Hi Jacek,
On cn-a-0-27, can you please run ³mpls ‹dump² to get the next hop
corresponding to label 22?
And check whether this is the nh_id that vr_gro_input() and
pkt_gro_dev_rx_handler() see?
Raja
On 10/18/15, 11:45 AM, "Users on behalf of Jacek Czerniak"
<[email protected] on behalf of [email protected]>
wrote:
>Hi Raja,
>
>Please find below further explanation of our problem.
>
>
>Legend:
>cn-a-0-28 - source compute node, underlay ip:
>10.187.1.28
>cn-a-0-27 - destination compute node, underlay ip:
>10.187.1.27
>
>SourceVM - located on cn-a-0-28, ip: 10.189.85.25/24, mac:
>02:a8:f3:9c:c1:01, tap: tapa8f39cc1-01
>DestinationVM - located on cn-a-0-27, ip: 10.189.85.19/24, mac:
>02:59:4f:9c:af:9e, tap: tap594f9caf-9e
>ProblematicVM - located on cn-a-0-27, ip: 10.189.85.22/24, mac:
>02:0c:f1:96:75:22, tap: tap0cf19675-22
>
>
>Test traffic HTTP:
>
>[root@SourceVM~]# time curl -s -o /dev/null 'http://10.189.85.19/'
>
>real 0m1.010s
>user 0m0.003s
>sys 0m0.003s
>
>Respone after 0m1.010s
>
>
>#Traffic dump:
>#ProblematicVM - get first SYN
>
>root@cn-a-0-27:~# tcpdump -eni tap0cf19675-22 port 80
>tcpdump: WARNING: tap0cf19675-22: no IPv4 address assigned
>tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
>listening on tap0cf19675-22, link-type EN10MB (Ethernet), capture size
>65535 bytes
>
>18:57:19.364293 02:a8:f3:9c:c1:01 > 02:59:4f:9c:af:9e, ethertype IPv4
>(0x0800), length 74: 10.189.85.25.58260 > 10.189.85.19.80: Flags [S],
>seq 3662446385, win 14600, options [mss 1460,sackOK,TS val 269329475 ecr
>0,nop,wscale 7], length 0
>
>#DestinationVM - after second SYN established connection
>
>root@cn-a-0-27:~# tcpdump -eni tap594f9caf-9e port 80 [
>tcpdump: WARNING: tap594f9caf-9e: no IPv4 address assigned
>tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
>listening on tap594f9caf-9e, link-type EN10MB (Ethernet), capture size
>65535 bytes
>
>18:57:20.363719 02:a8:f3:9c:c1:01 > 02:59:4f:9c:af:9e, ethertype IPv4
>(0x0800), length 74: 10.189.85.25.58260 > 10.189.85.19.80: Flags [S],
>seq 3662446385, win 14600,
>options [mss 1460,sackOK,TS val 269330476 ecr 0,nop,wscale 7], length 0
>
>18:57:20.363944 02:59:4f:9c:af:9e > 02:a8:f3:9c:c1:01, ethertype IPv4
>(0x0800), length 74: 10.189.85.19.80 > 10.189.85.25.58260: Flags [S.],
>seq 1036913679, ack 366244
>6386, win 14480, options [mss 1460,sackOK,TS val 190985773 ecr
>269330476,nop,wscale 7], length 0
>18:57:20.364312 02:a8:f3:9c:c1:01 > 02:59:4f:9c:af:9e, ethertype IPv4
>(0x0800), length 66: 10.189.85.25.58260 > 10.189.85.19.80: Flags [.],
>ack 1, win 115, options [no
>p,nop,TS val 269330476 ecr 190985773], length 0
>18:57:20.364325 02:a8:f3:9c:c1:01 > 02:59:4f:9c:af:9e, ethertype IPv4
>(0x0800), length 142: 10.189.85.25.58260 > 10.189.85.19.80: Flags [P.],
>seq 1:77, ack 1, win 115,
> options [nop,nop,TS val 269330476 ecr 190985773], length 76
>18:57:20.364446 02:59:4f:9c:af:9e > 02:a8:f3:9c:c1:01, ethertype IPv4
>(0x0800), length 66: 10.189.85.19.80 > 10.189.85.25.58260: Flags [.],
>ack 77, win 114, options [n
>op,nop,TS val 190985774 ecr 269330476], length 0
>18:57:20.364778 02:59:4f:9c:af:9e > 02:a8:f3:9c:c1:01, ethertype IPv4
>(0x0800), length 2962: 10.189.85.19.80 > 10.189.85.25.58260: Flags [.],
>seq 1:2897, ack 77, win 1
>14, options [nop,nop,TS val 190985774 ecr 269330476], length 2896
>18:57:20.364850 02:59:4f:9c:af:9e > 02:a8:f3:9c:c1:01, ethertype IPv4
>(0x0800), length 1108: 10.189.85.19.80 > 10.189.85.25.58260: Flags [P.],
>seq 2897:3939, ack 77, w
>in 114, options [nop,nop,TS val 190985774 ecr 269330476], length 1042
>18:57:20.365135 02:a8:f3:9c:c1:01 > 02:59:4f:9c:af:9e, ethertype IPv4
>(0x0800), length 66: 10.189.85.25.58260 > 10.189.85.19.80: Flags [.],
>ack 2897, win 160, options
>
>...
