Gateway_less_Fwd: Traffic drop around 60 secs observed while restarting agent, when FIP is configured over IP fabric enabled VN

Bug #1724133 reported by Chandra Sekhar Reddy Mallam
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Juniper Openstack
Status tracked in Trunk
R4.1
Fix Committed
High
Naveen N
Trunk
Fix Committed
High
Naveen N

Bug Description

Traffic drop around 60 secs observed while restarting agent, when FIP is configured over IP fabric enabled VN. FIP/VM routes are not exported to Gateway from agent for this duration.

Steps
-----
1. Configure a left_vn (say 10.10.10.0/24) and enable IP Fabric forwarding.
2. Launch a VM (say 10.10.10.3/24) on left_vn
3. Configure a public_vn (say 10.204.218.0/24) and enable IP Fabric Forwarding. Configure Floating IP pool on this VN.
4. Create a FIP (say 10.204.218.150/24) from above pool and assign it to VM (10.10.10.3/24)
5. Now, start ping FIP from laptop and it works fine. Now, restart agent and we see ping drops for around 60 secs. These FIP routes are exported to gateway for this duration.

Please see the log below:

root@nodeb9:~# contrail-version
Package Version Build-ID | Repo | Package Name
-------------------------------------- ------------------------------ ----------------------------------
contrail-lib 4.1.0.0-17 17
contrail-nodemgr 4.1.0.0-17 17
contrail-setup 4.1.0.0-17 17
contrail-utils 4.1.0.0-17 17
contrail-vrouter-agent 4.1.0.0-17 17
contrail-vrouter-common 4.1.0.0-17 17
contrail-vrouter-dkms 4.1.0.0-17 17
contrail-vrouter-init 4.1.0.0-17 17
contrail-vrouter-utils 4.1.0.0-17 17
nova-common 2:13.0.0-0ubuntu2~cloud0.1contrail1 17
nova-compute 2:13.0.0-0ubuntu2~cloud0.1contrail1 17
nova-compute-kvm 2:13.0.0-0ubuntu2~cloud0.1contrail1 17
nova-compute-libvirt 2:13.0.0-0ubuntu2~cloud0.1contrail1 17
python-contrail 4.1.0.0-17 17
python-contrail-vrouter-api 4.1.0.0-17 17
python-neutronclient 1:4.1.1-2~cloud0.2contrail 17
python-nova 2:13.0.0-0ubuntu2~cloud0.1contrail1 17
python-opencontrail-vrouter-netns 4.1.0.0-17 17
root@nodeb9:~#
root@nodeb9:~#
root@nodeb9:~# vif --list
Vrouter Interface Table

Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
       Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3, L2=Layer 2
       D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
       Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering Offload, Mon=Interface is Monitored
       Uuf=Unknown Unicast Flood, Vof=VLAN insert/strip offload, Df=Drop New Flows, L=MAC Learning Enabled
       Proxy=MAC Requests Proxied Always, Er=Etree Root

vif0/0 OS: eth0 (Speed 1000, Duplex 1)
            Type:Physical HWaddr:00:25:90:93:d2:52 IPaddr:0.0.0.0
            Vrf:0 Flags:L3L2VpEr QOS:-1 Ref:8
            RX packets:557966 bytes:58536771 errors:0
            TX packets:125433 bytes:119079860 errors:0
            Drops:54

vif0/1 OS: vhost0
            Type:Host HWaddr:00:25:90:93:d2:52 IPaddr:10.204.216.2
            Vrf:0 Flags:L3DEr QOS:-1 Ref:7
            RX packets:124949 bytes:119059448 errors:0
            TX packets:561797 bytes:58693977 errors:0
            Drops:0

vif0/2 OS: pkt0
            Type:Agent HWaddr:00:00:5e:00:01:00 IPaddr:0.0.0.0
            Vrf:65535 Flags:L3Er QOS:-1 Ref:3
            RX packets:16663 bytes:2269326 errors:0
            TX packets:392232 bytes:41385012 errors:0
            Drops:0

vif0/3 OS: tapbd8c0d21-ff
            Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:10.10.10.3
            Vrf:0 Flags:PL3L2DProxyEr QOS:-1 Ref:5
            RX packets:24532 bytes:2427144 errors:0
            TX packets:12335 bytes:1355050 errors:0
            ISID: 0 Bmac: 02:bd:8c:0d:21:ff
            Drops:12262

vif0/4350 OS: pkt3
            Type:Stats HWaddr:00:00:00:00:00:00 IPaddr:0.0.0.0
            Vrf:65535 Flags:L3L2 QOS:0 Ref:1
            RX packets:0 bytes:0 errors:0
            TX packets:0 bytes:0 errors:0
            Drops:0

vif0/4351 OS: pkt1
            Type:Stats HWaddr:00:00:00:00:00:00 IPaddr:0.0.0.0
            Vrf:65535 Flags:L3L2 QOS:0 Ref:1
            RX packets:0 bytes:0 errors:0
            TX packets:0 bytes:0 errors:0
            Drops:0

root@nodeb9:~# flow --get 10.204.218.150
Flow index 10 is not active
root@nodeb9:~#
root@nodeb9:~# flow --match 10.204.218.150
Flow table(size 80609280, entries 629760)

