yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #53495
[Bug 1599781] [NEW] [stable/liberty] LBaaS v2 haproxy: ROUND_ROBIN algorithm doesnt seems to work as expected
Public bug reported:
I am trying to test ROUND_ROBIN algorithm with lbaasv2 haproxy on stable/liberty.
With 4 members(web servers) in pool, I see there is some problem while scheduling in round robin fashion.
Webserver is running on CirrOS VM using unix utility "netcat".
MYIP=$(ifconfig eth0|grep 'inet addr'|awk -F: '{print $2}'| awk '{print $1}')
while true; do echo -e "HTTP/1.0 200 OK\r\n\r\nWelcome to $MYIP" | sudo nc -l -p 80 ; done&
setup details:
1 controller
50 KVM hosts
50 ESX hosts
root@controller:~# for i in {1..4} ; do curl 20.0.0.33 ; done
Welcome to 20.0.0.29
Welcome to 20.0.0.28
Welcome to 20.0.0.9
Welcome to 20.0.0.8
root@controller:~# for i in {1..8} ; do curl 20.0.0.33 ; done
Welcome to 20.0.0.29
Welcome to 20.0.0.28
Welcome to 20.0.0.9
Welcome to 20.0.0.8
Welcome to 20.0.0.29
Welcome to 20.0.0.28
Welcome to 20.0.0.9
Welcome to 20.0.0.29
root@controller:~#
root@controller:~# for i in {1..8} ; do curl 20.0.0.33 ; done
Welcome to 20.0.0.28
Welcome to 20.0.0.9
Welcome to 20.0.0.8
Welcome to 20.0.0.29
Welcome to 20.0.0.28
Welcome to 20.0.0.9
Welcome to 20.0.0.29
Welcome to 20.0.0.28
root@controller:~#
root@runner:~# neutron lbaas-pool-show 4f58e7c7-a079-4551-96b1-f0ed2e564392
+---------------------+------------------------------------------------+
| Field | Value |
+---------------------+------------------------------------------------+
| admin_state_up | True |
| description | |
| healthmonitor_id | |
| id | 4f58e7c7-a079-4551-96b1-f0ed2e564392 |
| lb_algorithm | ROUND_ROBIN |
| listeners | {"id": "cd840c0d-18f6-4621-a658-562067d0fa10"} |
| members | 23badd49-db2e-47f0-ad72-4bf3569bb697 |
| | 59cdf1a7-e502-4b52-8a86-66fa08f8b6e7 |
| | bdb7824b-5a66-4915-9756-25eaa27a01a8 |
| | ecc641f5-d86e-498c-9c45-4eb137c4ddc7 |
| name | test-lb-pool-http |
| protocol | HTTP |
| session_persistence | |
| tenant_id | ce1d087209c64df4b7e8007dc35def22 |
+---------------------+------------------------------------------------+
root@runner:~#
root@runner:~# neutron lbaas-member-list 4f58e7c7-a079-4551-96b1-f0ed2e564392
+--------------------------------------+-----------+---------------+--------+--------------------------------------+----------------+
| id | address | protocol_port | weight | subnet_id | admin_state_up |
+--------------------------------------+-----------+---------------+--------+--------------------------------------+----------------+
| 23badd49-db2e-47f0-ad72-4bf3569bb697 | 20.0.0.29 | 80 | 1 | 63cbeccd-6887-4dda-b4d2-b7503bce870a | True |
| 59cdf1a7-e502-4b52-8a86-66fa08f8b6e7 | 20.0.0.28 | 80 | 1 | 63cbeccd-6887-4dda-b4d2-b7503bce870a | True |
| bdb7824b-5a66-4915-9756-25eaa27a01a8 | 20.0.0.9 | 80 | 1 | 63cbeccd-6887-4dda-b4d2-b7503bce870a | True |
| ecc641f5-d86e-498c-9c45-4eb137c4ddc7 | 20.0.0.8 | 80 | 1 | 63cbeccd-6887-4dda-b4d2-b7503bce870a | True |
+--------------------------------------+-----------+---------------+--------+--------------------------------------+----------------+
root@runner:~#
tcpdump on LBaaS v2 port for http traffic:
root@controller:~# sudo ip netns exec qlbaas-79fae9be-7d0b-462b-bc3c-afb3e46c1613 tcpdump -B 25096 -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)'
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ns-59dda029-78, link-type EN10MB (Ethernet), capture size 65535 bytes
09:22:13.209622 IP 20.0.0.2.52188 > 20.0.0.33.http: Flags [P.], seq 2868154750:2868154823, ack 3872811792, win 229, options [nop,nop,TS val 188976129 ecr 188976129], length 73
E..}..@.@..........!...P...~..k......~.....
