ntpd[8391]: routing socket reports: No buffer space available
ntpd[8391]: message repeated 3 times: [ routing socket reports: No buffer space available]
Generally things to test out when it comes to optimizations, preferly test them one at a time:
set firewall global-options all-ping 'enable'
set firewall global-options broadcast-ping 'disable'
set firewall global-options ip-src-route 'disable'
set firewall global-options ipv6-receive-redirects 'disable'
set firewall global-options ipv6-src-route 'disable'
set firewall global-options log-martians 'enable'
set firewall global-options receive-redirects 'disable'
set firewall global-options resolver-cache
set firewall global-options resolver-interval '60'
set firewall global-options send-redirects 'disable'
set firewall global-options source-validation 'strict'
set firewall global-options syn-cookies 'enable'
set firewall global-options twa-hazards-protection 'disable'
set interfaces ethernet ethX offload gro
set interfaces ethernet ethX offload gso
set interfaces ethernet ethX offload lro
set interfaces ethernet ethX offload rfs
set interfaces ethernet ethX offload rps
set interfaces ethernet ethX offload sg
set interfaces ethernet ethX offload tso
set interfaces ethernet ethX ring-buffer rx '4096'
set interfaces ethernet ethX ring-buffer tx '4096'
set system conntrack expect-table-size '10485760'
set system conntrack hash-size '10485760'
set system conntrack log icmp new
set system conntrack log other new
set system conntrack log tcp new
set system conntrack log udp new
set system conntrack table-size '10485760'
set system conntrack timeout icmp '10'
set system conntrack timeout other '600'
set system conntrack timeout tcp close '10'
set system conntrack timeout tcp close-wait '30'
set system conntrack timeout tcp established '600'
set system conntrack timeout tcp fin-wait '30'
set system conntrack timeout tcp last-ack '30'
set system conntrack timeout tcp syn-recv '30'
set system conntrack timeout tcp syn-sent '30'
set system conntrack timeout tcp time-wait '30'
set system conntrack timeout udp other '600'
set system conntrack timeout udp stream '600'
set system ip arp table-size '32768'
set system ip disable-directed-broadcast
set system ip multipath layer4-hashing
set system ipv6 multipath layer4-hashing
set system ipv6 neighbor table-size '32768'
set system option performance 'throughput'
set system sysctl parameter vm.swappiness value '1'
set system sysctl parameter vm.vfs_cache_pressure value '50'
For your particular case I would mainly focus on the conntrack options above.
The default conntrack size isnt good in the linux kernel (when used as a router/firewall) along with default tcp/udp timers (who the f**k among the kernel developers thought that 2 weeks established time is sane as default - that is 2 weeks between 2 packets for a single session?).
Also the various conntrack tables sizes will depend on how much RAM you can spare in your box to do the actual routing/firewalling. I have found numbers claiming roughly 350 bytes/entry (incl everything) so a full 10M table would at peak utilize just below 3.4GB RAM.
The above timers are somewhat aggressive, in my design I extend particular flows to max 4 hours when needed (14400 seconds).
Another optimization not mentioned above (since that is more custom) is to utilize “ignore” when you setup firewall/nat-rules. Ignore is “NOTRACK” in nftables lingo meaning that particular flow wont occupy space in the various conntrack tables.
Also note that examples above is from 1.4-rolling (nowadays 1.5-rolling) so some commands might be missing in 1.3.x.
Yeah that should work aswell. However conntrack will still be used for input/output (services on the VyOS itself) iI recall it correctly so altering the timeouts is something I would do anyway.
Note however that disable conntrack didnt work properly and was just recently fixed.
Unfortunately, i’m still got ntpd[8391]: routing socket reports: No buffer space available log from my vyos router with this optimizations.
What exactly that log? Does it affect on Vyos performance?