Entries: Created 80 Added 6 Deleted 82 Changed 83 Processed 80 Used Overflow entries 0
(Created Flows/CPU: 5 10 7 8 18 2 3 6 10 1 5 0 0 2 0 3 0 0 0 0 0 0 0 0)(oflows 0)

Action:F=Forward, D=Drop N=NAT(S=SNAT, D=DNAT, Ps=SPAT, Pd=DPAT, L=Link Local Port)
 Other:K(nh)=Key_Nexthop, S(nh)=RPF_Nexthop
 Flags:E=Evicted, Ec=Evict Candidate, N=New Flow, M=Modified Dm=Delete Marked
TCP(r=reverse):S=SYN, F=FIN, R=RST, C=HalfClose, E=Established, D=Dead

Listing flows matching ([10.204.218.150]:*)

    Index Source:Port/Destination:Port Proto(V)
-----------------------------------------------------------------------------------
   266520<=>444048 172.29.241.200:16150 1 (0->0)
                         10.204.218.150:0
(Gen: 1, K(nh):15, Action:N(D), Flags:, QOS:-1, S(nh):14, Stats:31/2604,
 SPort 64284, TTL 0, Sinfo 0.0.0.0)

   500680<=>369940 10.204.216.2:10478 1 (0->0)
                         10.204.218.150:0
(Gen: 1, K(nh):5, Action:N(D), Flags:, QOS:-1, S(nh):14, Stats:4/336,
 SPort 61571, TTL 0, Sinfo 0.0.0.0)

root@nodeb9:~#
root@nodeb9:~# flow --match 10.10.10.3
Flow table(size 80609280, entries 629760)

Entries: Created 80 Added 6 Deleted 82 Changed 83 Processed 80 Used Overflow entries 0
(Created Flows/CPU: 5 10 7 8 18 2 3 6 10 1 5 0 0 2 0 3 0 0 0 0 0 0 0 0)(oflows 0)

Action:F=Forward, D=Drop N=NAT(S=SNAT, D=DNAT, Ps=SPAT, Pd=DPAT, L=Link Local Port)
 Other:K(nh)=Key_Nexthop, S(nh)=RPF_Nexthop
 Flags:E=Evicted, Ec=Evict Candidate, N=New Flow, M=Modified Dm=Delete Marked
TCP(r=reverse):S=SYN, F=FIN, R=RST, C=HalfClose, E=Established, D=Dead

Listing flows matching ([10.10.10.3]:*)

    Index Source:Port/Destination:Port Proto(V)
-----------------------------------------------------------------------------------
   369940<=>500680 10.10.10.3:10478 1 (0->0)
                         10.204.216.2:0
(Gen: 1, K(nh):15, Action:N(S), Flags:, QOS:-1, S(nh):15, Stats:0/0,
 SPort 63749, TTL 0, Sinfo 0.0.0.0)

   444048<=>266520 10.10.10.3:16150 1 (0->0)
                         172.29.241.200:0
(Gen: 1, K(nh):15, Action:N(S), Flags:, QOS:-1, S(nh):15, Stats:39/3822,
 SPort 61139, TTL 0, Sinfo 3.0.0.0)

root@nodeb9:~# vif --list
Vrouter Interface Table

Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
       Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3, L2=Layer 2
       D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
       Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering Offload, Mon=Interface is Monitored
       Uuf=Unknown Unicast Flood, Vof=VLAN insert/strip offload, Df=Drop New Flows, L=MAC Learning Enabled
       Proxy=MAC Requests Proxied Always, Er=Etree Root

vif0/0 OS: eth0 (Speed 1000, Duplex 1)
            Type:Physical HWaddr:00:25:90:93:d2:52 IPaddr:0.0.0.0
            Vrf:0 Flags:L3L2VpEr QOS:-1 Ref:8
            RX packets:559374 bytes:58668510 errors:0
            TX packets:125865 bytes:119395113 errors:0
            Drops:54

vif0/1 OS: vhost0
            Type:Host HWaddr:00:25:90:93:d2:52 IPaddr:10.204.216.2
            Vrf:0 Flags:L3DEr QOS:-1 Ref:7
            RX packets:125331 bytes:119369437 errors:0
            TX packets:563163 bytes:58821152 errors:0
            Drops:4

vif0/2 OS: pkt0
            Type:Agent HWaddr:00:00:5e:00:01:00 IPaddr:0.0.0.0
            Vrf:65535 Flags:L3Er QOS:-1 Ref:3
            RX packets:16698 bytes:2273936 errors:0
            TX packets:393001 bytes:41466184 errors:0
            Drops:0

vif0/3 OS: tapbd8c0d21-ff
            Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:10.10.10.3
            Vrf:0 Flags:PL3L2DProxyEr QOS:-1 Ref:5
            RX packets:24633 bytes:2436938 errors:0
            TX packets:12411 bytes:1362642 errors:0
            ISID: 0 Bmac: 02:bd:8c:0d:21:ff
            Drops:12287

vif0/4350 OS: pkt3
            Type:Stats HWaddr:00:00:00:00:00:00 IPaddr:0.0.0.0
            Vrf:65535 Flags:L3L2 QOS:0 Ref:1
            RX packets:0 bytes:0 errors:0
            TX packets:0 bytes:0 errors:0
            Drops:0

