replay tcp request interval too long

Bug #1033431 reported by xuezhang wu
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
MOVED - Percona Playback
New
Undecided
Unassigned

Bug Description

tcpdump -nn -i bond0 -s0 'tcp dst port 3306' -w source.pcap
#dump from server A
/usr/local/bin/percona-playback --input-plugin=tcpdump --db-plugin=libdrizzle --libdrizzle-host=172.24.xx.B --libdrizzle-username=uxx --libdrizzle-password=uxx --libdrizzle-schema=tc_xxxxx --libdrizzle-port=3306 --tcpdump-mode=fast --tcpdump-file=/u01/bak/source.pcap
#playback from Server A to Server B

tcpdump detail from A #tcpdump -nn -i bond0 -s0 'tcp dst port 3306'

11:16:30.504579 IP 10.246.154.100.46786 > 172.24xx.3306: P 7459:8437(978) ack 2335 win 5287 <nop,nop,timestamp 2309842907 736062993>
11:16:30.504695 IP 172.23.110.155.22291 > 172.24xx.3306: . ack 360211 win 8960 <nop,nop,timestamp 1849026559 736062993>
11:16:30.504714 IP 10.246.154.100.46803 > 172.24xx.3306: P 6887:6996(109) ack 2198 win 5601 <nop,nop,timestamp 2309842907 736062993>
11:16:30.504724 IP 172.24.64.169.25302 > 172.23.xx.3306: . ack 351086 win 24576 <nop,nop,timestamp 736062994 1849026559>
11:16:30.504949 IP 172.24.64.169.25302 > 172.23.xx.3306: . ack 351906 win 24576 <nop,nop,timestamp 736062994 1849026560>
11:16:30.505082 IP 172.23.201.55.35925 > 172.24.xx3306: P 31165:31313(148) ack 10667 win 5422 <nop,nop,timestamp 3676745182 736062984>
11:16:30.505222 IP 172.24.65.129.23665 > 172.24.xx3306: . ack 361547 win 9842 <nop,nop,timestamp 906201430 736062994>
11:16:30.505396 IP 172.23.110.155.22291 > 172.24xx.3306: . ack 361547 win 8960 <nop,nop,timestamp 1849026560 736062994>

tcpdump detail from B # tcpdump -nn -i bond0 -s0 'tcp dst port 3306'

11:16:13.735420 IP 172.24.64.21.34775 > 172.24.xxxx.3306: Flags [P.], seq 8760:8798, ack 1024, win 115, options [nop,nop,TS val 337733421 ecr 2215905344], length 38
11:16:13.735570 IP 172.24.64.21.34775 > 172.24.xxxx.3306: Flags [.], ack 1102, win 115, options [nop,nop,TS val 337733421 ecr 2215905427], length 0
11:16:13.741564 IP 172.24.64.21.34786 > 172.24.xxxx.3306: Flags [P.], seq 2422:3418, ack 484, win 115, options [nop,nop,TS val 337733427 ecr 2215905348], length 996
11:16:13.742000 IP 172.24.64.21.34786 > 172.24.xxxx.3306: Flags [.], ack 498, win 115, options [nop,nop,TS val 337733427 ecr 2215905433], length 0
11:16:13.819855 IP 172.24.64.21.34776 > 172.24.xxxx.3306: Flags [P.], seq 11819:13268, ack 4512, win 115, options [nop,nop,TS val 337733505 ecr 2215905423], length 1449
11:16:13.820146 IP 172.24.64.21.34776 > 172.24.xxxx.3306: Flags [.], ack 4672, win 123, options [nop,nop,TS val 337733505 ecr 2215905512], length 0
11:16:13.828001 IP 172.24.64.21.34786 > 172.24.xxxx.3306: Flags [P.], seq 3418:3456, ack 498, win 115, options [nop,nop,TS val 337733513 ecr 2215905433], length 38
11:16:13.828154 IP 172.24.64.21.34786 > 172.24.xxxx.3306: Flags [.], ack 576, win 115, options [nop,nop,TS val 337733513 ecr 2215905520], length 0
11:16:13.830079 IP 172.24.64.21.34775 > 172.24.xxxx.3306: Flags [P.], seq 8798:8954, ack 1102, win 115, options [nop,nop,TS val 337733515 ecr 2215905427], length 156
11:16:13.830346 IP 172.24.64.21.34775 > 172.24.xxxx.3306: Flags [.], ack 1165, win 115, options [nop,nop,TS val 337733516 ecr 2215905522], length 0
11:16:13.925822 IP 172.24.64.21.34775 > 172.24.xxxx.3306: Flags [P.], seq 8954:9931, ack 1165, win 115, options [nop,nop,TS val 337733611 ecr 2215905522], length 977
11:16:13.926247 IP 172.24.64.21.34775 > 172.24.xxxx.3306: Flags [.], ack 1179, win 115, options [nop,nop,TS val 337733612 ecr 2215905618], length 0

#sudo tcpdump -nn -i bond0 -s0 'tcp port 3306' -w pk.pcap
Analysis the pcap,we found two repuest interval to be mush long than the source pcap

Revision history for this message
xuezhang wu (rezic7) wrote :
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Bug attachments

Remote bug watches

Bug watches keep track of this bug in other bug trackers.