.C...C..GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.211104 IP 20.0.0.33.33783 > 20.0.0.28.http: Flags [P.], seq 4010926729:4010926829, ack 108303536, win 229, options [nop,nop,TS val 188976129 ecr 91267], length 100
E...n.@.@......!.......P.....t......(......
.C....d.GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.212138 IP 20.0.0.28.http > 20.0.0.33.33783: Flags [P.], seq 1:41, ack 0, win 3620, options [nop,nop,TS val 91267 ecr 188976129], length 40
E..\.3@.@.",.......!.P...t.........$(......
..d..C..HTTP/1.0 200 OK
Welcome to 20.0.0.28
09:22:13.212220 IP 20.0.0.33.http > 20.0.0.2.52188: Flags [P.], seq 1:41, ack 73, win 227, options [nop,nop,TS val 188976129 ecr 188976129], length 40
E..\..@.@.+h...!.....P....k.........(q.....
.C...C..HTTP/1.0 200 OK
Welcome to 20.0.0.28
09:22:13.219949 IP 20.0.0.2.52190 > 20.0.0.33.http: Flags [P.], seq 4133659441:4133659514, ack 3982402827, win 229, options [nop,nop,TS val 188976131 ecr 188976131], length 73
E..}/5@.@..#.......!...P.b.1.^......(......
.C...C..GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.227880 IP 20.0.0.33.39959 > 20.0.0.9.http: Flags [P.], seq 84504547:84504647, ack 435808612, win 229, options [nop,nop,TS val 188976133 ecr 23304383], length 100
E.....@.@..S...!... ...P. o....d....(......
.C...c..GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.237364 IP 20.0.0.9.http > 20.0.0.33.39959: Flags [P.], seq 1:40, ack 100, win 3620, options [nop,nop,TS val 23304386 ecr 188976133], length 39
E..[q.@.@...... ...!.P.....d. pG...$(w.....
.c...C..HTTP/1.0 200 OK
Welcome to 20.0.0.9
09:22:13.237408 IP 20.0.0.33.http > 20.0.0.2.52190: Flags [P.], seq 1:40, ack 73, win 227, options [nop,nop,TS val 188976136 ecr 188976131], length 39
E..[).@.@..r...!.....P...^...b.z....(p.....
.C...C..HTTP/1.0 200 OK
Welcome to 20.0.0.9
09:22:13.270062 IP 20.0.0.2.52192 > 20.0.0.33.http: Flags [P.], seq 3272086917:3272086990, ack 3623649623, win 229, options [nop,nop,TS val 188976144 ecr 188976144], length 73
E..}..@.@.x........!...P.......W....(......
.C...C..GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.284589 IP 20.0.0.33.37883 > 20.0.0.8.http: Flags [P.], seq 2068359609:2068359709, ack 3293483869, win 229, options [nop,nop,TS val 188976147 ecr 90565], length 100
E...%.@.@......!.......P{H...N.]....(......
.C....a.GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.312196 IP 20.0.0.8.http > 20.0.0.33.37883: Flags [P.], seq 1:40, ack 100, win 3620, options [nop,nop,TS val 90574 ecr 188976147], length 39
E..[..@.@..........!.P...N.]{H.....$(v.....
..a..C..HTTP/1.0 200 OK
Welcome to 20.0.0.8
09:22:13.312260 IP 20.0.0.33.http > 20.0.0.2.52192: Flags [P.], seq 1:40, ack 73, win 227, options [nop,nop,TS val 188976154 ecr 188976144], length 39
H@.@..3...!.....P.....W........(p.....
.C...C..HTTP/1.0 200 OK
Welcome to 20.0.0.8
09:22:13.366021 IP 20.0.0.2.52194 > 20.0.0.33.http: Flags [P.], seq 2661575587:2661575660, ack 2404931143, win 229, options [nop,nop,TS val 188976168 ecr 188976168], length 73
E..}..@.@.*........!...P..k..XVG....(......
