[3.2.2.0-33] Ping between VM to BMS is failing
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
Juniper Openstack | Status tracked in Trunk | |||||
R3.2 |
Fix Committed
|
High
|
Manish Singh | |||
Trunk |
Fix Committed
|
High
|
Manish Singh |
Bug Description
Summary:
Ping between VM to BMS is failing in 3.2.2.0-33. When Ping from VM to BMS, ARP is getting learned properly in VM, then ICMP Echo from VM is getting dropped in vrouter with flow action drop . Disabling and enabling RPF check in VN is resuming the traffic.
Details:
Short flows are getting setup with (Short flow No Source route for RPF NH) and (Short flow Reverse flow change).
Details of output can be found below.
root@5b7s10:~# dropstats | grep Drop
IF Drop 0
Flow Action Drop 46113
New Flow Drops 0
root@5b7s10:~# dropstats | grep Drop
IF Drop 0
Flow Action Drop 46167
New Flow Drops 0
root@5b7s10:~# dropstats | grep Drop
IF Drop 0
Flow Action Drop 46213
New Flow Drops 0
root@5b7s10:~# flow -l
Flow table(size 80609280, entries 629760)
Entries: Created 5668 Added 5668 Deleted 11124 Changed 11124 Processed 5668 Used Overflow entries 0
(Created Flows/CPU: 342 463 944 328 348 200 937 369 0 0 8 0 17 18 0 0 141 141 185 229 149 126 517 203 0 0 3 0 0 0 0 0)(oflows 0)
Action:F=Forward, D=Drop N=NAT(S=SNAT, D=DNAT, Ps=SPAT, Pd=DPAT, L=Link Local Port)
Other:K(
Flags:E=Evicted, Ec=Evict Candidate, N=New Flow, M=Modified Dm=Delete Marked
TCP(r=reverse)
Index Source:
-------
279280<=>472032 156.31.34.5:8952 1 (1)
(Gen: 90, K(nh):18, Action:D(Unknown), Flags:, QOS:-1, S(nh):18, Stats:2/196,
SPort 63804, TTL 0, Sinfo 3.0.0.0)
472032<=>279280 156.31.34.4:8952 1 (1)
(Gen: 96, K(nh):18, Action:D(Unknown), Flags:, QOS:-1, S(nh):16, Stats:0/0,
SPort 64375, TTL 0, Sinfo 0.0.0.0)
root@5b7s10:~# tcpdump -c 1 -nei tapc0ac3b31-9d
tcpdump: WARNING: tapc0ac3b31-9d: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tapc0ac3b31-9d, link-type EN10MB (Ethernet), capture size 65535 bytes
14:03:05.534084 02:c0:ac:3b:31:9d > 00:00:00:00:00:01, ethertype IPv4 (0x0800), length 98: 156.31.34.5 > 156.31.34.4: ICMP echo request, id 8952, seq 34702, length 64
root@5b7s10:~# vxlan --dump
VXLAN Table
VNID NextHop
----------------
9 14
root@5b7s10:~# nh --get 14
Id:14 Type:Vrf_Translate Fmly: AF_INET Rid:0 Ref_cnt:2 Vrf:1
Vrf:1
root@5b7s10:~# rt --dump 1 --family bridge
Flags: L=Label Valid, Df=DHCP flood
vRouter bridge table 0/1
Index DestMac Flags Label/VNID Nexthop
135492 0:0:0:0:0:1 LDf 9 16
182128 0:0:0:0:0:a LDf 9 17
808500 0:0:5e:0:1:0 Df - 3
831300 90:e2:ba:a7:21:68 Df - 3
888296 ff:ff:ff:ff:ff:ff LDf 9 29
977452 2:c0:ac:3b:31:9d - 22
root@5b7s10:~# nh --get 16
Id:16 Type:Tunnel Fmly: AF_INET Rid:0 Ref_cnt:2 Vrf:0
Oif:0 Len:14 Flags Valid, Vxlan, Data:0c 86 10 3c 2b 00 90 e2 ba a7 21 68 08 00
Vrf:0 Sip:172.17.90.10 Dip:34.34.34.34
Changed in juniperopenstack: | |
importance: | Undecided → Critical |
assignee: | nobody → Manish Singh (manishs) |
milestone: | none → r3.2.3.0 |
tags: | added: releasenote |
information type: | Proprietary → Public |
tags: | added: vrouter |
Disabling RPF check for the VN workarounds the bug.