• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Increased Memory and CPU Spikes (causing latency/outage) with 2.4.5

Problems Installing or Upgrading pfSense Software
40
141
40.5k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B
    bmeeks
    last edited by Apr 1, 2020, 2:22 PM

    I currently have no dog in this fight since I don't run pfBlockerNG-devel and I have not yet upgraded my SG-5100 to 2.4.5 (but I do plan to).

    I found this Errata Notice in the Release Notes for FreeBSD 11/STABLE -- https://www.freebsd.org/security/advisories/FreeBSD-EN-20:04.pfctl.asc. Since several of you, and some posters in other threads, are complaining about high utilization from pfctl, the patch this errata notice talks about might be of interest.

    ? 1 Reply Last reply Apr 1, 2020, 2:26 PM Reply Quote 0
    • ?
      A Former User @bmeeks
      last edited by Apr 1, 2020, 2:26 PM

      @bmeeks Thanks! I will add that the issue exists without pfblocker. pfblocker just adds a bunch of large alias's that exacerbate the issue.

      B B 2 Replies Last reply Apr 1, 2020, 2:27 PM Reply Quote 0
      • B
        bmeeks @A Former User
        last edited by bmeeks Apr 1, 2020, 2:28 PM Apr 1, 2020, 2:27 PM

        @jwj said in Increased Memory and CPU Spikes (causing latency/outage) with 2.4.5:

        @bmeeks Thanks! I will add that the issue exists without pfblocker. pfblocker just adds a bunch of large alias's that exacerbate the issue.

        Notice in the header for the posted Errata who is credited with the "fix" and read what the fix was about -- increasing table size limits (I think for IPv6 bogons and a side effect of allowing bigger pfBlockerNG lists). I have not looked at the actual patch, so maybe it is not related -- but it definitely might be worth looking into. Perhaps there are unintended adverse side effects from the change ???

        ? 1 Reply Last reply Apr 1, 2020, 2:44 PM Reply Quote 0
        • B
          BBcan177 Moderator @A Former User
          last edited by Apr 1, 2020, 2:43 PM

          @jwj and others
          Try to reduce the setting in: pfSense > Advanced > Firewall & NAT > Firewall Maximum Table Entries as per this thread:
          https://www.reddit.com/r/PFSENSE/comments/fsx4mx/fix_for_tmprulesdebug28_cannot_define_table_pfb/

          "Experience is something you don't get until just after you need it."

          Website: http://pfBlockerNG.com
          Twitter: @BBcan177  #pfBlockerNG
          Reddit: https://www.reddit.com/r/pfBlockerNG/new/

          T 1 Reply Last reply Apr 1, 2020, 2:53 PM Reply Quote 0
          • ?
            A Former User @bmeeks
            last edited by Apr 1, 2020, 2:44 PM

            So, we already have the "fix".

            B 1 Reply Last reply Apr 1, 2020, 2:55 PM Reply Quote 0
            • T
              tman222 @BBcan177
              last edited by Apr 1, 2020, 2:53 PM

              @BBcan177 said in Increased Memory and CPU Spikes (causing latency/outage) with 2.4.5:

              @jwj and others
              Try to reduce the setting in: pfSense > Advanced > Firewall & NAT > Firewall Maximum Table Entries as per this thread:
              https://www.reddit.com/r/PFSENSE/comments/fsx4mx/fix_for_tmprulesdebug28_cannot_define_table_pfb/

              Thanks @BBcan177 - mine is currently set at the default (2 Million). Should it be reduced below that to help mitigate the load and latency spikes?

              Thanks again.

              B ? 2 Replies Last reply Apr 1, 2020, 2:54 PM Reply Quote 0
              • B
                BBcan177 Moderator @tman222
                last edited by Apr 1, 2020, 2:54 PM

                @tman222
                I have no idea. This is why I am asking users to try lower values and see how it responds.

                "Experience is something you don't get until just after you need it."

                Website: http://pfBlockerNG.com
                Twitter: @BBcan177  #pfBlockerNG
                Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                1 Reply Last reply Reply Quote 0
                • B
                  bmeeks @A Former User
                  last edited by bmeeks Apr 1, 2020, 2:57 PM Apr 1, 2020, 2:55 PM

                  @jwj said in Increased Memory and CPU Spikes (causing latency/outage) with 2.4.5:

                  So, we already have the "fix".

                  It appears to me, from reading the FreeBSD 11/STABLE Release Notes, that the patch submitted for pfctl was accepted and incorporated. So I would assume that patch also made its way into pfSense-2.4.5.

                  It's possible that patch has some unintended side effects. And since the problems seem to be triggered by users doing things that cause pfctl to come into play (reloading filters or updating alias tables), that is more circumstantial evidence of a possible link to recent pfctl changes and the utilization/latency issue.