.C.(.C.(GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.367772 IP 20.0.0.33.48437 > 20.0.0.29.http: Flags [P.], seq 1010430461:1010430561, ack 3762403146, win 229, options [nop,nop,TS val 188976168 ecr 20738120], length 100
E...}.@.@..L...!.....5.P<9...A.J....(......
.C.(.<pHGET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.369070 IP 20.0.0.29.http > 20.0.0.33.48437: Flags [P.], seq 1:41, ack 100, win 3620, options [nop,nop,TS val 20738121 ecr 188976168], length 40
E..\..@.@.KZ.......!.P.5.A.J<9.a...$(......
.<pI.C.(HTTP/1.0 200 OK
Welcome to 20.0.0.29
09:22:13.369101 IP 20.0.0.33.http > 20.0.0.2.52194: Flags [P.], seq 1:41, ack 73, win 227, options [nop,nop,TS val 188976169 ecr 188976168], length 40
E..\.o@.@.8
...!.....P...XVG..k.....(q.....
.C.).C.(HTTP/1.0 200 OK
Welcome to 20.0.0.29
09:22:13.376210 IP 20.0.0.2.52196 > 20.0.0.33.http: Flags [P.], seq 2610090558:2610090631, ack 4130193754, win 229, options [nop,nop,TS val 188976170 ecr 188976170], length 73
E..}^.@.@..?.......!...P...>.-.Z....(......
.C.*.C.*GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.377207 IP 20.0.0.33.33791 > 20.0.0.28.http: Flags [P.], seq 3012192692:3012192792, ack 3179475404, win 229, options [nop,nop,TS val 188976171 ecr 91308], length 100
E.....@.@.,....!.......P..i.........(......
.C.+..d.GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.378353 IP 20.0.0.28.http > 20.0.0.33.33791: Flags [P.], seq 1:41, ack 100, win 3620, options [nop,nop,TS val 91309 ecr 188976171], length 40
E..\.b@.@.|........!.P........j....$(......
..d..C.+HTTP/1.0 200 OK
Welcome to 20.0.0.28
09:22:13.378387 IP 20.0.0.33.http > 20.0.0.2.52196: Flags [P.], seq 1:41, ack 73, win 227, options [nop,nop,TS val 188976171 ecr 188976170], length 40
E..\Mp@.@.. ...!.....P...-.Z........(q.....
.C.+.C.*HTTP/1.0 200 OK
Welcome to 20.0.0.28
09:22:13.385287 IP 20.0.0.2.52198 > 20.0.0.33.http: Flags [P.], seq 1325632856:1325632929, ack 1972653513, win 229, options [nop,nop,TS val 188976173 ecr 188976173], length 73
E..}.|@.@..........!...PO..Xu.M.....(......
.C.-.C.-GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.386998 IP 20.0.0.33.39967 > 20.0.0.9.http: Flags [P.], seq 4247397792:4247397892, ack 2758048589, win 229, options [nop,nop,TS val 188976173 ecr 23304424], length 100
E.....@.@.h....!... ...P.*%..d{M....(......
.C.-.c..GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.388185 IP 20.0.0.9.http > 20.0.0.33.39967: Flags [P.], seq 1:40, ack 100, win 3620, options [nop,nop,TS val 23304424 ecr 188976173], length 39
E..[..@.@...... ...!.P...d{M.*&....$(w.....
.c...C.-HTTP/1.0 200 OK
Welcome to 20.0.0.9
09:22:13.388229 IP 20.0.0.33.http > 20.0.0.2.52198: Flags [P.], seq 1:40, ack 73, win 227, options [nop,nop,TS val 188976173 ecr 188976173], length 39
E..[..@.@.P....!.....P..u.M.O.......(p.....
.C.-.C.-HTTP/1.0 200 OK
Welcome to 20.0.0.9
09:22:13.422694 IP 20.0.0.2.52200 > 20.0.0.33.http: Flags [P.], seq 3719333564:3719333637, ack 775289273, win 229, options [nop,nop,TS val 188976182 ecr 188976182], length 73
E..}
.@.@..........!...P.....5......(......
.C.6.C.6GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.429202 IP 20.0.0.33.48444 > 20.0.0.29.http: Flags [P.], seq 3352428500:3352428600, ack 428882601, win 229, options [nop,nop,TS val 188976184 ecr 20738136], length 100
E...s.@.@..<...!.....<.P......:.....(......
