Hello,

Can anyone please explain following performance impact:

Taking following snippet of forward table (one-way traffic cleaner), I
am observing very huge CPU impact on the ovs-vswitchd on the specific
test for IP address violation, but it seemingly comes from nowhere -
packets should be silently dropped by kernel module since there is a
definitely 'drop' action for unicast IP flood from following:

hping3 -1 --flood --rand-source 10.0.0.51 <-- active neighbour

As one can see from counters, packets are dropping, but raising CPU
consumption of the ovs-vswitchd up to four cores on E5 cpu, instead of
being silently blackholed by kernel module. When no path to neighbor
with certain address exists (for example, if one shut down interface
10.0.0.51), overhead disappears. Can anyone have a point on what can be
fixed there to not heat up vswitchd process so much? I am using 2.1
series userspace tools.


OFPST_FLOW reply (OF1.3) (xid=0x2):
 cookie=0x22, duration=215.971s, table=0, n_packets=8225360,
n_bytes=345465120,
priority=30,dl_src=52:54:00:00:00:00/ff:ff:ff:00:00:01 actions=goto_table:1
 cookie=0x1, duration=215.975s, table=1, n_packets=8225436,
n_bytes=345473736, send_flow_rem priority=0 actions=goto_table:2
 cookie=0x20, duration=215.922s, table=1, n_packets=414, n_bytes=24840,
priority=40,arp,in_port=1 actions=goto_table:7
 cookie=0x10032600, duration=215.891s, table=2, n_packets=0, n_bytes=0,
priority=30,ip,in_port=51,dl_src=52:54:00:10:03:26,nw_src=10.0.0.50
actions=write_metadata:0x4c/0x1fffffe,goto_table:6
_______________________________________________
discuss mailing list
discuss@openvswitch.org
http://openvswitch.org/mailman/listinfo/discuss

Reply via email to