vif0/4351 OS: pkt1
            Type:Stats HWaddr:00:00:00:00:00:00 IPaddr:0.0.0.0
            Vrf:65535 Flags:L3L2 QOS:0 Ref:1
            RX packets:0 bytes:0 errors:0
            TX packets:0 bytes:0 errors:0
            Drops:0

root@nodeb9:~# tcpdump -ne -i tapbd8c0d21-ff icmp
tcpdump: WARNING: tapbd8c0d21-ff: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tapbd8c0d21-ff, link-type EN10MB (Ethernet), capture size 65535 bytes
09:10:07.274693 00:00:5e:00:01:00 > 02:bd:8c:0d:21:ff, ethertype IPv4 (0x0800), length 98: 172.29.241.200 > 10.10.10.3: ICMP echo request, id 16150, seq 57, length 64
09:10:07.274836 02:bd:8c:0d:21:ff > 00:00:5e:00:01:00, ethertype IPv4 (0x0800), length 98: 10.10.10.3 > 172.29.241.200: ICMP echo reply, id 16150, seq 57, length 64
09:10:08.232755 00:00:5e:00:01:00 > 02:bd:8c:0d:21:ff, ethertype IPv4 (0x0800), length 98: 172.29.241.200 > 10.10.10.3: ICMP echo request, id 16150, seq 58, length 64
09:10:08.232946 02:bd:8c:0d:21:ff > 00:00:5e:00:01:00, ethertype IPv4 (0x0800), length 98: 10.10.10.3 > 172.29.241.200: ICMP echo reply, id 16150, seq 58, length 64
09:10:09.236331 00:00:5e:00:01:00 > 02:bd:8c:0d:21:ff, ethertype IPv4 (0x0800), length 98: 172.29.241.200 > 10.10.10.3: ICMP echo request, id 16150, seq 59, length 64
09:10:09.236592 02:bd:8c:0d:21:ff > 00:00:5e:00:01:00, ethertype IPv4 (0x0800), length 98: 10.10.10.3 > 172.29.241.200: ICMP echo reply, id 16150, seq 59, length 64
09:10:10.251259 00:00:5e:00:01:00 > 02:bd:8c:0d:21:ff, ethertype IPv4 (0x0800), length 98: 172.29.241.200 > 10.10.10.3: ICMP echo request, id 16150, seq 60, length 64
09:10:10.251462 02:bd:8c:0d:21:ff > 00:00:5e:00:01:00, ethertype IPv4 (0x0800), length 98: 10.10.10.3 > 172.29.241.200: ICMP echo reply, id 16150, seq 60, length 64
09:10:11.241152 00:00:5e:00:01:00 > 02:bd:8c:0d:21:ff, ethertype IPv4 (0x0800), length 98: 172.29.241.200 > 10.10.10.3: ICMP echo request, id 16150, seq 61, length 64
09:10:11.241353 02:bd:8c:0d:21:ff > 00:00:5e:00:01:00, ethertype IPv4 (0x0800), length 98: 10.10.10.3 > 172.29.241.200: ICMP echo reply, id 16150, seq 61, length 64
09:10:12.255982 00:00:5e:00:01:00 > 02:bd:8c:0d:21:ff, ethertype IPv4 (0x0800), length 98: 172.29.241.200 > 10.10.10.3: ICMP echo request, id 16150, seq 62, length 64
09:10:12.256183 02:bd:8c:0d:21:ff > 00:00:5e:00:01:00, ethertype IPv4 (0x0800), length 98: 10.10.10.3 > 172.29.241.200: ICMP echo reply, id 16150, seq 62, length 64
^C
12 packets captured
12 packets received by filter
0 packets dropped by kernel
root@nodeb9:~#

