Hello, On Fri, 28 Aug 2015, Phillip Moore wrote:
> Thank you for the suggestion. > > We didn't have the netfilter module loaded at all so I don't think it > would have having any impact. However I loaded it and set this setting > and it didn't change the behavior. > The ip_conntrack_tcp_be_liberal setting wasn't available on our kernel > version looks like I can't find a module to load to enable that. > > We did find something interesting. If we add additional headers to the > working http request we can make it fail. > > WORKS: curl -H "X:1" http://10.64.96.10/healthcheck > FAILS: curl -H "X:12" http://10.64.96.10/healthcheck > > 190 bytes works, 191 bytes fails with the failure to tunnel problem. What is the model/revision of the incoming network device? Do you have IPVS debugging enabled to check if IPVS works with these dropped packets? Or they are lost before reaching IPVS at LOCAL_IN? Regards -- Julian Anastasov <j...@ssi.bg> _______________________________________________ Please read the documentation before posting - it's available at: http://www.linuxvirtualserver.org/ LinuxVirtualServer.org mailing list - lvs-users@LinuxVirtualServer.org Send requests to lvs-users-requ...@linuxvirtualserver.org or go to http://lists.graemef.net/mailman/listinfo/lvs-users