TCP Connections failing on single node contrail with bond interface

Bug #1395255 reported by Vinod Nair
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Juniper Openstack
Incomplete
Undecided
Vinod Nair
R2.0
Incomplete
Undecided
Vinod Nair

Bug Description

On a Single node contrail with bond interface for data , tcp connections are failing as the SYN-ACK is not making it back to the client

A VM is spawned on A Single node contrail with bond interface. and FIP is allocated to it.

Pings to the FIP are ok but on initiating SSH to the VM, the SYN-ACK is not reaching the client.

Without Bond interface , there is no issue

Version :

contrail-vrouter-agent 1.21-73 73

On Client :
12:13:26.146151 IP 10.87.132.150 > 10.87.125.2: ICMP echo request, id 12448, seq 1, length 64
12:13:26.148308 IP 10.87.125.2 > 10.87.132.150: ICMP echo reply, id 12448, seq 1, length 64
12:13:27.147469 IP 10.87.132.150 > 10.87.125.2: ICMP echo request, id 12448, seq 2, length 64
12:13:27.148110 IP 10.87.125.2 > 10.87.132.150: ICMP echo reply, id 12448, seq 2, length 64
12:13:42.579518 IP 10.87.132.150 > 10.87.125.2: ICMP echo request, id 12449, seq 1, length 64
12:13:42.581219 IP 10.87.125.2 > 10.87.132.150: ICMP echo reply, id 12449, seq 1, length 64
12:13:43.581437 IP 10.87.132.150 > 10.87.125.2: ICMP echo request, id 12449, seq 2, length 64
12:13:43.582154 IP 10.87.125.2 > 10.87.132.150: ICMP echo reply, id 12449, seq 2, length 64

12:13:59.725617 IP 10.87.132.150.50203 > 10.87.125.2.ssh: Flags [S], seq 3189576819, win 14600, options [mss 1460,sackOK,TS val 1132614452 ecr 0,nop,wscale 7], length 0
12:14:00.727143 IP 10.87.132.150.50203 > 10.87.125.2.ssh: Flags [S], seq 3189576819, win 14600, options [mss 1460,sackOK,TS val 1132615454 ecr 0,nop,wscale 7], length 0
12:14:02.729125 IP 10.87.132.150.50203 > 10.87.125.2.ssh: Flags [S], seq 3189576819, win 14600, options [mss 1460,sackOK,TS val 1132617456 ecr 0,nop,wscale 7], length 0
12:14:06.737130 IP 10.87.132.150.50203 > 10.87.125.2.ssh: Flags [S], seq 3189576819, win 14600, options [mss 1460,sackOK,TS val 1132621464 ecr 0,nop,wscale 7], length 0
12:14:14.745095 IP 10.87.132.150.50203 > 10.87.125.2.ssh: Flags [S], seq 3189576819, win 14600, options [mss 1460,sackOK,TS val 1132629472 ecr 0,nop,wscale 7], length 0

On VM

cpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
04:23:34.904313 IP 10.87.132.150 > 192.168.9.2: ICMP echo request, id 12448, seq 2, length 64
04:23:34.904343 IP 192.168.9.2 > 10.87.132.150: ICMP echo reply, id 12448, seq 2, length 64
04:23:50.337928 IP 10.87.132.150 > 192.168.9.2: ICMP echo request, id 12449, seq 1, length 64
04:23:50.337959 IP 192.168.9.2 > 10.87.132.150: ICMP echo reply, id 12449, seq 1, length 64
04:23:51.338906 IP 10.87.132.150 > 192.168.9.2: ICMP echo request, id 12449, seq 2, length 64
04:23:51.338955 IP 192.168.9.2 > 10.87.132.150: ICMP echo reply, id 12449, seq 2, length 64

04:24:07.484751 IP 10.87.132.150.50203 > 192.168.9.2.ssh: Flags [S], seq 3189576819, win 14600, options [mss 1420,sackOK,TS val 1132614452 ecr 0,nop,wscale 7], length 0
04:24:07.484972 IP 192.168.9.2.ssh > 10.87.132.150.50203: Flags [S.], seq 3034207206, ack 3189576820, win 11480, options [mss 1160,sackOK,TS val 215383 ecr 1132614452,nop,wscale 7], length 0
04:24:08.483934 IP 192.168.9.2.ssh > 10.87.132.150.50203: Flags [S.], seq 3034207206, ack 3189576820, win 11480, options [mss 1160,sackOK,TS val 215633 ecr 1132614452,nop,wscale 7], length 0
04:24:08.485067 IP 10.87.132.150.50203 > 192.168.9.2.ssh: Flags [S], seq 3189576819, win 14600, options [mss 1420,sackOK,TS val 1132615454 ecr 0,nop,wscale 7], length 0
04:24:08.485103 IP 192.168.9.2.ssh > 10.87.132.150.50203: Flags [S.], seq 3034207206, ack 3189576820, win 11480, options [mss 1160,sackOK,TS val 215633 ecr 1132614452,nop,wscale 7], length 0
04:24:10.483952 IP 192.168.9.2.ssh > 10.87.132.150.50203: Flags [S.], seq 3034207206, ack 3189576820, win 11480, options [mss 1160,sackOK,TS val 216133 ecr 1132614452,nop,wscale 7], length 0
04:24:10.487100 IP 10.87.132.150.50203 > 192.168.9.2.ssh: Flags [S], seq 3189576819, win 14600, options [mss 1420,sackOK,TS val 1132617456 ecr 0,nop,wscale 7], length 0
04:24:10.487128 IP 192.168.9.2.ssh > 10.87.132.150.50203: Flags [S.], seq 3034207206, ack 3189576820, win 11480, options [mss 1160,sackOK,TS val 216133 ecr 1132614452,nop,wscale 7], length 0

There are no drops in drop stats
dropstats | grep -v " 0$"
root@asmlc-ubuntu:~# dropstats | grep -v " 0$"

Flow Unusable 3
Flow Action Drop 1

Cloned Original 6

Fragment errors 11

root@asmlc-ubuntu:~# dropstats | grep -v " 0$"

Flow Unusable 3
Flow Action Drop 1

Cloned Original 6

Fragment errors 11

Tags: vrouter
Vinod Nair (vinodnair)
Changed in juniperopenstack:
milestone: none → r2.0-fcs
Changed in juniperopenstack:
milestone: r2.0-fcs → none
tags: added: vrouter
Changed in juniperopenstack:
assignee: nobody → Anand H. Krishnan (anandhk)
information type: Proprietary → Public
Revision history for this message
Anand H. Krishnan (anandhk) wrote :

Can you please share your setup?

Changed in juniperopenstack:
status: New → Incomplete
Changed in juniperopenstack:
assignee: Anand H. Krishnan (anandhk) → Vinod Nair (vinodnair)
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.