* Steve Johnson <maill...@sjohnson.info> [2011-02-01 20:35]:
> I currently have a system that has no match rule in the ruleset, but that
> uses tables for a big chunk of the traffic, including our monitoring station
> that has a pretty high SNMP request rate. That system has a state table that
> usually stabilizes between 15-20K sessions, with a session search rate of
> around 10K. The states limit has been raised to 100000 and the frags to
> 10000, but all other limits are set to default values. 

you can increase that much more. the times where kmem was a very
scarce ressource are long over.

> However, the "match"
> counter always states a rate between 199/200 per second.

the counter has nothing to do with match rules. it is increased any
time a rule matches, regardless of the type.

>  During some heavy
> traffic period, we are getting some failures from the monitoring system and
> the only thing that seems possibly out of health for the system is the match
> counter rate. System processor and memory are fine and there is no other
> noticeable impact, but clearly the monitoring tool is seeing an impact, as
> it didn't reflect something this behavior before we implemented the PF
> systems.

you might hit some other limit, not necessarily pf. start with
checking sysctl net.inet.ifq - in particular drops, and increase
maxlen if you see it increasing.
depending on how you monitor you might also run into the icmp err rate
limit, play with the net.inet.icmp.errppslimit sysctl. 

-- 
Henning Brauer, h...@bsws.de, henn...@openbsd.org
BS Web Services, http://bsws.de
Full-Service ISP - Secure Hosting, Mail and DNS Services
Dedicated Servers, Rootservers, Application Hosting

Reply via email to