<div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr">Peter, I emailed our config to you directly. I mentioned in my original email that we did test having Rust enabled in 4.1.2 where I explicitly disabled the Rust parsers and still experienced significant packet loss. In that case I added the following config under app-layer.protocols but left the rest of the config the same:</div><div dir="ltr"><br><div><div> krb5:</div><div> enabled: no</div><div> ikev2:</div><div> enabled: no</div><div> nfs:</div><div> enabled: no</div><div> tftp:</div><div> enabled: no</div><div> ntp:</div><div> enabled: no</div><div> dhcp:</div><div> enabled: no</div></div><div><br></div><div><br></div></div></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, Feb 7, 2019 at 12:54 PM Cloherty, Sean E <<a href="mailto:scloherty@mitre.org">scloherty@mitre.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Still seeing this myself so I will be grabbing configs, rebuilding with 4.0.6 and getting that data as well.<br>
<br>
-----Original Message-----<br>
From: Oisf-users <<a href="mailto:oisf-users-bounces@lists.openinfosecfoundation.org" target="_blank">oisf-users-bounces@lists.openinfosecfoundation.org</a>> On Behalf Of Peter Manev<br>
Sent: Wednesday, February 6, 2019 11:54 AM<br>
To: Eric Urban <<a href="mailto:eurban@umn.edu" target="_blank">eurban@umn.edu</a>><br>
Cc: Open Information Security Foundation <<a href="mailto:oisf-users@lists.openinfosecfoundation.org" target="_blank">oisf-users@lists.openinfosecfoundation.org</a>><br>
Subject: [EXT] Re: [Oisf-users] Packet loss and increased resource consumption after upgrade to 4.1.2 with Rust support<br>
<br>
On Tue, Feb 5, 2019 at 11:14 PM Eric Urban <<a href="mailto:eurban@umn.edu" target="_blank">eurban@umn.edu</a>> wrote:<br>
><br>
> I have seen a few emails on this list about users either having packet loss or increased resource consumption after upgrading to 4.1.2. We are seeing much higher rates of packet loss after upgrading to 4.1.2 (with Rust) from 4.0.6 (no Rust) so would appreciate any input on how to best move forward with troubleshooting. Please let me know if it would it be better to open a ticket in Redmine.<br>
><br>
> Here are some details:<br>
> - We have two sets of Suricata sensors that are each getting the same set of traffic, so one acts as a redundant set. These have the same hardware.<br>
> - Once we upgraded to 4.1.2, cpu and memory usage went up and we have had regular bursts of heavy packet loss. I sampled traffic from yesterday early morning through today and a few sensors have had 2.49, 9.36, and 11.130% packet loss over that time frame. For our 4.0.6 sensor set over the same time for the same traffic the sensor with the highest loss has 0.011%. We have also had one occasion where a sensor had possible memory exhaustion as the stats.tcp.ssn_memcap_drop_delta counter hit 199.<br>
> - We rolled back our primary sensor set to 4.0.6 and immediately stopped having drops.<br>
> - We did not explicitly enable or disable any of the Rust parsers in our config (krb5, nfs, tftp, ntp, dhcp, ikev2) but do have SMB enabled so I believe will have the SMB2/3 parser. I was not sure the default behavior in this case (as --dump-config had no values for the new Rust based parsers), so I did test disabling krb5, nfs, tftp, ntp, dhcp, and ikev2. We still had high percentages of drops in this case. I plan to look into whether or not there is a way to disable just SMB2/3 with Rust enabled to see if that makes a difference.<br>
> - We use pcap capture mode with Myricom cards. The driver version if not at the latest, though is only one patch version away from the latest. We tested updating to the latest version on one of our sensors and it had no effect.<br>
> - Suricata was compiled with rustc 1.30.1. I did try upgrading to use Rust 1.31 but did not seem to have any effect.<br>
> - I compiled Suricata 4.1.2 without Rust and that looks to have positively affected this. We had very little packet loss in this case.<br>
><br>
<br>
Is it possible to share full stats.log from the two different runs<br>
(4.1.2 and 4.0.6) and any changes made to suricata.yaml ?<br>
<br>
<br>
-- <br>
Regards,<br>
Peter Manev<br>
_______________________________________________<br>
Suricata IDS Users mailing list: <a href="mailto:oisf-users@openinfosecfoundation.org" target="_blank">oisf-users@openinfosecfoundation.org</a><br>
Site: <a href="http://suricata-ids.org" rel="noreferrer" target="_blank">http://suricata-ids.org</a> | Support: <a href="http://suricata-ids.org/support/" rel="noreferrer" target="_blank">http://suricata-ids.org/support/</a><br>
List: <a href="https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users" rel="noreferrer" target="_blank">https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users</a><br>
<br>
Conference: <a href="https://suricon.net" rel="noreferrer" target="_blank">https://suricon.net</a><br>
Trainings: <a href="https://suricata-ids.org/training/" rel="noreferrer" target="_blank">https://suricata-ids.org/training/</a><br>
</blockquote></div></div>