Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    2.4.5 High latency and packet loss, not in a vm

    Problems Installing or Upgrading pfSense Software
    22
    81
    17.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      I just don't think this data is very helpful at diagnosing exactly what is happening.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • ?
        A Former User @stephenw10
        last edited by A Former User

        @stephenw10 said in 2.4.5 High latency and packet loss, not in a vm:

        I see delta time but not response time as column choices. Maybe it would be more expedient for me to send the pcap. I have used wireshark exactly once, this time. :)

        OK, I see now. Custom column and then icmp.resptime. Does that make any sense if it's not sorted by the icmp seq number?

        1 Reply Last reply Reply Quote 0
        • ?
          A Former User
          last edited by

          I hope this is more useful. If not I'll try again.

          pcap2.jpg

          1 Reply Last reply Reply Quote 0
          • ?
            A Former User
            last edited by

            I'll add this to the mix. I changed the average time in the gateway settings. That's the time dpinger averages over. When changing the setting, saving and then applying it the interface locked up for an extended time (minutes).

            So, I ssh'd in, ran top and did it again:

            Screen Shot 2020-04-04 at 21.04.40.png

            I can see dpinger using some resources, but why pfctl, ntpd and sshd? I'm not sure if that means anything, but it sure appears odd to me.

            1 Reply Last reply Reply Quote 0
            • R
              riften
              last edited by

              This looks so much like the problem I had, even before PFS 2.45. The symptoms. Latency spikes, then packet loss over and over. I had just created my first VLAN and gave the VLAN interface a static IPV6 in one of the 64s I should have. But no route and this horrible latency and packet drop. I followed the info HERE and created a 'Configuration Override' on the WAN IPV6 and set my VLAN static IPV6 and that was the only way to get darn ATT to route IPV6 from my VLAN. It made it trouble free after I spent almost a week pulling out my hair. So just wondering, can you guys ping (route) from your LAN or from the VLANS in ipv6? I am seeing ipv4 pings but did I miss the ipv6 pings...
              I'm on 2.45 with no issues, and am using the latest PFBLOCKERNG. It just looks so familiar...

              1 Reply Last reply Reply Quote 0
              • ?
                A Former User
                last edited by

                I can ping ipv6 without issue. I get a /56 from my isp.

                The only thing that has changed in my configuration is the pfsense version.

                I have offered to share my config.xml to test on matching hardware. My Supermicro hardware is the same as a box Netgate sells other than not being Netgate branded.

                This is an frustrating problem, more so for Netgate than anyone else I'm sure.

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Can you see what is calling pfctl if you run, say: ps -auxdww | grep pfctl.

                  1 Reply Last reply Reply Quote 0
                  • ?
                    A Former User
                    last edited by A Former User

                    root 25572 33.5 0.0 8828 4888 - R 09:34 0:04.12 | | `-- /sbin/pfctl -o basic -f /tmp/rules.debug

                    1 Reply Last reply Reply Quote 0
                    • ?
                      A Former User
                      last edited by A Former User

                      I was able to run ps auxdww >> psoutput a few times before the shell locked up.

                      Here it is: (removed)

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Thanks, that could be useful.
                        Interesting there are things there using far more CPU than I would ever expect.

                        You might want to remove it though if those public IPs are static.

                        Steve

                        ? 2 Replies Last reply Reply Quote 0
                        • ?
                          A Former User @stephenw10
                          last edited by

                          @stephenw10 Dynamic. No open ports, so they can bang away all they want ;)

                          1 Reply Last reply Reply Quote 1
                          • ?
                            A Former User @stephenw10
                            last edited by A Former User

                            @stephenw10

                            I have some spare cycles, I suppose a lot of people do. You, however, are slammed.

                            If it would be helpful I'm willing to run through a methodical sequence of configurations and test to try to get a handle on the issue(s).

                            If you provided an outline of configurations like: Generic install, no ipv6, Test. Make big table(s). Test. Turn on ipv6, test. Make big ipv6 tables. Test. Like that.

                            I can give it some hours over the next day or two and see if that helps get a handle on the issue(s).

                            I would ask that the tests be specific and the data needed be spelled out clearly so my gaps in experience doesn't reduce the usefulness of the exercise.

                            I have a Supermicro 5018D-FN4T (32GB ECC) which is the same as Netgates XG-1541. I have been doing zfs (single ssd) UEFI installs.