>
>
>#Test traffic ICMP
>
>[root@SourceVM ~]# ping 10.189.85.19 -c 2 -W 1
>PING 10.189.85.19 (10.189.85.19) 56(84) bytes of data.
>64 bytes from 10.189.85.19: icmp_seq=2 ttl=64 time=0.676 ms
>
>--- 10.189.85.19 ping statistics ---
>2 packets transmitted, 1 received, 50% packet loss, time 999ms
>rtt min/avg/max/mdev = 0.676/0.676/0.676/0.000 ms
>
>
>#ProblematicVM
>root@cn-a-0-27:~# tcpdump -eni tap0cf19675-22 icmp
>tcpdump: WARNING: tap0cf19675-22: no IPv4 address assigned
>tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
>listening on tap0cf19675-22, link-type EN10MB (Ethernet), capture size
>65535 bytes
>20:15:48.819471 02:a8:f3:9c:c1:01 > 02:59:4f:9c:af:9e, ethertype IPv4
>(0x0800), length 98: 10.189.85.25 > 10.189.85.19: ICMP echo request, id
>9075, seq 1, length 64
>
>#DestinationVM
>root@cn-a-0-27:~# tcpdump -eni tap594f9caf-9e icmp
>tcpdump: WARNING: tap594f9caf-9e: no IPv4 address assigned
>tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
>listening on tap594f9caf-9e, link-type EN10MB (Ethernet), capture size
>65535 bytes
>20:15:49.816581 02:a8:f3:9c:c1:01 > 02:59:4f:9c:af:9e, ethertype IPv4
>(0x0800), length 98: 10.189.85.25 > 10.189.85.19: ICMP echo request, id
>9075, seq 2, length 64
>20:15:49.816890 02:59:4f:9c:af:9e > 02:a8:f3:9c:c1:01, ethertype IPv4
>(0x0800), length 98: 10.189.85.19 > 10.189.85.25: ICMP echo reply, id
>9075, seq 2, length 64
>
>
>
>
>Our debug steps:
>
>## Check path from source compute node
>## Get source vif, rt and nh for DestinationVM
>
>root@cn-a-0-28:/# vif --get 3
>Vrouter Interface Table
>
>Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
> Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
>L2=Layer 2
> D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
> Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
>Offload, Mon=Interface is Monitored
> Uuf=Unknown Unicast Flood
>
>vif0/3 OS: tapa8f39cc1-01
> Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:0
> Vrf:1 Flags:PL3L2 MTU:9160 Ref:6
> RX packets:4005754 bytes:3214446570 errors:0
> TX packets:4912399 bytes:517166392 errors:0
>
>
>root@cn-a-0-28:/# rt --dump 1 | egrep "10.189.85.19/32|Dest"
>Destination PPL Flags Label Nexthop Stitched
>MAC(Index)
>10.189.85.19/32 32 LP 22 35
>2:59:4f:9c:af:9e(100440)
>
>root@cn-a-0-28:/# nh --get 35
>Id:35 Type:Tunnel Fmly: AF_INET Flags:Valid, MPLSoUDP,
>Rid:0 Ref_cnt:75 Vrf:0
> Oif:0 Len:14 Flags Valid, MPLSoUDP, Data:ec f4 bb d9 20
>e0 ec f4 bb d9 5e c4 08 00
> Vrf:0 Sip:10.187.1.28 Dip:10.187.1.27
>
>root@cn-a-0-28:/# vif --get 0
>Vrouter Interface Table
>
>Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
> Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
>L2=Layer 2
> D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
> Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
>Offload, Mon=Interface is Monitored
> Uuf=Unknown Unicast Flood
>
>vif0/0 OS: bond1 (Speed 10000, Duplex 1)
> Type:Physical HWaddr:ec:f4:bb:d9:5e:c4 IPaddr:0
> Vrf:0 Flags:TcL3L2Vp MTU:1514 Ref:8
> RX packets:5633720 bytes:1088261052 errors:0
> TX packets:4608455 bytes:3497980076 errors:0
>
>
>#get info about DestinationVM on destination compute node
>#get vif, rt and nh
>
>root@cn-a-0-27:~# vif --get 4
>Vrouter Interface Table
>
>Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
> Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
>L2=Layer 2
> D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
> Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
>Offload, Mon=Interface is Monitored
> Uuf=Unknown Unicast Flood
>
>vif0/4 OS: tap594f9caf-9e
> Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:0
> Vrf:2 Flags:PL3L2D MTU:9160 Ref:6
> RX packets:167708 bytes:142198914 errors:0
> TX packets:210585 bytes:16691702 errors:0
>
>
>root@cn-a-0-27:~# rt --dump 2 | egrep "10.189.85.19\/32|Dest"
>Destination PPL Flags Label Nexthop Stitched
>MAC(Index)
>10.189.85.19/32 32 P - 35
>2:59:4f:9c:af:9e(131480)
>
>root@cn-a-0-27:~# nh --get 35
>Id:35 Type:Encap Fmly: AF_INET Flags:Valid, Policy,
>Rid:0 Ref_cnt:6 Vrf:2
> EncapFmly:0806 Oif:4 Len:14 Data:02 59 4f 9c af 9e 00 00
>5e 00 01 00 08 00
>
>
>#get ProblematicVM vif, rt, nh on destination compute node
>
>root@cn-a-0-27:~# vif --list | grep tap0cf19675-22
>vif0/17 OS: tap0cf19675-22
>
>root@cn-a-0-27:~# vif --get 17
>Vrouter Interface Table
>
>Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
> Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
>L2=Layer 2
> D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
> Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
>Offload, Mon=Interface is Monitored
> Uuf=Unknown Unicast Flood
>
>vif0/17 OS: tap0cf19675-22
> Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:0
> Vrf:2 Flags:PL3L2D MTU:9160 Ref:6
> RX packets:5110 bytes:374284 errors:0
> TX packets:40265 bytes:2987278 errors:0
>
>
>root@cn-a-0-27:~# rt --dump 2 | egrep "10.189.85.22\/32|Dest"
>Destination PPL Flags Label Nexthop Stitched
>MAC(Index)
>10.189.85.22/32 32 P - 112
>2:c:f1:96:75:22(197908)
>
>root@cn-a-0-27:~# nh --get 112
>Id:112 Type:Encap Fmly: AF_INET Flags:Valid, Policy,
>Rid:0 Ref_cnt:6 Vrf:2
> EncapFmly:0806 Oif:17 Len:14 Data:02 0c f1 96 75 22 00 00
>5e 00 01 00 08 00
>
>
>
>
>Further observations
>
>We can't get vif --kernel for tested VM
>
>root@cn-a-0-28:/# vif --get 3 --kernel
>Vrouter Interface Table
>
>Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
> Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
>L2=Layer 2
> D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
> Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
>Offload, Mon=Interface is Monitored
> Uuf=Unknown Unicast Flood
>
>No such file or directory
>
>
>root@cn-a-0-27:~# vif --get 17 --kernel
>Vrouter Interface Table
>
>Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
> Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
>L2=Layer 2
> D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
> Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
>Offload, Mon=Interface is Monitored
> Uuf=Unknown Unicast Flood
>
>No such file or directory
>
>
>root@cn-a-0-27:~# vif --get 4 --kernel
>Vrouter Interface Table
>
>Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
> Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
>L2=Layer 2
> D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
> Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
>Offload, Mon=Interface is Monitored
> Uuf=Unknown Unicast Flood
>
>No such file or directory
>
>
>For some we can get this info but is it correct?
