服务器配置:
品牌:SA5212H2 CPU:Intel(R) Xeon(R) CPU E5-2407 0 @ 2.20GHz 内存:16g
服务器资源使用
操作系统版本:
[root@]# uname -a
Linux 3.10.0-229.20.1.el7.x86_64 #1 SMP Tue Nov 3 19:10:07 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
[root@f ]# cat /etc/redhat-release
CentOS Linux release 7.1.1503 (Core)
bond0配置(bond是我在重装系统的时候做的)
网卡配置
eth0
NAME=bond0 slave 1
MASTER=a25343c6-c96c-4683-ae48-848e3fca704f
HWADDR=
TYPE=Ethernet
ONBOOT=yes
UUID=0a553f1d-85a8-4446-9ee2-88dc085a4e92
eth1
# Generated by parse-kickstart
NAME=bond0 slave 2
MASTER=a25343c6-c96c-4683-ae48-848e3fca704f
HWADDR=
TYPE=Ethernet
ONBOOT=yes
UUID=f0426c72-a3c4-4803-b797-37824fa34c87
出现的问题是:
bond0 (bond0使用的mac地址是eth1的)接口dropped 丢包每一秒丢一个包。
关掉eth0 bond0 dropped 丢包消失
以下是我截取到的http报文
tcpdump -i bond0 dst port 80
17:05:40.338486 IP 61.1.10.1.39215 > 61.156.241.174.http: Flags [F.], seq 978338840, ack 1177028699, win 31, length 0
17:05:40.710831 IP 61.1.10.1.35946 > 61.158.164.155.http: Flags [F.], seq 47910714, ack 2457429085, win 31, length 0
17:05:46.027797 IP 115.29.222.217.63731 > 61.1.10.1.http: Flags [S], seq 4281715269, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
17:05:46.061259 IP 115.29.222.217.63731 > 61.1.10.1.http: Flags [.], ack 2669976514, win 256, length 0
17:05:46.061901 IP 115.29.222.217.63731 > 61.1.10.1.http: Flags [P.], seq 0:208, ack 1, win 256, length 208
17:05:46.110941 IP 115.29.222.217.63732 > 61.1.10.1.http: Flags [S], seq 2654506387, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
17:05:46.139890 IP 115.29.222.217.63732 > 61.1.10.1.http: Flags [.], ack 3781507412, win 256, length 0
17:05:46.140269 IP 115.29.222.217.63732 > 61.1.10.1.http: Flags [P.], seq 0:558, ack 1, win 256, length 558
17:05:46.297245 IP 115.29.222.217.63731 > 61.1.10.1.http: Flags [.], ack 239, win 255, length 0
17:05:46.374184 IP 115.29.222.217.63732 > 61.1.10.1.http: Flags [.], ack 239, win 255, length 0
17:05:46.852699 IP 115.29.222.217.63731 > 61.1.10.1.http: Flags [F.], seq 208, ack 239, win 255, length 0
17:05:46.886398 IP 115.29.222.217.63731 > 61.1.10.1.http: Flags [.], ack 240, win 255, length 0
17:05:50.981886 IP 139.226.22.194.53517 > 61.1.10.1.http: Flags [.], ack 1945224633, win 35250, length 0
17:05:51.050212 IP 61.135.170.194.43668 > 61.1.10.1.http: Flags [S], seq 464709165, win 5840, options [mss 1460,sackOK,TS val 2835300322 ecr 0,nop,wscale 7], length 0
17:05:51.053238 IP 61.135.170.194.51171 > 112.65.222.182.http: Flags [S], seq 470525896, win 5840, options [mss 1460,sackOK,TS val 2835300323 ecr 0,nop,wscale 7], length 0
17:05:51.076869 IP 61.135.170.194.43668 > 61.1.10.1.http: Flags [.], ack 2979511321, win 46, options [nop,nop,TS val 2835300329 ecr 1148734261], length 0
17:05:51.077953 IP 61.135.170.194.51171 > 112.65.222.182.http: Flags [.], ack 1019414286, win 46, options [nop,nop,TS val 2835300330 ecr 1148734264], length 0
17:05:51.079276 IP 61.135.170.194.43668 > 61.1.10.1.http: Flags [P.], seq 0:279, ack 1, win 46, options [nop,nop,TS val 2835300330 ecr 1148734261], length 279
17:05:51.081615 IP 61.135.170.194.51171 > 112.65.222.182.http: Flags [P.], seq 0:279, ack 1, win 46, options [nop,nop,TS val 2835300330 ecr 1148734264], length 279
17:05:51.106661 IP 61.135.170.194.51171 > 112.65.222.182.http: Flags [.], ack 258, win 54, options [nop,nop,TS val 2835300337 ecr 1148734293], length 0
17:05:51.114997 IP 61.135.170.194.51171 > 112.65.222.182.http: Flags [F.], seq 279, ack 259, win 54, options [nop,nop,TS val 2835300339 ecr 1148734293], length 0
17:05:51.115768 IP 61.135.170.194.43668 > 61.1.10.1.http: Flags [F.], seq 279, ack 259, win 54, options [nop,nop,TS val 2835300339 ecr 1148734291], length 0
17:05:58.889023 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [S], seq 3404001604, win 65535, options [mss 1460,nop,wscale 0,nop,nop,sackOK], length 0
17:05:58.892591 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [.], ack 4119620738, win 65535, length 0
