All of lore.kernel.org
 help / color / mirror / Atom feed
From: Alex Tang <altitude@funkware.com>
To: netfilter@lists.netfilter.org
Subject: ip_conntrack table full after upgrade from RHEL3 (2.4/1.2.8) to RHEL4U4 (2.6.9/1.2.11)
Date: Mon, 21 May 2007 17:30:34 -0700	[thread overview]
Message-ID: <465239AA.9020007@funkware.com> (raw)

Hi folks.

I've been having a problem on a machine that does a high volume of 
sendmail traffic.  The machine gets approx 50,000 connections per hour 
to port 25. 

The machine was upgraded from a RHEL3 based system (kernel rpm 
2.4.21-47.EL and iptables rpm 1.2.8-12.3) to a RHEL4 based system 
(kernel rpm 2.6.9-55.EL and iptables rpm 1.2.11-3.1.RHEL4).

Since the upgrade has occurred, the conntrack table fills up relatively 
fast (within one day).  The max size is 65536 (as per 
/proc/sys/net/ipv4/netfilter/ip_conntrack_max).

I've been searching through the archives, faq, etc and have found the 
usual standard answer is to increase the ip_conntrack_max.  However, I'm 
concerned for a couple of reasons that this may not be the proper answer.

In particular, i have another machine which is still running the RHEL3 
(kernel 2.4.21-47.EL/iptables 1.2.8-12.3), that gets more connections 
per hour (80,000 vs. 50,000), and there are only about 9000 entries in 
the ip_conntrack table on that machine.

The problem with the conntrack table filling up fast started as soon as 
we did the upgrade.

Also, on the machine that is currently experiencing problems, most (98%) 
of the connections are in the ESTABLISHED state, however the majority of 
these connections are not seen when doing a "netstat".

I admit that I do not fully understand the details of the iptables 
implementation, but it seems that the connection close is not being 
"seen" by the conntrack code and connections that have already gone away 
are still in the ip_conntrack table, and we have to wait for these 
connections to "timeout" before they are expired from the conntrack table.

I could of course, increase the max size of the table, or decrease the 
/proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_timeout_established, but 
it seems that would only mask the problem, not actually fix it.

Is this a known issue in iptables? Or am I going down the wrong path?

Thanks for your help.

...alex...



             reply	other threads:[~2007-05-22  0:30 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-05-22  0:30 Alex Tang [this message]
2007-05-22  9:59 ` ip_conntrack table full after upgrade from RHEL3 (2.4/1.2.8) to RHEL4U4 (2.6.9/1.2.11) Pascal Hambourg
2007-05-22 16:10   ` Paul Blondé

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=465239AA.9020007@funkware.com \
    --to=altitude@funkware.com \
    --cc=netfilter@lists.netfilter.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.