                  1 Reply Last reply Reply Quote 0
                  • ?
                    A Former User @tman222
                    last edited by Apr 1, 2020, 2:56 PM

                    @tman222 I just played about with this. Removed block bogons on my WAN. Tried various table size settings from 100000 to, what for me was the default. 4000000. Didn't notice any difference. Checked the system log to look for memory allocation issues, there were none at each setting.

                    B 1 Reply Last reply Apr 1, 2020, 3:08 PM Reply Quote 0
                    • B
                      BBcan177 Moderator @A Former User
                      last edited by BBcan177 Apr 1, 2020, 3:08 PM Apr 1, 2020, 3:08 PM

                      @jwj
                      You need to run a "Filter Reload" and/or a Reboot to fully ensure it took effect.

                      "Experience is something you don't get until just after you need it."

                      Website: http://pfBlockerNG.com
                      Twitter: @BBcan177  #pfBlockerNG
                      Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                      ? 1 Reply Last reply Apr 1, 2020, 3:10 PM Reply Quote 0
                      • ?
                        A Former User @BBcan177
                        last edited by Apr 1, 2020, 3:10 PM

                        @BBcan177 I did, filter reload. It warns you if you increase it such that a reboot is required.

                        1 Reply Last reply Reply Quote 0
                        • ?
                          A Former User
                          last edited by A Former User Apr 1, 2020, 5:12 PM Apr 1, 2020, 4:56 PM

                          @BBcan177 @bmeeks Thanks for all your help and involvement since 2.4.5 was released. Your packages are fine but you have done your best to help as many as possible. 👏

                          1 Reply Last reply Reply Quote 0
                          • N
                            nzkiwi68
                            last edited by Apr 1, 2020, 6:30 PM

                            I'm experiencing the same issues as reported here under my post "Upgrade HA cluster 2.4.4-p3 to 2.4.5 - persistent CARP maintenance mode causes gateway instability" https://forum.netgate.com/topic/151698/upgrade-ha-cluster-2-4-4-p3-to-2-4-5-persistent-carp-maintenance-mode-causes-gateway-instability

                            2 sites now running really badly. Both sites running 10Gbase-SR with multi VLANs on the 10 Gb interfaces.

                            SiteA - main problem
                            Cannot have both firewalls up, primary and backup. If you do, zero VPN traffic passes over direct traditional site to site IPSEC or over the VTI routed FRR interfaces.
                            Left with the backup firewall powered off and the site is working.

                            SiteB - main problem
                            Massive instability following a reboot, and it just carries on and on, with all three gateways on both the primary and secondary firewall going nuts. The firewalls stagger and drop packets. In the end left the backup firewall powered off and after about 10-15 minutes following a reboot, the gateways stop going offline and the firewall settles down and becomes stable.

                            1 Reply Last reply Reply Quote 0
                            • ?
                              A Former User
                              last edited by A Former User Apr 1, 2020, 6:50 PM Apr 1, 2020, 6:39 PM

                              @bmeeks @BBcan177

                              I turned off bogons. I deactivated pfblocker. I set the max table size to 60000. Rebooted. The reboot was quick again, like 2.4.4-p3. I ping6 google.com from a lan side device while doing a filter reload. The ping times don't change by any meaningful amount.

                              Makes me wonder if the pfctl fix was overlooked when the release was built?

                              Set max table size to 100000. Reboot. Reboot is longer again. Turn on pfblocker and some ip lists that add up to more than 60000 but less than 100000. Problem returns. Latency when reloading the filters. Bigger tables bigger problem.

                              Edited to add: the max table size doesn't appear to make any difference, other than setting a hard limit on table size. The actual size of the aliases/tables is what triggers the problem.

                              It sure looks to me that anything over that sixty some thousand mark causes the issue. I could be wrong, wouldn't be the first time, but this sure looks like the issue.

                              B 2 Replies Last reply Apr 1, 2020, 7:01 PM Reply Quote 0
                              • B
                                bmeeks @A Former User
                                last edited by bmeeks Apr 1, 2020, 7:22 PM Apr 1, 2020, 7:01 PM

                                @jwj said in Increased Memory and CPU Spikes (causing latency/outage) with 2.4.5:

                                @bmeeks @BBcan177

                                I turned off bogons. I deactivated pfblocker. I set the max table size to 60000. Rebooted. The reboot was quick again, like 2.4.4-p3. I ping6 google.com from a lan side device while doing a filter reload. The ping times don't change by any meaningful amount.

                                Makes me wonder if the pfctl fix was overlooked when the release was built?

                                Set max table size to 100000. Reboot. Reboot is longer again. Turn on pfblocker and some ip lists that add up to more than 60000 but less than 100000. Problem returns. Latency when reloading the filters. Bigger tables bigger problem.

                                Edited to add: the max table size doesn't appear to make any difference, other than setting a hard limit on table size. The actual size of the aliases/tables is what triggers the problem.

                                It sure looks to me that anything over that sixty some thousand mark causes the issue. I could be wrong, wouldn't be the first time, but this sure looks like the issue.

