[Oisf-users] Occasional burst of packet loss

Yasha Zislin coolyasha at hotmail.com
Mon Nov 3 16:02:31 UTC 2014


I have a pretty beefy server monitoring two SPAN ports. A lot of packets are flowing in there, mostly HTTP stuff.I have 40 logical CPUs (20 per SPAN Port). I am using PF_RING.
I've noticed that I get an occasional packet loss and it's a burst of packets. After that it is fine for days.So couple of PF Ring instances report packet loss  (ie cat /proc/net/pf_ring/*eth* | grep "Tot Pkt Lost".Here is the first event after packet loss occured. It happens within a minute and then stops.capture.kernel_packets    | RxPFReth213               | 366410186capture.kernel_drops      | RxPFReth213               | 639312dns.memuse                | RxPFReth213               | 3089534dns.memcap_state          | RxPFReth213               | 0dns.memcap_global         | RxPFReth213               | 0decoder.pkts              | RxPFReth213               | 366410186decoder.bytes             | RxPFReth213               | 268927212125decoder.invalid           | RxPFReth213               | 4111244decoder.ipv4              | RxPFReth213               | 365972036decoder.ipv6              | RxPFReth213               | 104297decoder.ethernet          | RxPFReth213               | 366410186decoder.raw               | RxPFReth213               | 0decoder.sll               | RxPFReth213               | 0decoder.tcp               | RxPFReth213               | 267634781decoder.udp               | RxPFReth213               | 7537800decoder.sctp              | RxPFReth213               | 0decoder.icmpv4            | RxPFReth213               | 325917decoder.icmpv6            | RxPFReth213               | 0decoder.ppp               | RxPFReth213               | 0decoder.pppoe             | RxPFReth213               | 0decoder.gre               | RxPFReth213               | 0decoder.vlan              | RxPFReth213               | 0decoder.vlan_qinq         | RxPFReth213               | 0decoder.teredo            | RxPFReth213               | 1410decoder.ipv4_in_ipv6      | RxPFReth213               | 0decoder.ipv6_in_ipv6      | RxPFReth213               | 0decoder.avg_pkt_size      | RxPFReth213               | 733decoder.max_pkt_size      | RxPFReth213               | 1514defrag.ipv4.fragments     | RxPFReth213               | 84459996defrag.ipv4.reassembled   | RxPFReth213               | 180defrag.ipv4.timeouts      | RxPFReth213               | 0defrag.ipv6.fragments     | RxPFReth213               | 0defrag.ipv6.reassembled   | RxPFReth213               | 0defrag.ipv6.timeouts      | RxPFReth213               | 0defrag.max_frag_hits      | RxPFReth213               | 0tcp.sessions              | RxPFReth213               | 2160679tcp.ssn_memcap_drop       | RxPFReth213               | 0tcp.pseudo                | RxPFReth213               | 335927tcp.invalid_checksum      | RxPFReth213               | 0tcp.no_flow               | RxPFReth213               | 0tcp.reused_ssn            | RxPFReth213               | 1624tcp.memuse                | RxPFReth213               | 15770704tcp.syn                   | RxPFReth213               | 2457006tcp.synack                | RxPFReth213               | 2182331tcp.rst                   | RxPFReth213               | 1386908tcp.segment_memcap_drop   | RxPFReth213               | 0tcp.stream_depth_reached  | RxPFReth213               | 328tcp.reassembly_memuse     | RxPFReth213               | 40356260000tcp.reassembly_gap        | RxPFReth213               | 766124http.memuse               | RxPFReth213               | 85581753http.memcap               | RxPFReth213               | 0detect.alert              | RxPFReth213               | 6375
I just hope it is not an attack attempt to evade IDS.
Any help would be appreciated.
Thanks. 		 	   		  
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openinfosecfoundation.org/pipermail/oisf-users/attachments/20141103/b365427e/attachment-0001.html>


More information about the Oisf-users mailing list