>
>root@cn-a-0-27:~# vif --get 34
>Vrouter Interface Table
>
>Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
> Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
>L2=Layer 2
> D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
> Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
>Offload, Mon=Interface is Monitored
> Uuf=Unknown Unicast Flood
>
>vif0/34 OS: tap6d1f56cf-c0
> Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:0
> Vrf:1 Flags:PL3L2D MTU:9160 Ref:6
> RX packets:37583 bytes:23041676 errors:0
> TX packets:30149 bytes:2358733 errors:0
>
>root@cn-a-0-27:~# vif --get 34 --kernel
>Vrouter Interface Table
>
>Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
> Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3,
>L2=Layer 2
> D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
> Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering
>Offload, Mon=Interface is Monitored
> Uuf=Unknown Unicast Flood
>
>vif0/4 OS: tap594f9caf-9e
> Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:0
> Vrf:2 Flags:PL3L2D MTU:9160 Ref:6
> RX packets:167713 bytes:142199268 errors:0
> TX packets:210587 bytes:16691786 errors:0
>
>
>Value should be 49 (os_ifindex), am I right?
>
>root@cn-a-0-27:~# ip link show | grep tap6d1f56cf-c0
>49: tap6d1f56cf-c0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc
>pfifo_fast state UP mode DEFAULT group default qlen 500
>
>root@cn-a-0-27:~# ip link show | grep tap594f9caf-9e
>34: tap594f9caf-9e: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc
>pfifo_fast state UP mode DEFAULT group default qlen 500
>
>
>On http://10.187.0.27:8085/Snh_ItfReq?x=tap594f9caf-9e, os_ifindex looks
>fine
>
>
>Kind Regards
>Jacek Czerniak
>
>W dniu 14.10.2015 o 07:30, [email protected] pisze:
>> Send Users mailing list submissions to
>> [email protected]
>>
>> To subscribe or unsubscribe via the World Wide Web, visit
>>
>> http://lists.opencontrail.org/mailman/listinfo/users_lists.opencontrail.
>>org
>>
>> or, via email, send a message with subject or body 'help' to
>> [email protected]
>>
>> You can reach the person managing the list at
>> [email protected]
>>
>> When replying, please edit your Subject line so it is more specific
>> than "Re: Contents of Users digest..."
>>
>>
>> Today's Topics:
>>
>> 1. Re: Drops of the first SYN packet (Rajagopalan Sivaramakrishnan)
>>
>>
>> ----------------------------------------------------------------------
>>
>> Message: 1
>> Date: Wed, 14 Oct 2015 05:30:39 +0000
>> From: Rajagopalan Sivaramakrishnan <[email protected]>
>> To: Piotr P <[email protected]>
>> Cc: "<[email protected]>" <[email protected]>
>> Subject: Re: [Users] Drops of the first SYN packet
>> Message-ID: <d2433529.5b7f3%[email protected]>
>> Content-Type: text/plain; charset="windows-1252"
>>
>> Hi Piotr,
>> I didn't fully understand your description below, so I?ll describe
>>the expected behavior. The first packet of the flow should be sent to
>>the vrouter agent over the pkt0 interface. Subsequently, the agent
>>should create a flow with the flow action set to forward (which should
>>be visible in ?flow ?l?). For the packet that gets dropped, do you see
>>it in ?tcpdump ?ni pkt0 ?x? (you might get some messages from tcpdump
>>indicating bad header length, but you can ignore those) and ?flow ?l".
>>Can you please check this on the compute node where you see the SYN
>>being dropped? Are you seeing issues with ping too or is it only with
>>TCP SYN?
>>
>> Raja
>>
>> From: Piotr P <[email protected]<mailto:[email protected]>>
>> Date: Tuesday, October 13, 2015 at 7:53 AM
>> To: Rajagopalan Sivaramakrishnan
>><[email protected]<mailto:[email protected]>>
>> Cc:
>>"<[email protected]<mailto:[email protected]>>"
>><[email protected]<mailto:[email protected]>>
>> Subject: Re: [Users] Drops of the first SYN packet
>>
>>
>>
>> Hi Raja,
>>
>>
>> For our tests we took today two new kvm compute nodes with vrouter and
>>without any Virtual Machines.
>> What we noticed is that if we spawn up to 4 VM within the same project
>>and Virtual Network on each compute node everything works all right.