Why it came from ntpd?
set firewall all-ping 'enable'
set firewall broadcast-ping 'disable'
set firewall config-trap 'disable'
set firewall group address-group IP-SSH address 'xxx.xxx.8.13'
set firewall group address-group IP-SSH address 'xxx.xxx.240.254'
set firewall group address-group IP-SSH address 'xxx.xxx.11.14'
set firewall group address-group IP-SSH address 'xxx.xxx.11.30'
set firewall ipv6-receive-redirects 'disable'
set firewall ipv6-src-route 'disable'
set firewall ip-src-route 'disable'
set firewall log-martians 'enable'
set firewall name SSH-Access default-action 'drop'
set firewall name SSH-Access rule 1 action 'accept'
set firewall name SSH-Access rule 1 destination port '9999'
set firewall name SSH-Access rule 1 protocol 'tcp'
set firewall name SSH-Access rule 1 source group address-group 'IP-SSH'
set firewall name SSH-Access rule 2 action 'accept'
set firewall name SSH-Access rule 2 protocol 'ospf'
set firewall name SSH-Access rule 3 action 'accept'
set firewall name SSH-Access rule 3 protocol 'icmp'
set firewall name SSH-Access rule 4 action 'accept'
set firewall name SSH-Access rule 4 destination port '161'
set firewall name SSH-Access rule 4 protocol 'udp'
set firewall receive-redirects 'disable'
set firewall send-redirects 'disable'
set firewall source-validation 'disable'
set firewall syn-cookies 'enable'
set firewall twa-hazards-protection 'disable'
set interfaces ethernet eth0 address 'xxx.xxx.13.5/30'
set interfaces ethernet eth0 hw-id 'xx:xx:xx:xx:xx:78'
set interfaces ethernet eth1 address 'xxx.xxx.249.18/30'
set interfaces ethernet eth1 description 'Remote Vyos'
set interfaces ethernet eth1 hw-id 'xx:xx:xx:xx:xx:79'
set interfaces ethernet eth2 description 'xxxxxx'
set interfaces ethernet eth2 disable-flow-control
set interfaces ethernet eth2 hw-id 'xx:xx:xx:xx:xx:71'
set interfaces ethernet eth2 ip disable-forwarding
set interfaces ethernet eth2 ip disable-arp-filter
set interfaces ethernet eth2 offload gro
set interfaces ethernet eth2 offload lro
set interfaces ethernet eth2 offload sg
set interfaces ethernet eth2 offload tso
set interfaces ethernet eth2 ring-buffer rx '4096'
set interfaces ethernet eth2 ring-buffer tx '4096'
set interfaces ethernet eth2 vif 150 address 'xxx.xxx.242.42/30'
set interfaces ethernet eth2 vif 150 address 'xxxx:xxxx:a:2::2/126'
set interfaces ethernet eth2 vif 150 description 'PTP-xxxxxx'
set interfaces ethernet eth2 vif 171 address 'xxx.xxx.249.13/30'
set interfaces ethernet eth2 vif 171 description 'xxxxxx'
set interfaces ethernet eth2 vif 269 address 'xxx.xxx.127.136/25'
set interfaces ethernet eth2 vif 269 description 'xxxxxx'
set interfaces ethernet eth2 vif 400 address 'xxx.xxx.99.18/30'
set interfaces ethernet eth2 vif 400 address 'xxxx:xxxx:1001:1::52/126'
set interfaces ethernet eth2 vif 400 description 'xxxxxx'
set interfaces ethernet eth2 vif 401 address 'xxx.xxx.39.164/23'
set interfaces ethernet eth2 vif 401 address 'xxxx:xxxx:1000:8:0:1:3815:101/64'
set interfaces ethernet eth2 vif 401 description 'xxxxxx'
set interfaces ethernet eth3 description 'to Internal Cust'
set interfaces ethernet eth3 disable-flow-control
set interfaces ethernet eth3 hw-id 'xx:xx:xx:xx:xx:70'
set interfaces ethernet eth3 ip disable-forwarding
set interfaces ethernet eth3 ip disable-arp-filter
set interfaces ethernet eth3 offload gro