.C.8.<pXGET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.429873 IP 20.0.0.29.http > 20.0.0.33.48444: Flags [P.], seq 1:41, ack 0, win 3620, options [nop,nop,TS val 20738136 ecr 188976184], length 40
E..\J.@.@..m.......!.P.<..:........$(......
.<pX.C.8HTTP/1.0 200 OK
Welcome to 20.0.0.29
09:22:13.429915 IP 20.0.0.33.http > 20.0.0.2.52200: Flags [P.], seq 1:41, ack 73, win 227, options [nop,nop,TS val 188976184 ecr 188976182], length 40
E..\u.@.@......!.....P...5..........(q.....
.C.8.C.6HTTP/1.0 200 OK
Welcome to 20.0.0.29
09:22:13.437423 IP 20.0.0.2.52203 > 20.0.0.33.http: Flags [P.], seq 1651650725:1651650798, ack 892136390, win 229, options [nop,nop,TS val 188976186 ecr 188976186], length 73
E..}..@.@.U........!...Pbr0.5,......(......
.C.:.C.:GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.438484 IP 20.0.0.33.33798 > 20.0.0.28.http: Flags [P.], seq 742963367:
^C742963467, ack 3974374035, win 229, options [nop,nop,TS val 188976186 ecr 91324], length 100
E...4.@.@......!.......P,H....".....(......
.C.:..d.GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.439562 IP 20.0.0.28.http > 20.0.0.33.33798: Flags [P.], seq 1:41, ack 100, win 3620, options [nop,nop,TS val 91324 ecr 188976186], length 40
E..\F0@.@../.......!.P....".,H.....$(......
..d..C.:HTTP/1.0 200 OK
Welcome to 20.0.0.28
09:22:13.439596 IP 20.0.0.33.http > 20.0.0.2.52203: Flags [P.], seq 1:41, ack 73, win 227, options [nop,nop,TS val 188976186 ecr 188976186], length 40
E..\g.@.@..}...!.....P..5,..br0.....(q.....
.C.:.C.:HTTP/1.0 200 OK
Welcome to 20.0.0.28
32 packets captured
32 packets received by filter
0 packets dropped by kernel
** Affects: neutron
Importance: Undecided
Status: New
** Tags: lbaas
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1599781
Title:
[stable/liberty] LBaaS v2 haproxy: ROUND_ROBIN algorithm doesnt seems
to work as expected
Status in neutron:
New
Bug description:
I am trying to test ROUND_ROBIN algorithm with lbaasv2 haproxy on stable/liberty.
With 4 members(web servers) in pool, I see there is some problem while scheduling in round robin fashion.
Webserver is running on CirrOS VM using unix utility "netcat".
MYIP=$(ifconfig eth0|grep 'inet addr'|awk -F: '{print $2}'| awk '{print $1}')
while true; do echo -e "HTTP/1.0 200 OK\r\n\r\nWelcome to $MYIP" | sudo nc -l -p 80 ; done&
setup details:
1 controller
50 KVM hosts
50 ESX hosts
root@controller:~# for i in {1..4} ; do curl 20.0.0.33 ; done
Welcome to 20.0.0.29
Welcome to 20.0.0.28
Welcome to 20.0.0.9
Welcome to 20.0.0.8
root@controller:~# for i in {1..8} ; do curl 20.0.0.33 ; done
Welcome to 20.0.0.29
Welcome to 20.0.0.28
Welcome to 20.0.0.9
Welcome to 20.0.0.8
Welcome to 20.0.0.29
Welcome to 20.0.0.28
Welcome to 20.0.0.9
Welcome to 20.0.0.29
root@controller:~#
root@controller:~# for i in {1..8} ; do curl 20.0.0.33 ; done
Welcome to 20.0.0.28
Welcome to 20.0.0.9
Welcome to 20.0.0.8
Welcome to 20.0.0.29
Welcome to 20.0.0.28
Welcome to 20.0.0.9
Welcome to 20.0.0.29
Welcome to 20.0.0.28
root@controller:~#
root@runner:~# neutron lbaas-pool-show 4f58e7c7-a079-4551-96b1-f0ed2e564392
+---------------------+------------------------------------------------+
| Field | Value |
+---------------------+------------------------------------------------+
| admin_state_up | True |
| description | |
| healthmonitor_id | |
| id | 4f58e7c7-a079-4551-96b1-f0ed2e564392 |
| lb_algorithm | ROUND_ROBIN |
| listeners | {"id": "cd840c0d-18f6-4621-a658-562067d0fa10"} |
