Package: munin-node
Version: 1.2.5-1
Severity: normal

Hi.

Some days ago I noticed a very severe problem with the fw_conntrack and
fw_forwarded_local plugins on one of my firewalls.

When the system exceeded about 20,000 conntrack entries, both plugins would
interrupt all data flow through this system for about 5 to 10 seconds, long
enough for a failover mechanism kicking into action.

I can manually reproduce this by simply using "cat /proc/net/ip_conntrack" 
or "cat /proc/net/nf_conntrack".

Now look at the runtimes in comparison with the usage of "conntrack -L":

r...@fw01-1:~# time cat /proc/net/nf_conntrack | wc -l
5657

real    0m0.608s
user    0m0.010s
sys     0m0.600s
r...@fw01-1:~# time cat /proc/net/ip_conntrack | wc -l
5703

real    0m0.580s
user    0m0.000s
sys     0m0.580s
r...@fw01-1:~# time conntrack -L |wc -l
5481

real    0m0.071s
user    0m0.050s
sys     0m0.020s

Even an unloaded system takes more than half a second while the conntrack
command takes only 10% of the time.

With more and more connections in the conntrack table the times scale
exponentially when using the files in /proc, while "conntrack -L" nearly
stays the same.

The disturbing problem is the total halt of all network operations during
the cat from /proc, while conntrack -L does not interrupt anything.

While the "cat /proc/net/ip_conntrack" does no harm to small systems, bigger
and loaded systems will be severly impacted by this problem.

For the fw_conntrack and fw_forwarded_local plugins found in 1.2.5
(pre-1.4) you can simply replace the "cat /proc/net/ip_conntrack"
command with a "conntrack -L", because the formats of both are identical.

With /proc/net/nf_conntrack this is not yes possible.

Grüße,
Sven.



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to