                            I wonder if there is something apparently unrelated going on that is common with the installations that are experiencing these issues. Something simple like UPnP or the like. I wouldn't think so, but it would be nice to know exactly what is what as each service is configured in a methodical sequence.

                            Anyhow, just a thought.

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              The fact that pfctl is running for so long and using so many cycles implies it's having a very hard time loading the ruleset for some reason.
                              I would manually check the /tmp/rules.debug file. Make sure it's not absolutely huge for example.
                              If it isn't then start disabling things that add anything to it. So UPnP, and packages like pfBlocker.

                              Steve

                              1 Reply Last reply Reply Quote 0
                              • ?
                                A Former User
                                last edited by

                                Nothing in there that shouldn't be. I have disabled everything including pfblocker. Made a big url alias and the problem persists.

                                To me, I could be wrong, it looks like big tables big issue. Small tables small issue. Small tables don't cause a dramatic issue so it appears as if everything is ok when it isn't.

                                My curiosity to find out what is going on is waning. If there is anything I can do to help I'd be happy to do so. Otherwise I'll go back to 2.4.4-p3 or onto something else.

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  I agree it does seem like that.

                                  If you don't actually have any large tables try setting the sysctl in System > Advanced > Firewall back to something closer to the default. So set Firewall Maximum Table Entries to, say, 65k or something even smaller.

                                  There was coded added to allow that to be set and others have seen that as the issue. We see some reports (I have seen it myself) where you get the error 'unable to allocate memory for (some large table) but it then loads fine for subsequent reloads. It appears that's way pfctl may be doing something it shouldn't.

                                  Steve

                                  ? 1 Reply Last reply Reply Quote 0
                                  • ?
                                    A Former User @stephenw10
                                    last edited by

                                    @stephenw10 I have done that and seen the can't allocate memory when total table entries > Maximum Table Entries. I can have my config (lots of vlans) with no packages, ipv6 enabled so the big bogonsv6 table and have the issue. Turn off block bogons and the symptoms are eliminated. The Max table entries setting has nothing to do with it. Total table entries is what matters. The only thing I haven't done is start from scratch and added stuff, I always started from my config and then disabled stuff.

                                    Anyhow, what happens will happen. I'm not going to get stuck on this for much longer.

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by stephenw10

                                      Ok, so to confirm the presence of the large table(s), irrespective of the max table size value, triggers the latency/packet-loss/cpu usage?
                                      And removing the table completely eliminates it?

                                      Steve

                                      1 Reply Last reply Reply Quote 0
                                      • ?
                                        A Former User
                                        last edited by A Former User

                                        @stephenw10

                                        Total table size is limited by max table size. If I set max tables at some arbitrarily large number, say 20000000 but only have a few small tables (no bogonsv6, no ip block lists) things are fine, meaning the symptoms of the problem are not noticeable. I have done that.

                                        It's obvious that the opposite can not be configured, large tables small max tables.

                                        I'll demonstrate some time later today, things to do right now.

                                        1 Reply Last reply Reply Quote 0
                                        • ?
                                          A Former User
                                          last edited by A Former User

                                          @stephenw10

                                          OK, only took a moment.

                                          Set max tables to 20000000.
                                          Turned off block bogons.
                                          Disabled pfblocker.

                                          Rebooted.

                                          Reboot was fast, 2.4.4-p3 fast.
                                          Ran ps auxdww | grep in a while 1 loop
                                          Reloaded the filters (status->filter reload)

                                          No lag, no latency, didn't notice it in any way.

                                          Screen Shot 2020-04-06 at 11.23.07.png

                                          Screen Shot 2020-04-06 at 10.54.33.png

                                          Screen Shot 2020-04-06 at 10.54.48.png

                                          Screen Shot 2020-04-06 at 11.04.36.png

                                          Didn't even see pfctl pop up when running top. Must have happened in between refreshes.

                                          Conclude what you will from this. The evidence shows max tables limits total table size (what is supposed to do) but the total table entries is what causes the symptoms of the issue (cause currently unknown, some regression maybe in pf) to become obvious.

                                          1 Reply Last reply Reply Quote 0
                                          • ?
                                            A Former User
                                            last edited by

                                            @stephenw10

                                            So, I'm either going to go back to 2.4.4-p3 or another solution (I have a ISR I could drag out of the closet). I want to go back to the set and forget setup I have enjoyed with pfsense for a while now.

                                            The question that I feel needs to be answered by the FreeBSD team is this:

                                            Why was that hard limit implemented? I would assume there was some observed reason for rewriting that with a hard limit.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.