Public bug reported:

The behavior wihout DVR is that the previous connections continue using the 
snat ip and the new connections go to use the fip. 
then without dvr:
 -1 add fip -> no delete conntrack flows
 -2 delete fip -> delete conntrack flows

 I don know if 1 is a expected behavior or a bug. Delete the conntrack
entries in the 1 and 2 would be a simpler solution(less casuistic).

 then first we should be sure of the desired behavior when a fip is
added, becuase it is not working with DVR.

 If the decission isn't maintain the old connections then:

  -with and without DVR the conntrack entries shoud be deleted.

 If the decission is maintais the old connection then:

  -the fix only would be necessary for DVR and it consists in create a
way for the external traffic without nat(in the qrouter of the compute,
the nat is done in the controller qrouter )(*).


Related bug: https://bugs.launchpad.net/neutron/+bug/1818805

"Conntrack rules in the qrouter are not deleted when a fip is removed
with dvr"


(*)

 With dvr the external traffic is managed using pbr(in the qrouter):

 without fip:

[root@compute-2 heat-admin]# ip a 
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group 
default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: rfp-d01c89b0-c: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue 
state UP group default qlen 1000
    link/ether 06:09:90:b6:24:47 brd ff:ff:ff:ff:ff:ff link-netnsid 0
    inet 169.254.106.114/31 scope global rfp-d01c89b0-c
       valid_lft forever preferred_lft forever
    inet6 fe80::409:90ff:feb6:2447/64 scope link 
       valid_lft forever preferred_lft forever
43: qr-c47b0417-7d: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1450 qdisc noqueue 
state UNKNOWN group default qlen 1000
    link/ether fa:16:3e:d9:7d:01 brd ff:ff:ff:ff:ff:ff
    inet 10.2.0.1/24 brd 10.2.0.255 scope global qr-c47b0417-7d
       valid_lft forever preferred_lft forever
    inet6 fe80::f816:3eff:fed9:7d01/64 scope link 
       valid_lft forever preferred_lft forever
[root@compute-2 heat-admin]# ip r 
10.2.0.0/24 dev qr-c47b0417-7d proto kernel scope link src 10.2.0.1 
169.254.106.114/31 dev rfp-d01c89b0-c proto kernel scope link src 
169.254.106.114 
[root@compute-2 heat-admin]# ip rule list
0:      from all lookup local 
32766:  from all lookup main 
32767:  from all lookup default 
167903233:      from 10.2.0.1/24 lookup 167903233 
[root@compute-2 heat-admin]# ip r show table 167903233
default via 10.2.0.8 dev qr-c47b0417-7d 
[root@compute-2 heat-admin]# ip route get 8.8.8.8 from 10.2.0.12 iif 
qr-c47b0417-7d
8.8.8.8 from 10.2.0.12 via 10.2.0.8 dev qr-c47b0417-7d 
    cache iif * 

The traffic is sent to the qrouter in the controller

With fip:

[root@compute-1 heat-admin]# ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group 
default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: rfp-d01c89b0-c@if3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue 
state UP group default qlen 1000
    link/ether 06:5e:ac:51:83:7a brd ff:ff:ff:ff:ff:ff link-netnsid 0
    inet 169.254.106.114/31 scope global rfp-d01c89b0-c
       valid_lft forever preferred_lft forever
    inet6 fe80::45e:acff:fe51:837a/64 scope link 
       valid_lft forever preferred_lft forever
23: qr-c47b0417-7d: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1450 qdisc noqueue 
state UNKNOWN group default qlen 1000
    link/ether fa:16:3e:d9:7d:01 brd ff:ff:ff:ff:ff:ff
    inet 10.2.0.1/24 brd 10.2.0.255 scope global qr-c47b0417-7d
       valid_lft forever preferred_lft forever
    inet6 fe80::f816:3eff:fed9:7d01/64 scope link 
       valid_lft forever preferred_lft forever
[root@compute-1 heat-admin]# ip r
10.2.0.0/24 dev qr-c47b0417-7d proto kernel scope link src 10.2.0.1 
169.254.106.114/31 dev rfp-d01c89b0-c proto kernel scope link src 
169.254.106.114 
[root@compute-1 heat-admin]# ip rule list 
0:      from all lookup local 
32766:  from all lookup main 
32767:  from all lookup default 
57483:  from 10.2.0.12 lookup 16 
167903233:      from 10.2.0.1/24 lookup 167903233 
[root@compute-1 heat-admin]# ip r show table 16
default via 169.254.106.115 dev rfp-d01c89b0-c 
[root@compute-1 heat-admin]# 
[root@compute-1 heat-admin]# ip route get 8.8.8.8 from 10.2.0.12 iif 
qr-c47b0417-7d
8.8.8.8 from 10.2.0.12 via 169.254.106.115 dev rfp-d01c89b0-c 
    cache iif * 

The traffic is sent to the fip namestpace to out directly without pass
for the controller.