| members | 23badd49-db2e-47f0-ad72-4bf3569bb697 |
| | 59cdf1a7-e502-4b52-8a86-66fa08f8b6e7 |
| | bdb7824b-5a66-4915-9756-25eaa27a01a8 |
| | ecc641f5-d86e-498c-9c45-4eb137c4ddc7 |
| name | test-lb-pool-http |
| protocol | HTTP |
| session_persistence | |
| tenant_id | ce1d087209c64df4b7e8007dc35def22 |
+---------------------+------------------------------------------------+
root@runner:~#
root@runner:~# neutron lbaas-member-list 4f58e7c7-a079-4551-96b1-f0ed2e564392
+--------------------------------------+-----------+---------------+--------+--------------------------------------+----------------+
| id | address | protocol_port | weight | subnet_id | admin_state_up |
+--------------------------------------+-----------+---------------+--------+--------------------------------------+----------------+
| 23badd49-db2e-47f0-ad72-4bf3569bb697 | 20.0.0.29 | 80 | 1 | 63cbeccd-6887-4dda-b4d2-b7503bce870a | True |
| 59cdf1a7-e502-4b52-8a86-66fa08f8b6e7 | 20.0.0.28 | 80 | 1 | 63cbeccd-6887-4dda-b4d2-b7503bce870a | True |
| bdb7824b-5a66-4915-9756-25eaa27a01a8 | 20.0.0.9 | 80 | 1 | 63cbeccd-6887-4dda-b4d2-b7503bce870a | True |
| ecc641f5-d86e-498c-9c45-4eb137c4ddc7 | 20.0.0.8 | 80 | 1 | 63cbeccd-6887-4dda-b4d2-b7503bce870a | True |
+--------------------------------------+-----------+---------------+--------+--------------------------------------+----------------+
root@runner:~#
tcpdump on LBaaS v2 port for http traffic:
root@controller:~# sudo ip netns exec qlbaas-79fae9be-7d0b-462b-bc3c-afb3e46c1613 tcpdump -B 25096 -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)'
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ns-59dda029-78, link-type EN10MB (Ethernet), capture size 65535 bytes
09:22:13.209622 IP 20.0.0.2.52188 > 20.0.0.33.http: Flags [P.], seq 2868154750:2868154823, ack 3872811792, win 229, options [nop,nop,TS val 188976129 ecr 188976129], length 73
E..}..@.@..........!...P...~..k......~.....
.C...C..GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.211104 IP 20.0.0.33.33783 > 20.0.0.28.http: Flags [P.], seq 4010926729:4010926829, ack 108303536, win 229, options [nop,nop,TS val 188976129 ecr 91267], length 100
E...n.@.@......!.......P.....t......(......
.C....d.GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.212138 IP 20.0.0.28.http > 20.0.0.33.33783: Flags [P.], seq 1:41, ack 0, win 3620, options [nop,nop,TS val 91267 ecr 188976129], length 40
E..\.3@.@.",.......!.P...t.........$(......
..d..C..HTTP/1.0 200 OK
Welcome to 20.0.0.28
09:22:13.212220 IP 20.0.0.33.http > 20.0.0.2.52188: Flags [P.], seq 1:41, ack 73, win 227, options [nop,nop,TS val 188976129 ecr 188976129], length 40
E..\..@.@.+h...!.....P....k.........(q.....
.C...C..HTTP/1.0 200 OK
Welcome to 20.0.0.28
09:22:13.219949 IP 20.0.0.2.52190 > 20.0.0.33.http: Flags [P.], seq 4133659441:4133659514, ack 3982402827, win 229, options [nop,nop,TS val 188976131 ecr 188976131], length 73
E..}/5@.@..#.......!...P.b.1.^......(......
.C...C..GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.227880 IP 20.0.0.33.39959 > 20.0.0.9.http: Flags [P.], seq 84504547:84504647, ack 435808612, win 229, options [nop,nop,TS val 188976133 ecr 23304383], length 100
E.....@.@..S...!... ...P. o....d....(......
.C...c..GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.237364 IP 20.0.0.9.http > 20.0.0.33.39959: Flags [P.], seq 1:40, ack 100, win 3620, options [nop,nop,TS val 23304386 ecr 188976133], length 39
E..[q.@.@...... ...!.P.....d. pG...$(w.....