>> If we add 5th VM on test compute node problem appears , and we can
>>reproduce this on different physical kvm compute nodes.
>> On this 5th Virtual machines we are starting seeing first SYN packet
>>for other VMs located on specific compute node (vrouter) .
>> All other packets from the transmission is normally delivered to target
>>virtual machines.
>> This is visible for all consecutive tcp flows between VM's, and only
>>for first packet from a new flow.
>> This 5th VM receives traffic for itself normally. So we end up in
>>situation where we have affected 4 VM's and one working without problem.
>> Problem could be resolved if we shutdown virtual port of this 5th VM or
>>delete it. After this step traffic for other vm is delivered normally.
>> If we create again new VM problem starts to be visible again.
>>
>> We cannot see any new flows between client and 5th VM that receives
>>additional SYN packets that this VM shouldn't see.
>> All other flows are created successfully.
>> In the dropstat output we cannot see any changes especially related to
>>the drop counter.
>>
>>
>> Following lines you can find example of how we see trafic on this vm
>>where all first packets are sending
>>
>> 192.168.50.22 - client located on first compute node
>> 192.168.50.27 - 192.168.50.38 - other vm with nginx, located on second
>>compute node
>> 192.168.50.33 - VM where all first SYN packets are visible
>>
>>
>> [root@c-cn-28-10 centos]# ip -4 a
>> 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN
>> inet 127.0.0.1/8<http://127.0.0.1/8> scope host lo
>> valid_lft forever preferred_lft forever
>> 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
>>state UP qlen 1000
>> inet 192.168.50.33/20<http://192.168.50.33/20> brd 10.189.63.255
>>scope global eth0
>> valid_lft forever preferred_lft forever
>> [root@c-cn-28-10 centos]# tcpdump "tcp[tcpflags] & (tcp-syn|tcp-ack) !=
>>0" and port 80
>> tcpdump: verbose output suppressed, use -v or -vv for full protocol
>>decode
>> listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
>>
>> 14:20:22.626172 IP 192.168.50.22.51823 > 192.168.50.27.http: Flags [S],
>>seq 2741907250, win 14600, options [mss 1460,sackOK,TS val 5010347 ecr
>>0,nop,wscale 7], length 0
>> 14:20:23.631110 IP 192.168.50.22.60984 > 192.168.50.28.http: Flags [S],
>>seq 3116446858, win 14600, options [mss 1460,sackOK,TS val 5011352 ecr
>>0,nop,wscale 7], length 0
>> 14:20:24.637322 IP 192.168.50.22.46585 > 192.168.50.29.http: Flags [S],
>>seq 3566871094, win 14600, options [mss 1460,sackOK,TS val 5012359 ecr
>>0,nop,wscale 7], length 0
>> 14:20:25.643556 IP 192.168.50.22.41182 > 192.168.50.30.http: Flags [S],
>>seq 1739097792, win 14600, options [mss 1460,sackOK,TS val 5013365 ecr
>>0,nop,wscale 7], length 0
>> 14:20:26.651601 IP 192.168.50.22.36921 > 192.168.50.31.http: Flags [S],
>>seq 3990314127, win 14600, options [mss 1460,sackOK,TS val 5014373 ecr
>>0,nop,wscale 7], length 0
>> 14:20:27.659212 IP 192.168.50.22.40056 > 192.168.50.32.http: Flags [S],
>>seq 1091797067, win 14600, options [mss 1460,sackOK,TS val 5015380 ecr
>>0,nop,wscale 7], length 0
>> 14:20:28.665625 IP 192.168.50.22.52838 > 192.168.50.33.http: Flags [S],
>>seq 1936544852, win 14600, options [mss 1460,sackOK,TS val 5016387 ecr
>>0,nop,wscale 7], length 0
>> 14:20:28.665653 IP 192.168.50.33.http > 192.168.50.22.52838: Flags
>>[S.], seq 2591101890, ack 1936544853, win 14480, options [mss
>>1460,sackOK,TS val 4294865173 ecr 5016387,nop,wscale 7], length 0
>> 14:20:28.666021 IP 192.168.50.22.52838 > 192.168.50.33.http: Flags [.],
>>ack 1, win 115, options [nop,nop,TS val 5016388 ecr 4294865173], length 0
>> 14:20:28.666046 IP 192.168.50.22.52838 > 192.168.50.33.http: Flags