root@nodeb9:~# tcpdump -n -i eth0 host 10.204.218.150 -vvv -xxx
tcpdump: WARNING: eth0: no IPv4 address assigned
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
09:10:35.324749 IP (tos 0x0, ttl 53, id 55616, offset 0, flags [none], proto ICMP (1), length 84)
    172.29.241.200 > 10.204.218.150: ICMP echo request, id 16150, seq 85, length 64
 0x0000: 0025 9093 d252 80ac acf0 a2c1 0800 4500
 0x0010: 0054 d940 0000 3501 2920 ac1d f1c8 0acc
 0x0020: da96 0800 48b6 3f16 0055 59e5 7dc6 0009
 0x0030: ad26 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637
09:10:35.325077 IP (tos 0x0, ttl 63, id 34691, offset 0, flags [none], proto ICMP (1), length 84)
    10.204.218.150 > 172.29.241.200: ICMP echo reply, id 16150, seq 85, length 64
 0x0000: 80ac acf0 a2c1 0025 9093 d252 0800 4500
 0x0010: 0054 8783 0000 3f01 70dd 0acc da96 ac1d
 0x0020: f1c8 0000 50b6 3f16 0055 59e5 7dc6 0009
 0x0030: ad26 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637
09:10:36.375193 IP (tos 0x0, ttl 53, id 45167, offset 0, flags [none], proto ICMP (1), length 84)
    172.29.241.200 > 10.204.218.150: ICMP echo request, id 16150, seq 86, length 64
 0x0000: 0025 9093 d252 80ac acf0 a2c1 0800 4500
 0x0010: 0054 b06f 0000 3501 51f1 ac1d f1c8 0acc
 0x0020: da96 0800 3ad1 3f16 0056 59e5 7dc7 0009
 0x0030: bb09 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637
09:10:36.375472 IP (tos 0x0, ttl 63, id 34692, offset 0, flags [none], proto ICMP (1), length 84)
    10.204.218.150 > 172.29.241.200: ICMP echo reply, id 16150, seq 86, length 64
 0x0000: 80ac acf0 a2c1 0025 9093 d252 0800 4500
 0x0010: 0054 8784 0000 3f01 70dc 0acc da96 ac1d
 0x0020: f1c8 0000 42d1 3f16 0056 59e5 7dc7 0009
 0x0030: bb09 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637
^C
4 packets captured
7 packets received by filter
0 packets dropped by kernel
root@nodeb9:~# service contrail-vrouter-agent restart
contrail-vrouter-agent: stopped
contrail-vrouter-agent: started
root@nodeb9:~# tcpdump -n -i eth0 host 10.204.218.150 -vvv -xxx
tcpdump: WARNING: eth0: no IPv4 address assigned
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
09:11:47.676496 IP (tos 0x0, ttl 53, id 8551, offset 0, flags [none], proto ICMP (1), length 84)
    172.29.241.200 > 10.204.218.150: ICMP echo request, id 16150, seq 157, length 64
 0x0000: 0025 9093 d252 80ac acf0 a2c1 0800 4500
 0x0010: 0054 2167 0000 3501 e0f9 ac1d f1c8 0acc
 0x0020: da96 0800 c4f6 3f16 009d 59e5 7e0e 000c
 0x0030: 3053 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637
09:11:47.678066 IP (tos 0x0, ttl 63, id 34701, offset 0, flags [none], proto ICMP (1), length 84)
    10.204.218.150 > 172.29.241.200: ICMP echo reply, id 16150, seq 157, length 64
 0x0000: 80ac acf0 a2c1 0025 9093 d252 0800 4500
 0x0010: 0054 878d 0000 3f01 70d3 0acc da96 ac1d
 0x0020: f1c8 0000 ccf6 3f16 009d 59e5 7e0e 000c
 0x0030: 3053 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637
09:11:48.465618 IP (tos 0x0, ttl 53, id 51159, offset 0, flags [none], proto ICMP (1), length 84)
    172.29.241.200 > 10.204.218.150: ICMP echo request, id 16150, seq 158, length 64
 0x0000: 0025 9093 d252 80ac acf0 a2c1 0800 4500
 0x0010: 0054 c7d7 0000 3501 3a89 ac1d f1c8 0acc
 0x0020: da96 0800 b0c8 3f16 009e 59e5 7e0f 000c
 0x0030: 447f 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637
09:11:48.465910 IP (tos 0x0, ttl 63, id 34702, offset 0, flags [none], proto ICMP (1), length 84)
    10.204.218.150 > 172.29.241.200: ICMP echo reply, id 16150, seq 158, length 64