17:05:58.892947 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [P.], seq 0:260, ack 1, win 65535, length 260
17:05:58.897836 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [P.], seq 260:448, ack 444, win 65092, length 188
17:05:58.902468 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [.], ack 3364, win 65535, length 0
17:05:58.902505 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [.], ack 4824, win 65535, length 0
17:05:59.199284 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [.], ack 582292, win 64767, length 0
17:06:02.428984 IP 112.64.235.86.44454 > 61.1.10.1.http: Flags [S], seq 3264687314, win 5840, options [mss 1460,sackOK,TS val 24553782 ecr 0,nop,wscale 9], length 0
17:06:02.431358 IP 112.64.235.86.44454 > 61.1.10.1.http: Flags [.], ack 4086212070, win 12, options [nop,nop,TS val 24553782 ecr 1148745640], length 0
17:06:02.431406 IP 112.64.235.86.44454 > 61.1.10.1.http: Flags [P.], seq 0:439, ack 1, win 12, options [nop,nop,TS val 24553782 ecr 1148745640], length 439
17:06:02.432274 IP 61.1.10.1.50392 > 61.156.241.175.http: Flags [S], seq 3530807695, win 14600, options [mss 1460,sackOK,TS val 1148745643 ecr 0,nop,wscale 9], length 0
17:06:02.448167 IP 61.1.10.1.50392 > 61.156.241.175.http: Flags [.], ack 152401547, win 29, length 0
17:06:02.448227 IP 61.1.10.1.50392 > 61.156.241.175.http: Flags [P.], seq 0:533, ack 1, win 29, length 533
17:06:02.546523 IP 61.1.10.1.50392 > 61.156.241.175.http: Flags [.], ack 360, win 31, length 0
17:06:02.549152 IP 112.64.235.86.44454 > 61.1.10.1.http: Flags [.], ack 391, win 14, options [nop,nop,TS val 24553812 ecr 1148745758], length 0
17:06:02.549215 IP 112.64.235.86.44454 > 61.1.10.1.http: Flags [F.], seq 439, ack 392, win 14, options [nop,nop,TS val 24553812 ecr 1148745758], length 0
17:06:02.549241 IP 112.64.235.86.44485 > 61.1.10.1.http: Flags [S], seq 3266762300, win 5840, options [mss 1460,sackOK,TS val 24553812 ecr 0,nop,wscale 9], length 0
17:06:02.551294 IP 112.64.235.86.44485 > 61.1.10.1.http: Flags [.], ack 535628582, win 12, options [nop,nop,TS val 24553812 ecr 1148745760], length 0
17:06:02.551344 IP 112.64.235.86.44485 > 61.1.10.1.http: Flags [P.], seq 0:417, ack 1, win 12, options [nop,nop,TS val 24553812 ecr 1148745760], length 417
17:06:02.554195 IP 112.64.235.86.44485 > 61.1.10.1.http: Flags [.], ack 1449, win 18, options [nop,nop,TS val 24553813 ecr 1148745763], length 0
17:06:02.554215 IP 112.64.235.86.44485 > 61.1.10.1.http: Flags [.], ack 4345, win 23, options [nop,nop,TS val 24553813 ecr 1148745763], length 0
17:06:02.554228 IP 112.64.235.86.44485 > 61.1.10.1.http: Flags [R.], seq 417, ack 4345, win 23, options [nop,nop,TS val 24553813 ecr 1148745763], length 0
17:06:16.171119 IP 115.29.222.217.63732 > 61.1.10.1.http: Flags [.], ack 240, win 255, length 0
17:06:20.817635 IP 139.226.22.194.53517 > 61.1.10.1.http: Flags [F.], seq 0, ack 1, win 35250, length 0
17:06:20.831027 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [S], seq 2255959654, win 8192, options [mss 1400,nop,wscale 2,nop,nop,sackOK], length 0
17:06:20.846405 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 3361684270, win 16567, length 0
17:06:20.846442 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [P.], seq 0:260, ack 1, win 16567, length 260
17:06:20.856858 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [P.], seq 260:448, ack 444, win 16456, length 188
17:06:20.863273 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 3244, win 16567, length 0
17:06:20.865772 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 7444, win 16567, length 0
17:06:20.866249 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 11644, win 16567, length 0
17:06:21.055303 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 571644, win 16567, length 0
17:06:21.064680 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 575508, win 16567, length 0
17:06:21.064693 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 579260, win 16567, length 0