>>[P.], seq 1:78, ack 1, win 115, options [nop,nop,TS val 5016388 ecr
>>4294865173], length 77
>> 14:20:28.666050 IP 192.168.50.33.http > 192.168.50.22.52838: Flags [.],
>>ack 78, win 114, options [nop,nop,TS val 4294865173 ecr 5016388], length
>>0
>> 14:20:28.666447 IP 192.168.50.33.http > 192.168.50.22.52838: Flags
>>[P.], seq 1:239, ack 78, win 114, options [nop,nop,TS val 4294865174 ecr
>>5016388], length 238
>> 14:20:28.666947 IP 192.168.50.22.52838 > 192.168.50.33.http: Flags [.],
>>ack 239, win 123, options [nop,nop,TS val 5016389 ecr 4294865174],
>>length 0
>> 14:20:28.666958 IP 192.168.50.22.52838 > 192.168.50.33.http: Flags
>>[F.], seq 78, ack 239, win 123, options [nop,nop,TS val 5016389 ecr
>>4294865174], length 0
>> 14:20:28.667002 IP 192.168.50.33.http > 192.168.50.22.52838: Flags
>>[F.], seq 239, ack 79, win 114, options [nop,nop,TS val 4294865174 ecr
>>5016389], length 0
>> 14:20:28.667340 IP 192.168.50.22.52838 > 192.168.50.33.http: Flags [.],
>>ack 240, win 123, options [nop,nop,TS val 5016390 ecr 4294865174],
>>length 0
>> 14:20:28.671229 IP 192.168.50.22.46357 > 192.168.50.34.http: Flags [S],
>>seq 2912677901, win 14600, options [mss 1460,sackOK,TS val 5016393 ecr
>>0,nop,wscale 7], length 0
>> 14:20:29.679416 IP 192.168.50.22.53239 > 192.168.50.35.http: Flags [S],
>>seq 1015724729, win 14600, options [mss 1460,sackOK,TS val 5017401 ecr
>>0,nop,wscale 7], length 0
>> 14:20:30.687231 IP 192.168.50.22.40427 > 192.168.50.36.http: Flags [S],
>>seq 3789917763, win 14600, options [mss 1460,sackOK,TS val 5018408 ecr
>>0,nop,wscale 7], length 0
>> 14:20:31.693362 IP 192.168.50.22.47202 > 192.168.50.37.http: Flags [S],
>>seq 2700187443, win 14600, options [mss 1460,sackOK,TS val 5019415 ecr
>>0,nop,wscale 7], length 0
>> 14:20:32.699384 IP 192.168.50.22.37820 > 192.168.50.38.http: Flags [S],
>>seq 2458579739, win 14600, options [mss 1460,sackOK,TS val 5020421 ecr
>>0,nop,wscale 7], length 0
>>
>>
>>
>> Additioanl test with ping
>>
>> [root@client]# ping 192.168.50.35 -c 2
>> PING 192.168.50.35 (192.168.50.35) 56(84) bytes of data.
>> 64 bytes from 192.168.50.35<http://192.168.50.35>: icmp_seq=2 ttl=64
>>time=0.498 ms
>>
>> --- 192.168.50.35 ping statistics ---
>> 2 packets transmitted, 1 received, 50% packet loss, time 999ms
>> rtt min/avg/max/mdev = 0.498/0.498/0.498/0.000 ms
>>
>>
>> (on "the 5th vm" with interface address 192.168.50.33) tcpdump -i any
>>icmp -n
>> 14:39:11.741773 IP 192.168.50.22 > 192.168.50.35<http://192.168.50.35>:
>>ICMP echo request, id 3626, seq 1, length 64
>> 14:39:12.685724 IP 192.168.50.22 > 192.168.50.35<http://192.168.50.35>:
>>ICMP echo request, id 3627, seq 1, length 64
>> 14:39:13.549434 IP 192.168.50.22 > 192.168.50.35<http://192.168.50.35>:
>>ICMP echo request, id 3628, seq 1, length 64
>> 14:39:14.397740 IP 192.168.50.22 > 192.168.50.35<http://192.168.50.35>:
>>ICMP echo request, id 3629, seq 1, length 64
>> 14:39:15.237451 IP 192.168.50.22 > 192.168.50.35<http://192.168.50.35>:
>>ICMP echo request, id 3630, seq 1, length 6
>>
>> We are not seeing this icmp packets on the flow list
>>
>> [destination compute node "flow -l"
>> 28268 192.168.50.33:123<http://192.168.50.33:123>
>>95.158.95.123:123<http://95.158.95.123:123> 17 (1)
>> 74012 95.158.95.123:123<http://95.158.95.123:123>
>>192.168.50.33:123<http://192.168.50.33:123> 17 (1)
>> 238232<=>392568 192.168.50.33:22<http://192.168.50.33:22>
>>10.163.14.57:47034<http://10.163.14.57:47034> 6 (1)
>> 392568<=>238232 10.163.14.57:47034<http://10.163.14.57:47034>
>>192.168.50.33:22<http://192.168.50.33:22> 6 (1)
>>
>>
>>
>> Please let us know how to troubleshoot it in more details. What we can
>>check next.
