Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Latency spikes during Filter reload - CE 2.6.0

    General pfSense Questions
    6
    36
    4.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      cclarke69
      last edited by

      I see the same symptom.

      I7-5500u
      8gb RAM
      6x Intel NICS
      120gb SSD

      Home network for the family, so failing the WAF currently.

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        What sort of latency are you seeing? How many firewall lines?

        C 1 Reply Last reply Reply Quote 0
        • C
          cclarke69 @stephenw10
          last edited by

          @stephenw10 - around 300 active rules across 10 interfaces. WAN RTT goes from <7ms to >200 ms for around 50s. RTTd from 0.2ms to > 800ms for the same period.

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Urgh, that's pretty bad.

            How many actual rulset lines though? As reported by: pfctl -sr | wc -l

            If you run the table reload commands I showed above do those come back in reasonable time?

            Steve

            C 3 Replies Last reply Reply Quote 0
            • C
              cclarke69 @stephenw10
              last edited by

              @stephenw10 - output of pfctl -sr | wc -l is 1987. That command returns in about 1s

              1 Reply Last reply Reply Quote 0
              • C
                cclarke69 @stephenw10
                last edited by

                @stephenw10 - Which table reload command do you mean?

                1 Reply Last reply Reply Quote 0
                • C
                  cclarke69 @stephenw10
                  last edited by

                  @stephenw10 - 1 table created.
                  128188/128188 addresses added.
                  0.29 real 0.12 user 0.16 sys

                  for time pfctl -t bogonsv6 -T add -f /etc/bogonsv6

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Yes, that. And those times look fine.

                    You might also try:

                    [22.01-RELEASE][admin@5100.stevew.lan]/root: time pfctl -f /tmp/rules.debug
                    0.377u 0.329s 0:00.70 98.5%	208+187k 1+0io 0pf+0w
                    

                    Hardly additional rules on that box though:

                    [22.01-RELEASE][admin@5100.stevew.lan]/root: pfctl -sr | wc -l
                         121
                    

                    Steve

                    C 4 Replies Last reply Reply Quote 0
                    • C
                      cclarke69 @stephenw10
                      last edited by

                      @stephenw10 - time pfctl -f /tmp/rules.debug -> 6.06 real 0.35 user 5.70 sys

                      1 Reply Last reply Reply Quote 0
                      • C
                        cclarke69 @stephenw10
                        last edited by

                        @stephenw10 - 0.370u 5.780s 0:06.15 100.0% 203+182k 5+0io 0pf+0w

                        1 Reply Last reply Reply Quote 0
                        • C
                          cclarke69 @stephenw10
                          last edited by

                          @stephenw10 - If it helps, I've restarted the pfSense and observed the stats. The WAN RTT was very high for ~50s after the GUI became available. The OpenVPN interfaces carried over the WAN connection gave normal RTT immediately.

                          1 Reply Last reply Reply Quote 0
                          • C
                            cclarke69 @stephenw10
                            last edited by

                            @stephenw10 - And wireguard doesn't start after reboot. Having resaved the wireguard peers, the Gateways looked like

                            d04c5886-afff-434b-b5a8-e83fb0d52e76-image.png

                            When all should be sub 10ms.

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Hmm, those Wireguard stats are continually? Or for the 50s after boot?

                              6s to load the ruleset is pretty extreme too.

                              Testing here with a 1700 line ruleset and not seeing this. Still digging....

                              C A 4 Replies Last reply Reply Quote 0
                              • C
                                cclarke69 @stephenw10
                                last edited by

                                @stephenw10 - The stats above are for WAN and 2 OpenVPN interfaces, during the ~50s after Wireguard starts. I assume the rules are reloaded at that time? The other point I was making is that Wireguard won't start after reboot, until the WG peers have been disabled and re-enabled. I believe there's another thread somewhere on that topic. Wireguard was fine on 2.5.2

                                1 Reply Last reply Reply Quote 0
                                • C
                                  cclarke69 @stephenw10
                                  last edited by

                                  @stephenw10 - Here is the ThinkBroadband Monitor showing pre and post upgrade

                                  c992bc11-674d-4561-b55c-aa807ac60967-image.png

                                  Stopping the rc.filter_configure_sync cron job running stops the latency spikes.

                                  1 Reply Last reply Reply Quote 0
                                  • A
                                    Averlon @stephenw10
                                    last edited by

                                    @stephenw10 said in Latency spikes during Filter reload - CE 2.6.0:

                                    Testing here with a 1700 line ruleset and not seeing this. Still digging....

                                    Maybe there is more to it than just rule count.

                                    @cclarke69

                                    Do you have any Rules with advanced Options like State Type != keep or Gateway override for policy based routing? Do you use Gateway Groups in some rules?

                                    C 1 Reply Last reply Reply Quote 0
                                    • C
                                      cclarke69 @Averlon
                                      last edited by

                                      @averlon - From memory,

                                      • State Type != keep -> no

                                      • Gateway groups -> yes

                                      • Gateway override -> yes

                                      • Also Traffic shaping -> yes

                                      1 Reply Last reply Reply Quote 0
                                      • A
                                        Averlon
                                        last edited by Averlon

                                        For Reference

                                        09e20f83-ed7d-43b3-8c96-bd675854f9ca-image.png

                                        Have currently only console access via IPMI. Gonna do some tests later, when I get in-band access to that machine.

                                        1 Reply Last reply Reply Quote 0
                                        • C
                                          cclarke69 @stephenw10
                                          last edited by

                                          @stephenw10 @averlon - as a test I disabled SMP by adding kern.smp.disabled=1 to /boot/loader.conf.local . Early indications are that this mitigates the latency issue. There was apparently a similar issue in 2.4.5 - https://forum.netgate.com/topic/149595/2-4-5-a-20200110-1421-and-earlier-high-cpu-usage-from-pfctl

                                          1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            Yes, though it isn't a regression of that issue directly as that was easy to replicate in the end.

                                            Just to confirm you are seeing spikes pinging to the firewall or though it? Or Both?

                                            C 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.