
2591101890, ack 1936544853, win 14480, options [mss 1460,sackOK,TS val 4294865173
ecr 5016387,nop,wscale 7], length 0
14:20:28.666021 IP 192.168.50.22.52838 > 192.168.50.33.http: Flags [.], ack 1,
win 115, options [nop,nop,TS val 5016388 ecr 4294865173], length 0
14:20:28.666046 IP 192.168.50.22.52838 > 192.168.50.33.http: Flags [P.], seq
1:78, ack 1, win 115, options [nop,nop,TS val 5016388 ecr 4294865173], length 77
14:20:28.666050 IP 192.168.50.33.http > 192.168.50.22.52838: Flags [.], ack 78,
win 114, options [nop,nop,TS val 4294865173 ecr 5016388], length 0
14:20:28.666447 IP 192.168.50.33.http > 192.168.50.22.52838: Flags [P.], seq
1:239, ack 78, win 114, options [nop,nop,TS val 4294865174 ecr 5016388], length 238
14:20:28.666947 IP 192.168.50.22.52838 > 192.168.50.33.http: Flags [.], ack
239, win 123, options [nop,nop,TS val 5016389 ecr 4294865174], length 0
14:20:28.666958 IP 192.168.50.22.52838 > 192.168.50.33.http: Flags [F.], seq
78, ack 239, win 123, options [nop,nop,TS val 5016389 ecr 4294865174], length 0
14:20:28.667002 IP 192.168.50.33.http > 192.168.50.22.52838: Flags [F.], seq
239, ack 79, win 114, options [nop,nop,TS val 4294865174 ecr 5016389], length 0
14:20:28.667340 IP 192.168.50.22.52838 > 192.168.50.33.http: Flags [.], ack
240, win 123, options [nop,nop,TS val 5016390 ecr 4294865174], length 0
14:20:28.671229 IP 192.168.50.22.46357 > 192.168.50.34.http: Flags [S], seq
2912677901, win 14600, options [mss 1460,sackOK,TS val 5016393 ecr 0,nop,wscale
7], length 0
14:20:29.679416 IP 192.168.50.22.53239 > 192.168.50.35.http: Flags [S], seq
1015724729, win 14600, options [mss 1460,sackOK,TS val 5017401 ecr 0,nop,wscale
7], length 0
14:20:30.687231 IP 192.168.50.22.40427 > 192.168.50.36.http: Flags [S], seq
3789917763, win 14600, options [mss 1460,sackOK,TS val 5018408 ecr 0,nop,wscale
7], length 0
14:20:31.693362 IP 192.168.50.22.47202 > 192.168.50.37.http: Flags [S], seq
2700187443, win 14600, options [mss 1460,sackOK,TS val 5019415 ecr 0,nop,wscale
7], length 0
14:20:32.699384 IP 192.168.50.22.37820 > 192.168.50.38.http: Flags [S], seq
2458579739, win 14600, options [mss 1460,sackOK,TS val 5020421 ecr 0,nop,wscale
7], length 0
Additioanl test with ping
[root@client]# ping 192.168.50.35 -c 2
PING 192.168.50.35 (192.168.50.35) 56(84) bytes of data.