 0x0000: 80ac acf0 a2c1 0025 9093 d252 0800 4500
 0x0010: 0054 878e 0000 3f01 70d2 0acc da96 ac1d
 0x0020: f1c8 0000 b8c8 3f16 009e 59e5 7e0f 000c
 0x0030: 447f 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637
09:11:49.507458 IP (tos 0x0, ttl 53, id 44444, offset 0, flags [none], proto ICMP (1), length 84)
    172.29.241.200 > 10.204.218.150: ICMP echo request, id 16150, seq 159, length 64
 0x0000: 0025 9093 d252 80ac acf0 a2c1 0800 4500
 0x0010: 0054 ad9c 0000 3501 54c4 ac1d f1c8 0acc
 0x0020: da96 0800 acdc 3f16 009f 59e5 7e10 000c
 0x0030: 4869 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637
09:11:49.507733 IP (tos 0x0, ttl 63, id 34703, offset 0, flags [none], proto ICMP (1), length 84)
    10.204.218.150 > 172.29.241.200: ICMP echo reply, id 16150, seq 159, length 64
 0x0000: 80ac acf0 a2c1 0025 9093 d252 0800 4500
 0x0010: 0054 878f 0000 3f01 70d1 0acc da96 ac1d
 0x0020: f1c8 0000 b4dc 3f16 009f 59e5 7e10 000c
 0x0030: 4869 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637
09:11:50.468770 IP (tos 0x0, ttl 53, id 47, offset 0, flags [none], proto ICMP (1), length 84)
    172.29.241.200 > 10.204.218.150: ICMP echo request, id 16150, seq 160, length 64
 0x0000: 0025 9093 d252 80ac acf0 a2c1 0800 4500
 0x0010: 0054 002f 0000 3501 0232 ac1d f1c8 0acc
 0x0020: da96 0800 a391 3f16 00a0 59e5 7e11 000c
 0x0030: 51b2 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637
09:11:50.469076 IP (tos 0x0, ttl 63, id 34704, offset 0, flags [none], proto ICMP (1), length 84)
    10.204.218.150 > 172.29.241.200: ICMP echo reply, id 16150, seq 160, length 64
 0x0000: 80ac acf0 a2c1 0025 9093 d252 0800 4500
 0x0010: 0054 8790 0000 3f01 70d0 0acc da96 ac1d
 0x0020: f1c8 0000 ab91 3f16 00a0 59e5 7e11 000c
 0x0030: 51b2 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637
09:11:51.472414 IP (tos 0x0, ttl 53, id 22273, offset 0, flags [none], proto ICMP (1), length 84)
    172.29.241.200 > 10.204.218.150: ICMP echo request, id 16150, seq 161, length 64
 0x0000: 0025 9093 d252 80ac acf0 a2c1 0800 4500
 0x0010: 0054 5701 0000 3501 ab5f ac1d f1c8 0acc
 0x0020: da96 0800 9320 3f16 00a1 59e5 7e12 000c
 0x0030: 6221 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637
09:11:51.472705 IP (tos 0x0, ttl 63, id 34705, offset 0, flags [none], proto ICMP (1), length 84)
    10.204.218.150 > 172.29.241.200: ICMP echo reply, id 16150, seq 161, length 64
 0x0000: 80ac acf0 a2c1 0025 9093 d252 0800 4500
 0x0010: 0054 8791 0000 3f01 70cf 0acc da96 ac1d
 0x0020: f1c8 0000 9b20 3f16 00a1 59e5 7e12 000c
 0x0030: 6221 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637
09:11:52.489016 IP (tos 0x0, ttl 53, id 52498, offset 0, flags [none], proto ICMP (1), length 84)
    172.29.241.200 > 10.204.218.150: ICMP echo request, id 16150, seq 162, length 64
 0x0000: 0025 9093 d252 80ac acf0 a2c1 0800 4500
 0x0010: 0054 cd12 0000 3501 354e ac1d f1c8 0acc
 0x0020: da96 0800 8f2e 3f16 00a2 59e5 7e13 000c
 0x0030: 6611 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637
09:11:52.489278 IP (tos 0x0, ttl 63, id 34706, offset 0, flags [none], proto ICMP (1), length 84)
    10.204.218.150 > 172.29.241.200: ICMP echo reply, id 16150, seq 162, length 64
 0x0000: 80ac acf0 a2c1 0025 9093 d252 0800 4500
 0x0010: 0054 8792 0000 3f01 70ce 0acc da96 ac1d
 0x0020: f1c8 0000 972e 3f16 00a2 59e5 7e13 000c
 0x0030: 6611 0809 0a0b 0c0d 0e0f 1011 1213 1415
 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425
 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435
 0x0060: 3637