17:06:21.064696 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 582292, win 16567, length 0
17:06:28.981425 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [.], ack 582293, win 64767, length 0
17:06:32.545946 IP 61.1.10.1.50392 > 61.156.241.175.http: Flags [F.], seq 533, ack 361, win 31, length 0
17:06:33.019369 IP 61.1.10.1.50392 > 61.156.241.175.http: Flags [.], ack 361, win 31, options [nop,nop,sack 1 {360:361}], length 0
17:06:33.301454 IP 61.1.10.1.50392 > 61.156.241.175.http: Flags [F.], seq 533, ack 361, win 31, length 0
17:06:35.354688 IP 210.13.94.157.16702 > 61.1.10.1.http: Flags [F.], seq 999380700, ack 53647190, win 65535, length 0
17:06:35.355157 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [S], seq 3536386158, win 65535, options [mss 1460,nop,nop,sackOK], length 0
17:06:35.361759 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 2449944162, win 65535, length 0
17:06:35.362296 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [P.], seq 0:235, ack 1, win 65535, length 235
17:06:35.373074 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 7301, win 65535, length 0
17:06:35.373846 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 16061, win 59695, length 0
17:06:35.374822 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 20441, win 55315, length 0
17:06:35.376290 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 35041, win 40715, length 0
17:06:35.380174 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 37961, win 37795, length 0
17:06:35.380765 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 43801, win 31955, length 0
17:06:35.381143 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 48181, win 27575, length 0
17:06:35.381153 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 52561, win 23195, length 0
17:06:35.382164 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 59861, win 15895, length 0
17:06:35.382694 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 65701, win 10055, length 0
17:06:35.383286 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 71541, win 4215, length 0
17:06:35.383714 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 74461, win 1295, length 0
17:06:35.393351 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 74461, win 5055, length 0
17:06:35.393399 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 74461, win 65535, length 0
17:06:35.401663 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 80301, win 65535, length 0
17:06:35.402996 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 83221, win 65535, length 0
17:06:35.403311 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 87601, win 65535, length 0
17:06:35.403335 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 93314, win 65535, length 0
17:06:48.552942 IP 115.29.222.217.64786 > 61.1.10.1.http: Flags [S], seq 3863560027, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
17:06:48.587482 IP 115.29.222.217.64786 > 61.1.10.1.http: Flags [.], ack 516459580, win 256, length 0
17:06:48.587529 IP 115.29.222.217.64786 > 61.1.10.1.http: Flags [P.], seq 0:208, ack 1, win 256, length 208
17:06:48.636870 IP 115.29.222.217.64790 > 61.1.10.1.http: Flags [S], seq 1459101229, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
17:06:48.664935 IP 115.29.222.217.64790 > 61.1.10.1.http: Flags [.], ack 3239240326, win 256, length 0
17:06:48.665547 IP 115.29.222.217.64790 > 61.1.10.1.http: Flags [P.], seq 0:558, ack 1, win 256, length 558
17:06:48.821821 IP 115.29.222.217.64786 > 61.1.10.1.http: Flags [.], ack 239, win 255, length 0
17:06:48.890830 IP 115.29.222.217.64790 > 61.1.10.1.http: Flags [.], ack 239, win 255, length 0
17:06:49.742476 IP 115.29.222.217.64786 > 61.1.10.1.http: Flags [F.], seq 208, ack 239, win 255, length 0
17:06:49.775921 IP 115.29.222.217.64786 > 61.1.10.1.http: Flags [.], ack 240, win 255, length 0
17:06:50.976340 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 582293, win 16567, length 0