.c...C..HTTP/1.0 200 OK
Welcome to 20.0.0.9
09:22:13.237408 IP 20.0.0.33.http > 20.0.0.2.52190: Flags [P.], seq 1:40, ack 73, win 227, options [nop,nop,TS val 188976136 ecr 188976131], length 39
E..[).@.@..r...!.....P...^...b.z....(p.....
.C...C..HTTP/1.0 200 OK
Welcome to 20.0.0.9
09:22:13.270062 IP 20.0.0.2.52192 > 20.0.0.33.http: Flags [P.], seq 3272086917:3272086990, ack 3623649623, win 229, options [nop,nop,TS val 188976144 ecr 188976144], length 73
E..}..@.@.x........!...P.......W....(......
.C...C..GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.284589 IP 20.0.0.33.37883 > 20.0.0.8.http: Flags [P.], seq 2068359609:2068359709, ack 3293483869, win 229, options [nop,nop,TS val 188976147 ecr 90565], length 100
E...%.@.@......!.......P{H...N.]....(......
.C....a.GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.312196 IP 20.0.0.8.http > 20.0.0.33.37883: Flags [P.], seq 1:40, ack 100, win 3620, options [nop,nop,TS val 90574 ecr 188976147], length 39
E..[..@.@..........!.P...N.]{H.....$(v.....
..a..C..HTTP/1.0 200 OK
Welcome to 20.0.0.8
09:22:13.312260 IP 20.0.0.33.http > 20.0.0.2.52192: Flags [P.], seq 1:40, ack 73, win 227, options [nop,nop,TS val 188976154 ecr 188976144], length 39
H@.@..3...!.....P.....W........(p.....
.C...C..HTTP/1.0 200 OK
Welcome to 20.0.0.8
09:22:13.366021 IP 20.0.0.2.52194 > 20.0.0.33.http: Flags [P.], seq 2661575587:2661575660, ack 2404931143, win 229, options [nop,nop,TS val 188976168 ecr 188976168], length 73
E..}..@.@.*........!...P..k..XVG....(......
.C.(.C.(GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.367772 IP 20.0.0.33.48437 > 20.0.0.29.http: Flags [P.], seq 1010430461:1010430561, ack 3762403146, win 229, options [nop,nop,TS val 188976168 ecr 20738120], length 100
E...}.@.@..L...!.....5.P<9...A.J....(......
.C.(.<pHGET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.369070 IP 20.0.0.29.http > 20.0.0.33.48437: Flags [P.], seq 1:41, ack 100, win 3620, options [nop,nop,TS val 20738121 ecr 188976168], length 40
E..\..@.@.KZ.......!.P.5.A.J<9.a...$(......
.<pI.C.(HTTP/1.0 200 OK
Welcome to 20.0.0.29
09:22:13.369101 IP 20.0.0.33.http > 20.0.0.2.52194: Flags [P.], seq 1:41, ack 73, win 227, options [nop,nop,TS val 188976169 ecr 188976168], length 40
E..\.o@.@.8
...!.....P...XVG..k.....(q.....
.C.).C.(HTTP/1.0 200 OK
Welcome to 20.0.0.29
09:22:13.376210 IP 20.0.0.2.52196 > 20.0.0.33.http: Flags [P.], seq 2610090558:2610090631, ack 4130193754, win 229, options [nop,nop,TS val 188976170 ecr 188976170], length 73
E..}^.@.@..?.......!...P...>.-.Z....(......
.C.*.C.*GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.377207 IP 20.0.0.33.33791 > 20.0.0.28.http: Flags [P.], seq 3012192692:3012192792, ack 3179475404, win 229, options [nop,nop,TS val 188976171 ecr 91308], length 100
E.....@.@.,....!.......P..i.........(......
.C.+..d.GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.378353 IP 20.0.0.28.http > 20.0.0.33.33791: Flags [P.], seq 1:41, ack 100, win 3620, options [nop,nop,TS val 91309 ecr 188976171], length 40
E..\.b@.@.|........!.P........j....$(......
..d..C.+HTTP/1.0 200 OK
Welcome to 20.0.0.28
09:22:13.378387 IP 20.0.0.33.http > 20.0.0.2.52196: Flags [P.], seq 1:41, ack 73, win 227, options [nop,nop,TS val 188976171 ecr 188976170], length 40
E..\Mp@.@.. ...!.....P...-.Z........(q.....