64 bytes from 192.168.50.35<http://192.168.50.35>: icmp_seq=2 ttl=64 time=0.498
ms
--- 192.168.50.35 ping statistics ---
2 packets transmitted, 1 received, 50% packet loss, time 999ms
rtt min/avg/max/mdev = 0.498/0.498/0.498/0.000 ms
(on "the 5th vm" with interface address 192.168.50.33) tcpdump -i any icmp -n
14:39:11.741773 IP 192.168.50.22 > 192.168.50.35<http://192.168.50.35>: ICMP
echo request, id 3626, seq 1, length 64
14:39:12.685724 IP 192.168.50.22 > 192.168.50.35<http://192.168.50.35>: ICMP
echo request, id 3627, seq 1, length 64
14:39:13.549434 IP 192.168.50.22 > 192.168.50.35<http://192.168.50.35>: ICMP
echo request, id 3628, seq 1, length 64
14:39:14.397740 IP 192.168.50.22 > 192.168.50.35<http://192.168.50.35>: ICMP
echo request, id 3629, seq 1, length 64
14:39:15.237451 IP 192.168.50.22 > 192.168.50.35<http://192.168.50.35>: ICMP
echo request, id 3630, seq 1, length 6
We are not seeing this icmp packets on the flow list
[destination compute node "flow -l"
28268 192.168.50.33:123<http://192.168.50.33:123>
95.158.95.123:123<http://95.158.95.123:123> 17 (1)
74012 95.158.95.123:123<http://95.158.95.123:123>
192.168.50.33:123<http://192.168.50.33:123> 17 (1)
238232<=>392568 192.168.50.33:22<http://192.168.50.33:22>
10.163.14.57:47034<http://10.163.14.57:47034> 6 (1)
392568<=>238232 10.163.14.57:47034<http://10.163.14.57:47034>
192.168.50.33:22<http://192.168.50.33:22> 6 (1)
Please let us know how to troubleshoot it in more details. What we can check
next.
Kind Regards
Piotr Pieprzycki
On 12 October 2015 at 19:17, Rajagopalan Sivaramakrishnan
<[email protected]<mailto:[email protected]>> wrote:
Hi Piotr,
There isn?t a known issue in this respect. Can you please run ?dropstats?
on the destination compute node to see if any error counters are going up
inside vrouter?
Also, can you please run ?flow ?l? on the destination compute node to see if
the flow action for the relevant flow is set to F (forward).
Raja
From: Users
<[email protected]<mailto:[email protected]>> on
behalf of Piotr P <[email protected]<mailto:[email protected]>>
Date: Monday, October 12, 2015 at 7:39 AM
To: "<[email protected]<mailto:[email protected]>>"
<[email protected]<mailto:[email protected]>>
Subject: [Users] Drops of the first SYN packet
Hi All,
We are experiencing problem with missing packets between Virtual Machines
located within the same Virtual Network.
Our setup Contrail 2.20 (buld 64), Priority of encapsulation: VxLAN, MPLSoUDP,
MPLSoGRE
The effect is visible during each new transmission/flow. There is missing first
syn packet or first icmp ping.
This affect each tcp session, it's delayed for syn retransmission time.
Drops occurs for each subsequent new tcp session between VM's. We can repeat
tcp connection between VM and first syn will be missing all the time.
It's not visible in all Virtual Networks. There are some other Virtual Networks
that works correctly.
We can reproduce this behaviour with creating new networks with even only 2
virtual machines.
Those networks differs only by other routing-target value.
This effect
does not appear when we have transmission outside VN (eg through physical
gateway)
it's only correlated when traffic stays within network.
Tcpdump on compute nodes shows that:
- All packets are visible on incoming tap interface (from source VM)
- all packets are visible on bond interfaces on both compute nodes (vrouter)
with VMs (bond active-passive toward physical switch )
Computer nodes are located on the same physical switch (no visible errors on
switch ports)
- first packet/syn from transmission is missing on a tap interface toward
destination VM
Please let know if this is some known behaviour. What could be the steps to
troubleshoot this issue?
Kind Regards
Piotr Pieprzycki
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.opencontrail.org/pipermail/users_lists.opencontrail.org/attachments/20151014/70a5f042/attachment.html>
------------------------------
Subject: Digest Footer
_______________________________________________
Users mailing list
[email protected]
http://lists.opencontrail.org/mailman/listinfo/users_lists.opencontrail.org
------------------------------
End of Users Digest, Vol 26, Issue 11
*************************************
_______________________________________________
Users mailing list
[email protected]
http://lists.opencontrail.org/mailman/listinfo/users_lists.opencontrail.org