From Laptop
-----------
[09:12:31][cmallam-mbp15:~]$ping 10.204.218.150
PING 10.204.218.150 (10.204.218.150): 56 data bytes
64 bytes from 10.204.218.150: icmp_seq=0 ttl=52 time=280.191 ms
64 bytes from 10.204.218.150: icmp_seq=1 ttl=52 time=916.196 ms
64 bytes from 10.204.218.150: icmp_seq=2 ttl=52 time=33.079 ms
64 bytes from 10.204.218.150: icmp_seq=3 ttl=52 time=48.769 ms
64 bytes from 10.204.218.150: icmp_seq=4 ttl=52 time=46.977 ms
64 bytes from 10.204.218.150: icmp_seq=5 ttl=52 time=42.423 ms
64 bytes from 10.204.218.150: icmp_seq=6 ttl=52 time=70.979 ms
64 bytes from 10.204.218.150: icmp_seq=7 ttl=52 time=103.867 ms
64 bytes from 10.204.218.150: icmp_seq=8 ttl=52 time=153.381 ms
64 bytes from 10.204.218.150: icmp_seq=9 ttl=52 time=205.102 ms
64 bytes from 10.204.218.150: icmp_seq=10 ttl=52 time=239.794 ms
64 bytes from 10.204.218.150: icmp_seq=11 ttl=52 time=279.668 ms
64 bytes from 10.204.218.150: icmp_seq=12 ttl=52 time=302.924 ms
64 bytes from 10.204.218.150: icmp_seq=13 ttl=52 time=351.414 ms
64 bytes from 10.204.218.150: icmp_seq=14 ttl=52 time=31.206 ms
64 bytes from 10.204.218.150: icmp_seq=15 ttl=52 time=77.900 ms
64 bytes from 10.204.218.150: icmp_seq=16 ttl=52 time=59.221 ms
64 bytes from 10.204.218.150: icmp_seq=17 ttl=52 time=41.579 ms
64 bytes from 10.204.218.150: icmp_seq=18 ttl=52 time=91.136 ms
64 bytes from 10.204.218.150: icmp_seq=19 ttl=52 time=152.504 ms
64 bytes from 10.204.218.150: icmp_seq=20 ttl=52 time=183.160 ms
64 bytes from 10.204.218.150: icmp_seq=21 ttl=52 time=236.258 ms
64 bytes from 10.204.218.150: icmp_seq=22 ttl=52 time=346.197 ms
64 bytes from 10.204.218.150: icmp_seq=23 ttl=52 time=880.917 ms
64 bytes from 10.204.218.150: icmp_seq=24 ttl=52 time=392.711 ms
64 bytes from 10.204.218.150: icmp_seq=25 ttl=52 time=35.180 ms
64 bytes from 10.204.218.150: icmp_seq=26 ttl=52 time=38.945 ms
64 bytes from 10.204.218.150: icmp_seq=27 ttl=52 time=45.312 ms
64 bytes from 10.204.218.150: icmp_seq=28 ttl=52 time=63.732 ms
64 bytes from 10.204.218.150: icmp_seq=29 ttl=52 time=81.984 ms
64 bytes from 10.204.218.150: icmp_seq=30 ttl=52 time=131.191 ms
64 bytes from 10.204.218.150: icmp_seq=31 ttl=52 time=183.899 ms
64 bytes from 10.204.218.150: icmp_seq=32 ttl=52 time=218.115 ms
64 bytes from 10.204.218.150: icmp_seq=33 ttl=52 time=280.813 ms
64 bytes from 10.204.218.150: icmp_seq=34 ttl=52 time=280.934 ms
64 bytes from 10.204.218.150: icmp_seq=35 ttl=52 time=425.663 ms
64 bytes from 10.204.218.150: icmp_seq=36 ttl=52 time=33.195 ms
64 bytes from 10.204.218.150: icmp_seq=37 ttl=52 time=32.645 ms
64 bytes from 10.204.218.150: icmp_seq=38 ttl=52 time=43.232 ms
64 bytes from 10.204.218.150: icmp_seq=39 ttl=52 time=32.959 ms
64 bytes from 10.204.218.150: icmp_seq=40 ttl=52 time=64.440 ms
64 bytes from 10.204.218.150: icmp_seq=41 ttl=52 time=112.570 ms
64 bytes from 10.204.218.150: icmp_seq=42 ttl=52 time=164.157 ms
64 bytes from 10.204.218.150: icmp_seq=43 ttl=52 time=221.185 ms
64 bytes from 10.204.218.150: icmp_seq=44 ttl=52 time=232.224 ms
64 bytes from 10.204.218.150: icmp_seq=45 ttl=52 time=341.741 ms
64 bytes from 10.204.218.150: icmp_seq=46 ttl=52 time=360.319 ms
64 bytes from 10.204.218.150: icmp_seq=47 ttl=52 time=37.770 ms
64 bytes from 10.204.218.150: icmp_seq=48 ttl=52 time=33.738 ms
64 bytes from 10.204.218.150: icmp_seq=49 ttl=52 time=32.633 ms
64 bytes from 10.204.218.150: icmp_seq=50 ttl=52 time=34.650 ms
64 bytes from 10.204.218.150: icmp_seq=51 ttl=52 time=56.617 ms
64 bytes from 10.204.218.150: icmp_seq=52 ttl=52 time=121.935 ms
64 bytes from 10.204.218.150: icmp_seq=53 ttl=52 time=152.868 ms
64 bytes from 10.204.218.150: icmp_seq=54 ttl=52 time=202.612 ms
64 bytes from 10.204.218.150: icmp_seq=55 ttl=52 time=253.262 ms
64 bytes from 10.204.218.150: icmp_seq=56 ttl=52 time=265.513 ms
64 bytes from 10.204.218.150: icmp_seq=57 ttl=52 time=408.326 ms
64 bytes from 10.204.218.150: icmp_seq=58 ttl=52 time=33.871 ms
64 bytes from 10.204.218.150: icmp_seq=59 ttl=52 time=32.294 ms
64 bytes from 10.204.218.150: icmp_seq=60 ttl=52 time=42.649 ms
64 bytes from 10.204.218.150: icmp_seq=61 ttl=52 time=37.930 ms
64 bytes from 10.204.218.150: icmp_seq=62 ttl=52 time=40.703 ms
64 bytes from 10.204.218.150: icmp_seq=63 ttl=52 time=98.011 ms
64 bytes from 10.204.218.150: icmp_seq=64 ttl=52 time=151.596 ms