                                The actual patch file can be accessed here: https://security.FreeBSD.org/patches/EN-20:04/pfctl.patch. What the patch does is remove the former arbitrary hardcoded limit of 65,535 (defined as PF_TABLES_MAX_REQUEST) and allows the use of a sysctl parameter instead. Deeper research into the other pf related source code would be required to determine if allowing that larger PF_TABLES_MAX_REQUEST value has an adverse impact.

                                Looking a bit farther into what the patch actually does gives me a theory. The 65,535 number does not appear to be a limit on the number of IP addresses in a given table. It appears, instead, to be a limit on the number of tables or addresses you can add to the firewall during a single call to the corresponding ioctl() function. That limit was formerly hardcoded to 65,535. Now, with the addition of a sysctl variable for customizing this limit, I can envision a scenario where with a very high value for this new sysctl value that you are overloading the other pf areas. In particular, you would be requesting "too many tables and/or addresses in a single ioctl() call". So this may well be why lowering the value improves performance! You are no longer "overloading" the other ioctl routines that are actually creating the tables or addresses in RAM.

                                G 2 Replies Last reply Apr 1, 2020, 7:27 PM Reply Quote 0
                                • G
                                  getcom @getcom
                                  last edited by Apr 1, 2020, 7:02 PM

                                  @getcom said in Increased Memory and CPU Spikes (causing latency/outage) with 2.4.5:

                                  The system is not accessible for minutes if anything changed.
                                  As I added some new VLANs it never came back, I had to go onsite for a reboot which is not so easy at the moment because everybody is working from home.

                                  It happened again: I need a VLAN tag on one interface which was previously working as normal device.

                                  • created a new VLAN
                                  • changed name of parent device because name should be reused in the VLAN device
                                  • changed static IPv4 to none
                                  • press Save
                                  • apply change
                                  • bamm...connection interrupted, VPN stays connected, but without any traffic...it does not come back, VPN reconnection not working
                                  • no chance to connect over the second gateway
                                  • again I have to go onsite

                                  This is a dual WAN/tier 1/tier 2 setup.
                                  With 2.4.5 in a multiwan setup you cannot change anything on the interfaces without loosing the firewall.
                                  This is a show blocker and loosing larger lists too.
                                  Tomorrow I will drive to the customer and rollback to the 2.4.4-p3 release and the previous pfB until there is a fix available..

                                  N 1 Reply Last reply Apr 1, 2020, 7:32 PM Reply Quote 0
                                  • ?
                                    A Former User
                                    last edited by Apr 1, 2020, 7:03 PM

                                    Seeing as this appears to affect so many people, is it worth writing up a decent Redmine ticket and submitting it?

                                    D 1 Reply Last reply Apr 2, 2020, 3:03 PM Reply Quote 1
                                    • B
                                      bmeeks @A Former User
                                      last edited by bmeeks Apr 1, 2020, 7:20 PM Apr 1, 2020, 7:16 PM

                                      @jwj said in Increased Memory and CPU Spikes (causing latency/outage) with 2.4.5:

                                      @bmeeks @BBcan177

                                      I turned off bogons. I deactivated pfblocker. I set the max table size to 60000. Rebooted. The reboot was quick again, like 2.4.4-p3. I ping6 google.com from a lan side device while doing a filter reload. The ping times don't change by any meaningful amount.

                                      Makes me wonder if the pfctl fix was overlooked when the release was built?

                                      Set max table size to 100000. Reboot. Reboot is longer again. Turn on pfblocker and some ip lists that add up to more than 60000 but less than 100000. Problem returns. Latency when reloading the filters. Bigger tables bigger problem.

                                      Edited to add: the max table size doesn't appear to make any difference, other than setting a hard limit on table size. The actual size of the aliases/tables is what triggers the problem.

                                      It sure looks to me that anything over that sixty some thousand mark causes the issue. I could be wrong, wouldn't be the first time, but this sure looks like the issue.

                                      See my later edit to my post here: https://forum.netgate.com/topic/151690/increased-memory-and-cpu-spikes-causing-latency-outage-with-2-4-5/91. I have a theory why a value less that 65,536 seems to work better.

                                      ? 1 Reply Last reply Apr 1, 2020, 7:30 PM Reply Quote 0
                                      • G
                                        getcom @bmeeks
                                        last edited by Apr 1, 2020, 7:27 PM

                                        This post is deleted!
                                        1 Reply Last reply Reply Quote 0
                                        • ?
                                          A Former User @bmeeks
                                          last edited by Apr 1, 2020, 7:30 PM

                                          @bmeeks Makes sense, since they're all loaded with one call. Total number of all tables would have to be under that number.

                                          Also makes me take note of the fact that the "fork" of pfsense is still on 11.2 even as they have been more aggressive with pursuing freebsd upgrades historically.

                                          B 1 Reply Last reply Apr 1, 2020, 7:32 PM Reply Quote 0
                                          86 out of 141
                                          • First post
                                            86/141
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.