17:06:58.888931 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [S], seq 264411760, win 65535, options [mss 1460,nop,wscale 0,nop,nop,sackOK], length 0
17:06:58.891584 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [.], ack 2739712364, win 65535, length 0
17:06:58.891978 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [P.], seq 0:260, ack 1, win 65535, length 260
17:06:58.896269 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [P.], seq 260:448, ack 444, win 65092, length 188
17:06:58.900719 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [.], ack 3364, win 65535, length 0
17:06:58.900765 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [.], ack 4824, win 65535, length 0
17:06:58.901119 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [.], ack 7744, win 65535, length 0
17:06:58.901133 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [.], ack 9204, win 65535, length 0
dropwatch -l kas
2 drops at ip_rcv_finish+16c (0xffffffff815364ec)
3 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)
3 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)
1 drops at sk_stream_kill_queues+50 (0xffffffff814f3090)
2 drops at unix_stream_connect+2ca (0xffffffff815a340a)
1 drops at __netif_receive_skb_core+703 (0xffffffff814fc173)
1 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)
1 drops at sk_stream_kill_queues+50 (0xffffffff814f3090)
6 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)
6 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)
2 drops at ip_rcv_finish+16c (0xffffffff815364ec)
2 drops at unix_stream_connect+2ca (0xffffffff815a340a)
5 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)
5 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)
2 drops at ip_rcv_finish+16c (0xffffffff815364ec)
2 drops at unix_stream_connect+2ca (0xffffffff815a340a)
1 drops at __netif_receive_skb_core+703 (0xffffffff814fc173)
8 drops at skb_queue_purge+18 (0xffffffff814ecd38)
2 drops at unix_stream_connect+2ca (0xffffffff815a340a)
3 drops at ip_rcv_finish+16c (0xffffffff815364ec)
2 drops at unix_stream_connect+2ca (0xffffffff815a340a)
2 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)
2 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)
2 drops at unix_stream_connect+2ca (0xffffffff815a340a)
3 drops at ip_rcv_finish+16c (0xffffffff815364ec)
2 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)
2 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)
2 drops at unix_stream_connect+2ca (0xffffffff815a340a)
1 drops at __netif_receive_skb_core+703 (0xffffffff814fc173)
4 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)
4 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)
14 drops at unix_stream_connect+2ca (0xffffffff815a340a)
2 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)
2 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)
1 drops at __netif_receive_skb_core+703 (0xffffffff814fc173)
8 drops at skb_queue_purge+18 (0xffffffff814ecd38)
1 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)
1 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)
8 drops at unix_stream_connect+2ca (0xffffffff815a340a)
20 drops at unix_stream_connect+2ca (0xffffffff815a340a)
12 drops at unix_stream_connect+2ca (0xffffffff815a340a)
1 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)
1 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)
2 drops at ip_rcv_finish+16c (0xffffffff815364ec)
2 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)
2 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)
1 drops at tcp_v4_rcv+78 (0xffffffff8155bf88)
2 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)
2 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)
2 drops at ip_rcv_finish+16c (0xffffffff815364ec)
2 drops at unix_stream_connect+2ca (0xffffffff815a340a)
4 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)
4 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)
^CGot a stop message
请高手指点谢谢