Andrija, We had similar issue before. However, we use advanced zone with security groups, and the issue is because some security groups rules (iptables rules) are not applied by security_group.py successfully. is there any iptables rules on the hypervisors ?
-Wei 2017-10-10 11:23 GMT+02:00 Andrija Panic <andrija.pa...@gmail.com>: > Hi, > > @Wei, no we are using VXLAN, advanced networking... problem is that packet > not passed from bridge to the VNET - that is "all"... > > @Ivan, we did upgrade few hosts to kernel, 4.4 (made available from Ubuntu > 16.04 to Ubuntu 14.04), but again we there had some issues with FortiOS > (some special OS, not Linux based as I was told), that RDP apps behind this > FW are "slow" (probably laggy), when this FortiGate VM is on new kernel... > > But I'm sure we will move to 4.4, this bug is really driving me crazy... :( > > THx > > On 10 October 2017 at 09:52, Ivan Kudryavtsev <kudryavtsev...@bw-sw.com> > wrote: > > > Andrija, I saw it in the past. Problem might be coolnnected with kernel > > version and vnet itself. Try to look for it. I don't remember how we > > overcame it in the past... > > > > 10 окт. 2017 г. 8:07 ДП пользователь "Wei ZHOU" <ustcweiz...@gmail.com> > > написал: > > > > > Hi Andrija, > > > > > > Are using advanced zone with isolated network or security groups ? > > > > > > -Wei > > > > > > > > > 2017-10-09 22:52 GMT+02:00 Andrija Panic <andrija.pa...@gmail.com>: > > > > > > > Hi guys, > > > > > > > > we have occasional but serious problem, that starts happening as it > > seems > > > > randomly (i.e. NOT under high load) - not ACS related afaik, purely > > KVM, > > > > but feedback is really welcomed. > > > > > > > > - VM is reachable in general from everywhere, but not reachable from > > > > specific IP address ?! > > > > - VM is NOT under high load, network traffic next to zero, same for > > > > CPU/disk... > > > > - We mitigate this problem by migrating VM away to another host, not > > much > > > > of a solution... > > > > > > > > Description of problem: > > > > > > > > We let ping from "problematic" source IP address to the problematic > VM, > > > and > > > > we capture traffic on KVM host where the problematic VM lives: > > > > > > > > - Tcpdump on VXLAN interface (physical incoming interface on the > host) > > - > > > we > > > > see packet fine > > > > - tcpdump on BRIDGE = we see packet fine > > > > - tcpdump on VNET = we DON'T see packet. > > > > > > > > In the scenario above, I need to say that : > > > > - we can tcpdump packets from other source IPs on the VNET interface > > just > > > > fine (as expected), so should also see this problematic source IP's > > > packets > > > > - we can actually ping in oposite direction - from the problematic VM > > to > > > > the problematic "source" IP > > > > > > > > We checked everything possible, from bridge port forwarding, to > > > mac-to-vtep > > > > mapping, to many other things, removed traffic shaping from VNET > > > interface, > > > > no iptables/ebtables, no STP on bridge, remove and rejoin interfaces > to > > > > bridge, destroy bridge and create manually on the fly, > > > > > > > > Problem is really crazy, and I can not explain it - no iptables, no > > > > ebtables for troubleshooting pruposes (on this host) and > > > > > > > > We mitigate this problem by migrating VM away to another host, not > much > > > of > > > > a solution... > > > > > > > > This is Ubuntu 14.04, Qemu 2.5 (libvirt 1.3.1), > > > > Stock kernel 3.16-xx, regular bridge (not OVS) > > > > > > > > Anyone else ever heard of such problem - this is not intermittent > > packet > > > > dropping, but complete blackout/packet drop in some way... > > > > > > > > Thanks, > > > > > > > > -- > > > > > > > > Andrija Panić > > > > > > > > > > > > > -- > > Andrija Panić >