The problem is that the traffic of old connections with contrack entries is 
sent to the fip name space without snat, but this traffic should be sent to the 
controller in the same way than in the scenario without fip.


traffic before adding fip:

[root@compute-1 heat-admin]# 
[root@compute-1 heat-admin]# tcpdump -nei rfp-d01c89b0-c
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on rfp-d01c89b0-c, link-type EN10MB (Ethernet), capture size 262144 
bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
[root@compute-1 heat-admin]# tcpdump -nei qr-c47b0417-7d
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on qr-c47b0417-7d, link-type EN10MB (Ethernet), capture size 262144 
bytes
11:44:06.503464 fa:16:3e:6e:0e:f7 > fa:16:3e:d9:7d:01, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 32, length 64
11:44:06.503515 fa:16:3e:d9:7d:01 > fa:16:3e:53:66:de, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 32, length 64
11:44:07.504016 fa:16:3e:6e:0e:f7 > fa:16:3e:d9:7d:01, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 33, length 64
11:44:07.504071 fa:16:3e:d9:7d:01 > fa:16:3e:53:66:de, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 33, length 64
11:44:08.504556 fa:16:3e:6e:0e:f7 > fa:16:3e:d9:7d:01, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 34, length 64
11:44:08.504616 fa:16:3e:d9:7d:01 > fa:16:3e:53:66:de, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 34, length 64

traffic after adding fip:

tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on rfp-d01c89b0-c, link-type EN10MB (Ethernet), capture size 262144 
bytes
11:46:42.580817 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 188, length 64
11:46:43.581222 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 189, length 64
11:46:44.581685 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 190, length 64
11:46:45.582043 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 191, length 64
11:46:46.582698 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 192, length 64
11:46:47.583142 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 193, length 64
11:46:48.583620 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 194, length 64
11:46:49.584134 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 195, length 64
11:46:50.584554 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 196, length 64
11:46:51.585165 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 197, length 64
11:46:52.585599 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 198, length 64
^C
11 packets captured
11 packets received by filter
0 packets dropped by kernel
[root@compute-1 heat-admin]# tcpdump -nei qr-c47b0417-7d
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on qr-c47b0417-7d, link-type EN10MB (Ethernet), capture size 262144 
bytes
11:46:57.587549 fa:16:3e:6e:0e:f7 > fa:16:3e:d9:7d:01, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 203, length 64
11:46:57.599214 fa:16:3e:6e:0e:f7 > fa:16:3e:d9:7d:01, ethertype ARP (0x0806), 
length 42: Request who-has 10.2.0.1 tell 10.2.0.12, length 28
11:46:57.599238 fa:16:3e:d9:7d:01 > fa:16:3e:6e:0e:f7, ethertype ARP (0x0806), 
length 42: Reply 10.2.0.1 is-at fa:16:3e:d9:7d:01, length 28
11:46:58.588062 fa:16:3e:6e:0e:f7 > fa:16:3e:d9:7d:01, ethertype IPv4 (0x0800), 
length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 204, length 64
^C
4 packets captured
4 packets received by filter
0 packets dropped by kernel
[root@compute-1 heat-admin]# contrack -L
bash: contrack: command not found
[root@compute-1 heat-admin]# conntrack -L
icmp     1 29 src=10.2.0.12 dst=8.8.8.8 type=8 code=0 id=46081 [UNREPLIED] 
src=8.8.8.8 dst=10.2.0.12 type=0 code=0 id=46081 mark=0 
secctx=system_u:object_r:unlabeled_t:s0 use=1
conntrack v1.4.4 (conntrack-tools): 1 flow entries have been shown.

** Affects: neutron
     Importance: Undecided
         Status: New


** Tags: l3-dvr-backlog

** Tags added: l3-dvr-backlog

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1818824

Title:
  When a fip is added to a vm  with dvr, previous connections loss the
  connectivity

Status in neutron:
  New

Bug description:
  The behavior wihout DVR is that the previous connections continue using the 
snat ip and the new connections go to use the fip. 
  then without dvr:
   -1 add fip -> no delete conntrack flows
   -2 delete fip -> delete conntrack flows

   I don know if 1 is a expected behavior or a bug. Delete the conntrack
  entries in the 1 and 2 would be a simpler solution(less casuistic).

   then first we should be sure of the desired behavior when a fip is
  added, becuase it is not working with DVR.