64 bytes from 10.204.218.150: icmp_seq=65 ttl=52 time=187.307 ms
64 bytes from 10.204.218.150: icmp_seq=66 ttl=52 time=229.384 ms
64 bytes from 10.204.218.150: icmp_seq=67 ttl=52 time=314.055 ms
64 bytes from 10.204.218.150: icmp_seq=68 ttl=52 time=296.702 ms
64 bytes from 10.204.218.150: icmp_seq=69 ttl=52 time=338.933 ms
64 bytes from 10.204.218.150: icmp_seq=70 ttl=52 time=32.957 ms
64 bytes from 10.204.218.150: icmp_seq=71 ttl=52 time=52.996 ms
64 bytes from 10.204.218.150: icmp_seq=72 ttl=52 time=50.224 ms
64 bytes from 10.204.218.150: icmp_seq=73 ttl=52 time=141.479 ms
64 bytes from 10.204.218.150: icmp_seq=74 ttl=52 time=105.467 ms
64 bytes from 10.204.218.150: icmp_seq=75 ttl=52 time=133.183 ms
64 bytes from 10.204.218.150: icmp_seq=76 ttl=52 time=181.216 ms
64 bytes from 10.204.218.150: icmp_seq=77 ttl=52 time=218.519 ms
64 bytes from 10.204.218.150: icmp_seq=78 ttl=52 time=236.816 ms
Request timeout for icmp_seq 79
64 bytes from 10.204.218.150: icmp_seq=79 ttl=52 time=1004.916 ms
64 bytes from 10.204.218.150: icmp_seq=80 ttl=52 time=394.035 ms
64 bytes from 10.204.218.150: icmp_seq=81 ttl=52 time=31.822 ms
64 bytes from 10.204.218.150: icmp_seq=82 ttl=52 time=30.198 ms
64 bytes from 10.204.218.150: icmp_seq=83 ttl=52 time=35.038 ms
64 bytes from 10.204.218.150: icmp_seq=84 ttl=52 time=35.065 ms
64 bytes from 10.204.218.150: icmp_seq=85 ttl=52 time=72.133 ms
64 bytes from 10.204.218.150: icmp_seq=86 ttl=52 time=107.423 ms
64 bytes from 10.204.218.150: icmp_seq=87 ttl=52 time=151.508 ms
64 bytes from 10.204.218.150: icmp_seq=88 ttl=52 time=203.554 ms
64 bytes from 10.204.218.150: icmp_seq=89 ttl=52 time=241.081 ms
64 bytes from 10.204.218.150: icmp_seq=90 ttl=52 time=295.070 ms
64 bytes from 10.204.218.150: icmp_seq=91 ttl=52 time=324.991 ms
64 bytes from 10.204.218.150: icmp_seq=92 ttl=52 time=403.198 ms
64 bytes from 10.204.218.150: icmp_seq=93 ttl=52 time=31.929 ms
64 bytes from 10.204.218.150: icmp_seq=94 ttl=52 time=48.974 ms
Request timeout for icmp_seq 96
Request timeout for icmp_seq 97
Request timeout for icmp_seq 98
Request timeout for icmp_seq 99
Request timeout for icmp_seq 100
Request timeout for icmp_seq 101
Request timeout for icmp_seq 102
Request timeout for icmp_seq 103
Request timeout for icmp_seq 104
Request timeout for icmp_seq 105
Request timeout for icmp_seq 106
Request timeout for icmp_seq 107
Request timeout for icmp_seq 108
Request timeout for icmp_seq 109
Request timeout for icmp_seq 110
Request timeout for icmp_seq 111
Request timeout for icmp_seq 112
Request timeout for icmp_seq 113
Request timeout for icmp_seq 114
Request timeout for icmp_seq 115
Request timeout for icmp_seq 116
Request timeout for icmp_seq 117
Request timeout for icmp_seq 118
Request timeout for icmp_seq 119
Request timeout for icmp_seq 120
Request timeout for icmp_seq 121
Request timeout for icmp_seq 122
Request timeout for icmp_seq 123
Request timeout for icmp_seq 124
Request timeout for icmp_seq 125
Request timeout for icmp_seq 126
Request timeout for icmp_seq 127
Request timeout for icmp_seq 128
Request timeout for icmp_seq 129
Request timeout for icmp_seq 130
Request timeout for icmp_seq 131
Request timeout for icmp_seq 132
Request timeout for icmp_seq 133
Request timeout for icmp_seq 134
Request timeout for icmp_seq 135
Request timeout for icmp_seq 136
Request timeout for icmp_seq 137
Request timeout for icmp_seq 138
Request timeout for icmp_seq 139
Request timeout for icmp_seq 140
Request timeout for icmp_seq 141
Request timeout for icmp_seq 142
Request timeout for icmp_seq 143
Request timeout for icmp_seq 144
Request timeout for icmp_seq 145
Request timeout for icmp_seq 146
Request timeout for icmp_seq 147
Request timeout for icmp_seq 148
Request timeout for icmp_seq 149
Request timeout for icmp_seq 150
Request timeout for icmp_seq 151
Request timeout for icmp_seq 152
Request timeout for icmp_seq 153
Request timeout for icmp_seq 154
Request timeout for icmp_seq 155
Request timeout for icmp_seq 156
64 bytes from 10.204.218.150: icmp_seq=157 ttl=52 time=250.932 ms
64 bytes from 10.204.218.150: icmp_seq=158 ttl=52 time=355.993 ms
64 bytes from 10.204.218.150: icmp_seq=159 ttl=52 time=361.403 ms
64 bytes from 10.204.218.150: icmp_seq=160 ttl=52 time=383.237 ms

