k
iptables-save -c -t nat
для начала.[90995:5459684] -A POSTROUTING ! -s 10.112.105.64/26 ! -d 10.112.105.64/26 -m ipvs --vdir ORIGINAL --vmethod MASQ -m comment --comment "" -j SNAT --to-source 10.36.20.4
Size: a a a
k
iptables-save -c -t nat
для начала.[90995:5459684] -A POSTROUTING ! -s 10.112.105.64/26 ! -d 10.112.105.64/26 -m ipvs --vdir ORIGINAL --vmethod MASQ -m comment --comment "" -j SNAT --to-source 10.36.20.4
k
AD
filter
: iptables-save -c -t filter
k
filter
: iptables-save -c -t filter
k
filter
: iptables-save -c -t filter
# Generated by iptables-save v1.8.2 on Tue Mar 2 16:33:06 2021ситуация не поменялась
*mangle
:PREROUTING ACCEPT [554724797:845322980547]
:INPUT ACCEPT [526020752:841677109567]
:FORWARD ACCEPT [24530549:3312885289]
:OUTPUT ACCEPT [464329197:1316213539757]
:POSTROUTING ACCEPT [487179094:1318927439186]
:KUBE-KUBELET-CANARY - [0:0]
COMMIT
# Completed on Tue Mar 2 16:33:06 2021
# Generated by iptables-save v1.8.2 on Tue Mar 2 16:33:06 2021
*nat
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
COMMIT
# Completed on Tue Mar 2 16:33:06 2021
# Generated by iptables-save v1.8.2 on Tue Mar 2 16:33:06 2021
*raw
:PREROUTING ACCEPT [554724859:845322987787]
:OUTPUT ACCEPT [464329348:1316213555500]
COMMIT
# Completed on Tue Mar 2 16:33:06 2021
# Generated by iptables-save v1.8.2 on Tue Mar 2 16:33:06 2021
*filter
:INPUT ACCEPT [136188:111172492]
:FORWARD ACCEPT [496:2950043]
:OUTPUT ACCEPT [155218:480567505]
COMMIT
# Completed on Tue Mar 2 16:33:06 2021
AD
conntrack -F
k
conntrack -F
k
# tcpdump -nn port 1234 -i vmbr0меня настораживает количество пакетов dropped by kernel🤔
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vmbr0, link-type EN10MB (Ethernet), capture size 262144 bytes
16:36:06.535868 IP 10.36.20.5.49998 > 10.36.20.0.1234: Flags [S], seq 3085246482, win 64240, options [mss 1460,sackOK,TS val 2885861412 ecr 0,nop,wscale 7], length 0
16:36:07.559569 IP 10.36.20.5.49998 > 10.36.20.0.1234: Flags [S], seq 3085246482, win 64240, options [mss 1460,sackOK,TS val 2885862436 ecr 0,nop,wscale 7], length 0
16:36:09.575526 IP 10.36.20.5.49998 > 10.36.20.0.1234: Flags [S], seq 3085246482, win 64240, options [mss 1460,sackOK,TS val 2885864452 ecr 0,nop,wscale 7], length 0
16:36:13.767537 IP 10.36.20.5.49998 > 10.36.20.0.1234: Flags [S], seq 3085246482, win 64240, options [mss 1460,sackOK,TS val 2885868644 ecr 0,nop,wscale 7], length 0
^C
4 packets captured
582 packets received by filter
489 packets dropped by kernel
AD
# tcpdump -nn port 1234 -i vmbr0меня настораживает количество пакетов dropped by kernel🤔
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vmbr0, link-type EN10MB (Ethernet), capture size 262144 bytes
16:36:06.535868 IP 10.36.20.5.49998 > 10.36.20.0.1234: Flags [S], seq 3085246482, win 64240, options [mss 1460,sackOK,TS val 2885861412 ecr 0,nop,wscale 7], length 0
16:36:07.559569 IP 10.36.20.5.49998 > 10.36.20.0.1234: Flags [S], seq 3085246482, win 64240, options [mss 1460,sackOK,TS val 2885862436 ecr 0,nop,wscale 7], length 0
16:36:09.575526 IP 10.36.20.5.49998 > 10.36.20.0.1234: Flags [S], seq 3085246482, win 64240, options [mss 1460,sackOK,TS val 2885864452 ecr 0,nop,wscale 7], length 0
16:36:13.767537 IP 10.36.20.5.49998 > 10.36.20.0.1234: Flags [S], seq 3085246482, win 64240, options [mss 1460,sackOK,TS val 2885868644 ecr 0,nop,wscale 7], length 0
^C
4 packets captured
582 packets received by filter
489 packets dropped by kernel
ip l ls master vmbr0
k
ip l ls master vmbr0
8: bond0: <BROADCAST,MULTICAST,MASTER,UP,LOWER_UP> mtu 1500 qdisc noqueue master vmbr0 state UP mode DEFAULT group default qlen 1000
link/ether 90:e2:ba:c4:68:c4 brd ff:ff:ff:ff:ff:ff
ML
AD
# tcpdump -nn port 1234 -i vmbr0меня настораживает количество пакетов dropped by kernel🤔
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vmbr0, link-type EN10MB (Ethernet), capture size 262144 bytes
16:36:06.535868 IP 10.36.20.5.49998 > 10.36.20.0.1234: Flags [S], seq 3085246482, win 64240, options [mss 1460,sackOK,TS val 2885861412 ecr 0,nop,wscale 7], length 0
16:36:07.559569 IP 10.36.20.5.49998 > 10.36.20.0.1234: Flags [S], seq 3085246482, win 64240, options [mss 1460,sackOK,TS val 2885862436 ecr 0,nop,wscale 7], length 0
16:36:09.575526 IP 10.36.20.5.49998 > 10.36.20.0.1234: Flags [S], seq 3085246482, win 64240, options [mss 1460,sackOK,TS val 2885864452 ecr 0,nop,wscale 7], length 0
16:36:13.767537 IP 10.36.20.5.49998 > 10.36.20.0.1234: Flags [S], seq 3085246482, win 64240, options [mss 1460,sackOK,TS val 2885868644 ecr 0,nop,wscale 7], length 0
^C
4 packets captured
582 packets received by filter
489 packets dropped by kernel
nstat -a TcpExtIPReversePathFilter
счётчик, случаем, не прибавляется?A
A
k
nstat -a TcpExtIPReversePathFilter
счётчик, случаем, не прибавляется?# nstat -a TcpExtIPReversePathFilter
#kernel
AD
# nstat -a TcpExtIPReversePathFilter
#kernel
ML
k
# nstat -a TcpExtIPReversePathFilter
#kernel
IP
A