   If the decission isn't maintain the old connections then:

    -with and without DVR the conntrack entries shoud be deleted.

   If the decission is maintais the old connection then:

    -the fix only would be necessary for DVR and it consists in create a
  way for the external traffic without nat(in the qrouter of the
  compute, the nat is done in the controller qrouter )(*).

  
  Related bug: https://bugs.launchpad.net/neutron/+bug/1818805

  "Conntrack rules in the qrouter are not deleted when a fip is removed
  with dvr"

  
  (*)

   With dvr the external traffic is managed using pbr(in the qrouter):

   without fip:

  [root@compute-2 heat-admin]# ip a 
  1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group 
default qlen 1000
      link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
      inet 127.0.0.1/8 scope host lo
         valid_lft forever preferred_lft forever
      inet6 ::1/128 scope host 
         valid_lft forever preferred_lft forever
  2: rfp-d01c89b0-c: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue 
state UP group default qlen 1000
      link/ether 06:09:90:b6:24:47 brd ff:ff:ff:ff:ff:ff link-netnsid 0
      inet 169.254.106.114/31 scope global rfp-d01c89b0-c
         valid_lft forever preferred_lft forever
      inet6 fe80::409:90ff:feb6:2447/64 scope link 
         valid_lft forever preferred_lft forever
  43: qr-c47b0417-7d: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1450 qdisc noqueue 
state UNKNOWN group default qlen 1000
      link/ether fa:16:3e:d9:7d:01 brd ff:ff:ff:ff:ff:ff
      inet 10.2.0.1/24 brd 10.2.0.255 scope global qr-c47b0417-7d
         valid_lft forever preferred_lft forever
      inet6 fe80::f816:3eff:fed9:7d01/64 scope link 
         valid_lft forever preferred_lft forever
  [root@compute-2 heat-admin]# ip r 
  10.2.0.0/24 dev qr-c47b0417-7d proto kernel scope link src 10.2.0.1 
  169.254.106.114/31 dev rfp-d01c89b0-c proto kernel scope link src 
169.254.106.114 
  [root@compute-2 heat-admin]# ip rule list
  0:    from all lookup local 
  32766:        from all lookup main 
  32767:        from all lookup default 
  167903233:    from 10.2.0.1/24 lookup 167903233 
  [root@compute-2 heat-admin]# ip r show table 167903233
  default via 10.2.0.8 dev qr-c47b0417-7d 
  [root@compute-2 heat-admin]# ip route get 8.8.8.8 from 10.2.0.12 iif 
qr-c47b0417-7d
  8.8.8.8 from 10.2.0.12 via 10.2.0.8 dev qr-c47b0417-7d 
      cache iif * 

  The traffic is sent to the qrouter in the controller

  With fip:

  [root@compute-1 heat-admin]# ip a
  1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group 
default qlen 1000
      link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
      inet 127.0.0.1/8 scope host lo
         valid_lft forever preferred_lft forever
      inet6 ::1/128 scope host 
         valid_lft forever preferred_lft forever
  2: rfp-d01c89b0-c@if3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc 
noqueue state UP group default qlen 1000
      link/ether 06:5e:ac:51:83:7a brd ff:ff:ff:ff:ff:ff link-netnsid 0
      inet 169.254.106.114/31 scope global rfp-d01c89b0-c
         valid_lft forever preferred_lft forever
      inet6 fe80::45e:acff:fe51:837a/64 scope link 
         valid_lft forever preferred_lft forever
  23: qr-c47b0417-7d: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1450 qdisc noqueue 
state UNKNOWN group default qlen 1000
      link/ether fa:16:3e:d9:7d:01 brd ff:ff:ff:ff:ff:ff
      inet 10.2.0.1/24 brd 10.2.0.255 scope global qr-c47b0417-7d
         valid_lft forever preferred_lft forever
      inet6 fe80::f816:3eff:fed9:7d01/64 scope link 
         valid_lft forever preferred_lft forever
  [root@compute-1 heat-admin]# ip r
  10.2.0.0/24 dev qr-c47b0417-7d proto kernel scope link src 10.2.0.1 
  169.254.106.114/31 dev rfp-d01c89b0-c proto kernel scope link src 
169.254.106.114 
  [root@compute-1 heat-admin]# ip rule list 
  0:    from all lookup local 
  32766:        from all lookup main 
  32767:        from all lookup default 
  57483:        from 10.2.0.12 lookup 16 
  167903233:    from 10.2.0.1/24 lookup 167903233 
  [root@compute-1 heat-admin]# ip r show table 16
  default via 169.254.106.115 dev rfp-d01c89b0-c 
  [root@compute-1 heat-admin]# 
  [root@compute-1 heat-admin]# ip route get 8.8.8.8 from 10.2.0.12 iif 
qr-c47b0417-7d
  8.8.8.8 from 10.2.0.12 via 169.254.106.115 dev rfp-d01c89b0-c 
      cache iif * 

  The traffic is sent to the fip namestpace to out directly without pass
  for the controller.