Gateway
-------
root@sw166> show route receive-protocol bgp 10.204.217.127

inet.0: 84 destinations, 84 routes (81 active, 0 holddown, 3 hidden)
  Prefix Nexthop MED Lclpref AS path
* 10.10.10.3/32 10.204.216.2 200 100 ?
* 10.204.218.150/32 10.204.216.2 100 200 ?
* 10.204.218.151/32 10.204.216.231 200 100 ?

{master:0}
root@sw166> show route receive-protocol bgp 10.204.217.127

inet.0: 81 destinations, 81 routes (79 active, 0 holddown, 2 hidden)
  Prefix Nexthop MED Lclpref AS path
* 10.204.218.151/32 10.204.216.231 200 100 ?

{master:0}
root@sw166>

{master:0}
root@sw166> show route receive-protocol bgp 10.204.217.127

inet.0: 81 destinations, 81 routes (79 active, 0 holddown, 2 hidden)
  Prefix Nexthop MED Lclpref AS path
* 10.204.218.151/32 10.204.216.231 200 100 ?

{master:0}
root@sw166> show system uptime
fpc0:
--------------------------------------------------------------------------
Current time: 2017-10-17 03:49:54 UTC
System booted: 2017-07-07 09:13:16 UTC (14w3d 18:36 ago)
Protocols started: 2017-09-14 17:09:44 UTC (4w4d 10:40 ago)
Last configured: 2017-09-22 11:41:45 UTC (3w3d 16:08 ago) by root
 3:49AM up 101 days, 18:37, 1 user, load averages: 0.07, 0.16, 0.12

fpc1:
--------------------------------------------------------------------------
Current time: 2017-10-17 03:49:54 UTC
System booted: 2017-07-07 09:50:35 UTC (14w3d 17:59 ago)
Last configured: 2017-09-22 11:41:41 UTC (3w3d 16:08 ago) by root
 3:49AM up 101 days, 17:59, 0 users, load averages: 0.03, 0.04, 0.00

{master:0}
root@sw166> show route receive-protocol bgp 10.204.217.127

inet.0: 81 destinations, 81 routes (79 active, 0 holddown, 2 hidden)
  Prefix Nexthop MED Lclpref AS path
* 10.204.218.151/32 10.204.216.231 200 100 ?

{master:0}
root@sw166>

root@sw166> show route receive-protocol bgp 10.204.217.127

inet.0: 84 destinations, 84 routes (81 active, 0 holddown, 3 hidden)
  Prefix Nexthop MED Lclpref AS path
* 10.10.10.3/32 10.204.216.2 200 100 ?
* 10.204.218.150/32 10.204.216.2 200 100 ?
* 10.204.218.151/32 10.204.216.231 200 100 ?

{master:0}
root@sw166> show system uptime
fpc0:
--------------------------------------------------------------------------
Current time: 2017-10-17 03:50:46 UTC
System booted: 2017-07-07 09:13:16 UTC (14w3d 18:37 ago)
Protocols started: 2017-09-14 17:09:44 UTC (4w4d 10:41 ago)
Last configured: 2017-09-22 11:41:45 UTC (3w3d 16:09 ago) by root
 3:50AM up 101 days, 18:38, 1 user, load averages: 0.03, 0.13, 0.10

fpc1:
--------------------------------------------------------------------------
Current time: 2017-10-17 03:50:47 UTC
System booted: 2017-07-07 09:50:35 UTC (14w3d 18:00 ago)
Last configured: 2017-09-22 11:41:41 UTC (3w3d 16:09 ago) by root
 3:50AM up 101 days, 18 hrs, 0 users, load averages: 0.18, 0.07, 0.01

{master:0}
root@sw166>

Tags: vrouter
Revision history for this message
OpenContrail Admin (ci-admin-f) wrote : [Review update] master

Review in progress for https://review.opencontrail.org/36723
Submitter: Naveen N (<email address hidden>)

Revision history for this message
OpenContrail Admin (ci-admin-f) wrote : [Review update] R4.1

Review in progress for https://review.opencontrail.org/36754
Submitter: Naveen N (<email address hidden>)

Revision history for this message
OpenContrail Admin (ci-admin-f) wrote : A change has been merged

Reviewed: https://review.opencontrail.org/36754
Committed: http://github.com/Juniper/contrail-controller/commit/5d4dfc999b882ed6b813901d604f570b9d7e54a8
Submitter: Zuul (<email address hidden>)
Branch: R4.1

commit 5d4dfc999b882ed6b813901d604f570b9d7e54a8
Author: Naveen N <email address hidden>
Date: Mon Oct 23 16:19:04 2017 +0530

* Notify VRF entry upon IFMap node change.

ip-fabric:__default__ VRF is created before connection to control-node
is up, once control-node connection comes up routes are not published
to control-node till 60s, this is because config addition of VRF entry doesnt
trigger any VRF change notification. VRF notify is triggered in Resync
walk and VRF subsribe is sent. Hence generate notify for VRF upon
vrf ifmap node change.

Change-Id: If327da12a5c390cd0b757b547961a6df6fb1bf11
Closes-bug: #1724133

Revision history for this message
OpenContrail Admin (ci-admin-f) wrote :

Reviewed: https://review.opencontrail.org/36723
Committed: http://github.com/Juniper/contrail-controller/commit/378de05b6aa4deb4367f430938e01909adf15a09
Submitter: Zuul (<email address hidden>)
Branch: master

commit 378de05b6aa4deb4367f430938e01909adf15a09
Author: Naveen N <email address hidden>
Date: Mon Oct 23 16:19:04 2017 +0530

* Notify VRF entry upon IFMap node change.

ip-fabric:__default__ VRF is created before connection to control-node
is up, once control-node connection comes up routes are not published
to control-node till 60s, this is because config addition of VRF entry doesnt
trigger any VRF change notification. VRF notify is triggered in Resync
walk and VRF subsribe is sent. Hence generate notify for VRF upon
vrf ifmap node change.

Change-Id: If327da12a5c390cd0b757b547961a6df6fb1bf11
Closes-bug: #1724133

Nischal Sheth (nsheth)
information type: Proprietary → Public
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.