.C.+.C.*HTTP/1.0 200 OK
Welcome to 20.0.0.28
09:22:13.385287 IP 20.0.0.2.52198 > 20.0.0.33.http: Flags [P.], seq 1325632856:1325632929, ack 1972653513, win 229, options [nop,nop,TS val 188976173 ecr 188976173], length 73
E..}.|@.@..........!...PO..Xu.M.....(......
.C.-.C.-GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.386998 IP 20.0.0.33.39967 > 20.0.0.9.http: Flags [P.], seq 4247397792:4247397892, ack 2758048589, win 229, options [nop,nop,TS val 188976173 ecr 23304424], length 100
E.....@.@.h....!... ...P.*%..d{M....(......
.C.-.c..GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.388185 IP 20.0.0.9.http > 20.0.0.33.39967: Flags [P.], seq 1:40, ack 100, win 3620, options [nop,nop,TS val 23304424 ecr 188976173], length 39
E..[..@.@...... ...!.P...d{M.*&....$(w.....
.c...C.-HTTP/1.0 200 OK
Welcome to 20.0.0.9
09:22:13.388229 IP 20.0.0.33.http > 20.0.0.2.52198: Flags [P.], seq 1:40, ack 73, win 227, options [nop,nop,TS val 188976173 ecr 188976173], length 39
E..[..@.@.P....!.....P..u.M.O.......(p.....
.C.-.C.-HTTP/1.0 200 OK
Welcome to 20.0.0.9
09:22:13.422694 IP 20.0.0.2.52200 > 20.0.0.33.http: Flags [P.], seq 3719333564:3719333637, ack 775289273, win 229, options [nop,nop,TS val 188976182 ecr 188976182], length 73
E..}
.@.@..........!...P.....5......(......
.C.6.C.6GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.429202 IP 20.0.0.33.48444 > 20.0.0.29.http: Flags [P.], seq 3352428500:3352428600, ack 428882601, win 229, options [nop,nop,TS val 188976184 ecr 20738136], length 100
E...s.@.@..<...!.....<.P......:.....(......
.C.8.<pXGET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.429873 IP 20.0.0.29.http > 20.0.0.33.48444: Flags [P.], seq 1:41, ack 0, win 3620, options [nop,nop,TS val 20738136 ecr 188976184], length 40
E..\J.@.@..m.......!.P.<..:........$(......
.<pX.C.8HTTP/1.0 200 OK
Welcome to 20.0.0.29
09:22:13.429915 IP 20.0.0.33.http > 20.0.0.2.52200: Flags [P.], seq 1:41, ack 73, win 227, options [nop,nop,TS val 188976184 ecr 188976182], length 40
E..\u.@.@......!.....P...5..........(q.....
.C.8.C.6HTTP/1.0 200 OK
Welcome to 20.0.0.29
09:22:13.437423 IP 20.0.0.2.52203 > 20.0.0.33.http: Flags [P.], seq 1651650725:1651650798, ack 892136390, win 229, options [nop,nop,TS val 188976186 ecr 188976186], length 73
E..}..@.@.U........!...Pbr0.5,......(......
.C.:.C.:GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
09:22:13.438484 IP 20.0.0.33.33798 > 20.0.0.28.http: Flags [P.], seq 742963367:
^C742963467, ack 3974374035, win 229, options [nop,nop,TS val 188976186 ecr 91324], length 100
E...4.@.@......!.......P,H....".....(......
.C.:..d.GET / HTTP/1.1
User-Agent: curl/7.35.0
Host: 20.0.0.33
Accept: */*
X-Forwarded-For: 20.0.0.2
09:22:13.439562 IP 20.0.0.28.http > 20.0.0.33.33798: Flags [P.], seq 1:41, ack 100, win 3620, options [nop,nop,TS val 91324 ecr 188976186], length 40
E..\F0@.@../.......!.P....".,H.....$(......
..d..C.:HTTP/1.0 200 OK
Welcome to 20.0.0.28
09:22:13.439596 IP 20.0.0.33.http > 20.0.0.2.52203: Flags [P.], seq 1:41, ack 73, win 227, options [nop,nop,TS val 188976186 ecr 188976186], length 40
E..\g.@.@..}...!.....P..5,..br0.....(q.....
.C.:.C.:HTTP/1.0 200 OK
Welcome to 20.0.0.28
32 packets captured
32 packets received by filter
0 packets dropped by kernel
To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1599781/+subscriptions
Follow ups