replay tcp request interval too long
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
MOVED - Percona Playback |
New
|
Undecided
|
Unassigned |
Bug Description
tcpdump -nn -i bond0 -s0 'tcp dst port 3306' -w source.pcap
#dump from server A
/usr/local/
#playback from Server A to Server B
tcpdump detail from A #tcpdump -nn -i bond0 -s0 'tcp dst port 3306'
11:16:30.504579 IP 10.246.
11:16:30.504695 IP 172.23.
11:16:30.504714 IP 10.246.
11:16:30.504724 IP 172.24.64.169.25302 > 172.23.xx.3306: . ack 351086 win 24576 <nop,nop,timestamp 736062994 1849026559>
11:16:30.504949 IP 172.24.64.169.25302 > 172.23.xx.3306: . ack 351906 win 24576 <nop,nop,timestamp 736062994 1849026560>
11:16:30.505082 IP 172.23.201.55.35925 > 172.24.xx3306: P 31165:31313(148) ack 10667 win 5422 <nop,nop,timestamp 3676745182 736062984>
11:16:30.505222 IP 172.24.65.129.23665 > 172.24.xx3306: . ack 361547 win 9842 <nop,nop,timestamp 906201430 736062994>
11:16:30.505396 IP 172.23.
tcpdump detail from B # tcpdump -nn -i bond0 -s0 'tcp dst port 3306'
11:16:13.735420 IP 172.24.64.21.34775 > 172.24.xxxx.3306: Flags [P.], seq 8760:8798, ack 1024, win 115, options [nop,nop,TS val 337733421 ecr 2215905344], length 38
11:16:13.735570 IP 172.24.64.21.34775 > 172.24.xxxx.3306: Flags [.], ack 1102, win 115, options [nop,nop,TS val 337733421 ecr 2215905427], length 0
11:16:13.741564 IP 172.24.64.21.34786 > 172.24.xxxx.3306: Flags [P.], seq 2422:3418, ack 484, win 115, options [nop,nop,TS val 337733427 ecr 2215905348], length 996
11:16:13.742000 IP 172.24.64.21.34786 > 172.24.xxxx.3306: Flags [.], ack 498, win 115, options [nop,nop,TS val 337733427 ecr 2215905433], length 0
11:16:13.819855 IP 172.24.64.21.34776 > 172.24.xxxx.3306: Flags [P.], seq 11819:13268, ack 4512, win 115, options [nop,nop,TS val 337733505 ecr 2215905423], length 1449
11:16:13.820146 IP 172.24.64.21.34776 > 172.24.xxxx.3306: Flags [.], ack 4672, win 123, options [nop,nop,TS val 337733505 ecr 2215905512], length 0
11:16:13.828001 IP 172.24.64.21.34786 > 172.24.xxxx.3306: Flags [P.], seq 3418:3456, ack 498, win 115, options [nop,nop,TS val 337733513 ecr 2215905433], length 38
11:16:13.828154 IP 172.24.64.21.34786 > 172.24.xxxx.3306: Flags [.], ack 576, win 115, options [nop,nop,TS val 337733513 ecr 2215905520], length 0
11:16:13.830079 IP 172.24.64.21.34775 > 172.24.xxxx.3306: Flags [P.], seq 8798:8954, ack 1102, win 115, options [nop,nop,TS val 337733515 ecr 2215905427], length 156
11:16:13.830346 IP 172.24.64.21.34775 > 172.24.xxxx.3306: Flags [.], ack 1165, win 115, options [nop,nop,TS val 337733516 ecr 2215905522], length 0
11:16:13.925822 IP 172.24.64.21.34775 > 172.24.xxxx.3306: Flags [P.], seq 8954:9931, ack 1165, win 115, options [nop,nop,TS val 337733611 ecr 2215905522], length 977
11:16:13.926247 IP 172.24.64.21.34775 > 172.24.xxxx.3306: Flags [.], ack 1179, win 115, options [nop,nop,TS val 337733612 ecr 2215905618], length 0
#sudo tcpdump -nn -i bond0 -s0 'tcp port 3306' -w pk.pcap
Analysis the pcap,we found two repuest interval to be mush long than the source pcap