>>
>>
>>
>> Kind Regards
>> Piotr Pieprzycki
>>
>> On 12 October 2015 at 19:17, Rajagopalan Sivaramakrishnan
>><[email protected]<mailto:[email protected]>> wrote:
>> Hi Piotr,
>> There isn?t a known issue in this respect. Can you please run
>>?dropstats? on the destination compute node to see if any error counters
>>are going up inside vrouter?
>> Also, can you please run ?flow ?l? on the destination compute node to
>>see if the flow action for the relevant flow is set to F (forward).
>>
>> Raja
>>
>> From: Users
>><[email protected]<mailto:[email protected]
>>rail.org>> on behalf of Piotr P
>><[email protected]<mailto:[email protected]>>
>> Date: Monday, October 12, 2015 at 7:39 AM
>> To:
>>"<[email protected]<mailto:[email protected]>>"
>><[email protected]<mailto:[email protected]>>
>> Subject: [Users] Drops of the first SYN packet
>>
>>
>> Hi All,
>> We are experiencing problem with missing packets between Virtual
>>Machines located within the same Virtual Network.
>>
>> Our setup Contrail 2.20 (buld 64), Priority of encapsulation: VxLAN,
>>MPLSoUDP, MPLSoGRE
>>
>>
>> The effect is visible during each new transmission/flow. There is
>>missing first syn packet or first icmp ping.
>> This affect each tcp session, it's delayed for syn retransmission time.
>> Drops occurs for each subsequent new tcp session between VM's. We can
>>repeat tcp connection between VM and first syn will be missing all the
>>time.
>> It's not visible in all Virtual Networks. There are some other Virtual
>>Networks that works correctly.
>> We can reproduce this behaviour with creating new networks with even
>>only 2 virtual machines.
>> Those networks differs only by other routing-target value.
>>
>> This effect
>> does not appear when we have transmission outside VN (eg through
>>physical gateway)
>> it's only correlated when traffic stays within network.
>>
>> Tcpdump on compute nodes shows that:
>> - All packets are visible on incoming tap interface (from source VM)
>> - all packets are visible on bond interfaces on both compute nodes
>>(vrouter) with VMs (bond active-passive toward physical switch )
>> Computer nodes are located on the same physical switch (no visible
>>errors on switch ports)
>> - first packet/syn from transmission is missing on a tap interface
>>toward destination VM
>>
>>
>> Please let know if this is some known behaviour. What could be the
>>steps to troubleshoot this issue?
>>
>> Kind Regards
>> Piotr Pieprzycki
>>
>> -------------- next part --------------
>> An HTML attachment was scrubbed...
>> URL:
>><http://lists.opencontrail.org/pipermail/users_lists.opencontrail.org/att
>>achments/20151014/70a5f042/attachment.html>
>>
>> ------------------------------
>>
>> Subject: Digest Footer
>>
>> _______________________________________________
>> Users mailing list
>> [email protected]
>>
>>http://lists.opencontrail.org/mailman/listinfo/users_lists.opencontrail.o
>>rg
>>
>>
>> ------------------------------
>>
>> End of Users Digest, Vol 26, Issue 11
>> *************************************
>
>
>_______________________________________________
>Users mailing list
>[email protected]
>http://lists.opencontrail.org/mailman/listinfo/users_lists.opencontrail.or
>g
_______________________________________________
Users mailing list
[email protected]
http://lists.opencontrail.org/mailman/listinfo/users_lists.opencontrail.org