  
  The problem is that the traffic of old connections with contrack entries is 
sent to the fip name space without snat, but this traffic should be sent to the 
controller in the same way than in the scenario without fip.

  
  traffic before adding fip:

  [root@compute-1 heat-admin]# 
  [root@compute-1 heat-admin]# tcpdump -nei rfp-d01c89b0-c
  tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  listening on rfp-d01c89b0-c, link-type EN10MB (Ethernet), capture size 262144 
bytes
  ^C
  0 packets captured
  0 packets received by filter
  0 packets dropped by kernel
  [root@compute-1 heat-admin]# tcpdump -nei qr-c47b0417-7d
  tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  listening on qr-c47b0417-7d, link-type EN10MB (Ethernet), capture size 262144 
bytes
  11:44:06.503464 fa:16:3e:6e:0e:f7 > fa:16:3e:d9:7d:01, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 32, 
length 64
  11:44:06.503515 fa:16:3e:d9:7d:01 > fa:16:3e:53:66:de, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 32, 
length 64
  11:44:07.504016 fa:16:3e:6e:0e:f7 > fa:16:3e:d9:7d:01, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 33, 
length 64
  11:44:07.504071 fa:16:3e:d9:7d:01 > fa:16:3e:53:66:de, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 33, 
length 64
  11:44:08.504556 fa:16:3e:6e:0e:f7 > fa:16:3e:d9:7d:01, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 34, 
length 64
  11:44:08.504616 fa:16:3e:d9:7d:01 > fa:16:3e:53:66:de, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 34, 
length 64

  traffic after adding fip:

  tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  listening on rfp-d01c89b0-c, link-type EN10MB (Ethernet), capture size 262144 
bytes
  11:46:42.580817 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 188, 
length 64
  11:46:43.581222 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 189, 
length 64
  11:46:44.581685 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 190, 
length 64
  11:46:45.582043 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 191, 
length 64
  11:46:46.582698 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 192, 
length 64
  11:46:47.583142 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 193, 
length 64
  11:46:48.583620 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 194, 
length 64
  11:46:49.584134 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 195, 
length 64
  11:46:50.584554 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 196, 
length 64
  11:46:51.585165 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 197, 
length 64
  11:46:52.585599 06:5e:ac:51:83:7a > 32:b6:27:4f:1e:1e, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 198, 
length 64
  ^C
  11 packets captured
  11 packets received by filter
  0 packets dropped by kernel
  [root@compute-1 heat-admin]# tcpdump -nei qr-c47b0417-7d
  tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  listening on qr-c47b0417-7d, link-type EN10MB (Ethernet), capture size 262144 
bytes
  11:46:57.587549 fa:16:3e:6e:0e:f7 > fa:16:3e:d9:7d:01, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 203, 
length 64
  11:46:57.599214 fa:16:3e:6e:0e:f7 > fa:16:3e:d9:7d:01, ethertype ARP 
(0x0806), length 42: Request who-has 10.2.0.1 tell 10.2.0.12, length 28
  11:46:57.599238 fa:16:3e:d9:7d:01 > fa:16:3e:6e:0e:f7, ethertype ARP 
(0x0806), length 42: Reply 10.2.0.1 is-at fa:16:3e:d9:7d:01, length 28
  11:46:58.588062 fa:16:3e:6e:0e:f7 > fa:16:3e:d9:7d:01, ethertype IPv4 
(0x0800), length 98: 10.2.0.12 > 8.8.8.8: ICMP echo request, id 46081, seq 204, 
length 64
  ^C
  4 packets captured
  4 packets received by filter
  0 packets dropped by kernel
  [root@compute-1 heat-admin]# contrack -L
  bash: contrack: command not found
  [root@compute-1 heat-admin]# conntrack -L
  icmp     1 29 src=10.2.0.12 dst=8.8.8.8 type=8 code=0 id=46081 [UNREPLIED] 
src=8.8.8.8 dst=10.2.0.12 type=0 code=0 id=46081 mark=0 
secctx=system_u:object_r:unlabeled_t:s0 use=1
  conntrack v1.4.4 (conntrack-tools): 1 flow entries have been shown.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1818824/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to