set interfaces ethernet eth3 offload lro
set interfaces ethernet eth3 offload sg
set interfaces ethernet eth3 offload tso
set interfaces ethernet eth3 ring-buffer rx '4096'
set interfaces ethernet eth3 ring-buffer tx '4096'
set interfaces ethernet eth3 vif 402 address 'xxx.xxx.249.1/30'
set interfaces ethernet eth3 vif 402 address 'xxx.xxx.13.1/30'
set interfaces ethernet eth3 vif 402 description 'xxxxxx'
set interfaces ethernet eth3 vif 402 disable-link-detect
set interfaces ethernet eth3 vif 403 address 'xxx.xxx.249.5/30'
set interfaces ethernet eth3 vif 403 description 'xxxxxx'
set interfaces ethernet eth3 vif 404 address 'xxx.xxx.249.21/30'
set interfaces ethernet eth3 vif 404 address 'xxxx:xxxx:0:5::1/126'
set interfaces ethernet eth3 vif 404 address 'xxx.xxx.211.1/29'
set interfaces ethernet eth3 vif 404 description 'PTP-xxxxx'
set interfaces loopback lo address 'xxx.xxx.242.3/32'
set policy as-path-list Discard-xxxxx-IN rule 10 action 'deny'
----
set policy as-path-list as-path-allroute rule 10 regex '.*'
set policy prefix-list IP-xxxxx rule 1 action 'permit'
set policy prefix-list IP-xxxxx rule 1 prefix 'xxx.xxx.100.0/24'
set policy prefix-list IP-xxxxx rule 2 action 'permit'
set policy prefix-list IP-xxxxx rule 2 prefix 'xxx.xxx.101.0/24'
set policy prefix-list IP-xxxxx rule 3 action 'permit'
set policy prefix-list IP-xxxxx rule 3 prefix 'xxx.xxx.9.0/24'
set policy prefix-list IP-Default rule 10 action 'permit'
set policy prefix-list IP-Default rule 10 prefix 'xxx.xxx.0.0/0'
set policy prefix-list IP-xxxxx rule 1 action 'permit'
set policy prefix-list IP-xxxxx rule 1 prefix 'xxx.xxx.240.0/24'
set policy prefix-list IP-xxxxx rule 2 action 'permit'
set policy prefix-list IP-xxxxx rule 2 prefix 'xxx.xxx.241.0/24'
set policy prefix-list IP-xxxxx rule 3 action 'permit'
set policy prefix-list IP-xxxxx rule 3 prefix 'xxx.xxx.243.0/24'
set policy prefix-list IP-xxxxx rule 4 action 'permit'
set policy prefix-list IP-xxxxx rule 4 prefix 'xxx.xxx.244.0/24'
set policy prefix-list IP-xxxxx rule 5 action 'deny'
set policy prefix-list IP-xxxxx rule 5 prefix 'xxx.xxx.245.0/24'
set policy prefix-list IP-xxxxx rule 6 action 'permit'
set policy prefix-list IP-xxxxx rule 6 prefix 'xxx.xxx.249.0/24'
set policy prefix-list IP-xxxxx rule 7 action 'permit'
set policy prefix-list IP-xxxxx rule 7 prefix 'xxx.xxx.250.0/24'
set policy prefix-list IP-xxxxx rule 8 action 'permit'
set policy prefix-list IP-xxxxx rule 8 prefix 'xxx.xxx.251.0/24'
set policy prefix-list IP-xxxxx rule 9 action 'permit'
set policy prefix-list IP-xxxxx rule 9 prefix 'xxx.xxx.252.0/24'
set policy prefix-list IP-xxxxx rule 10 action 'permit'
set policy prefix-list IP-xxxxx rule 10 prefix 'xxx.xxx.253.0/24'
set policy prefix-list IP-xxxxx rule 11 action 'permit'
set policy prefix-list IP-xxxxx rule 11 prefix 'xxx.xxx.254.0/24'
set policy prefix-list IP-xxxxx rule 12 action 'permit'
set policy prefix-list IP-xxxxx rule 12 prefix 'xxx.xxx.255.0/24'
set policy prefix-list IP-xxxxx rule 14 action 'deny'
set policy prefix-list IP-xxxxx rule 14 prefix 'xxx.xxx.9.0/24'
set policy prefix-list IP-xxxxx rule 15 action 'permit'
set policy prefix-list IP-xxxxx rule 15 le '24'
set policy prefix-list IP-xxxxx rule 15 prefix 'xxx.xxx.8.0/21'
set policy prefix-list IP-xxxxx rule 16 action 'deny'
set policy prefix-list IP-xxxxx rule 16 prefix 'xxx.xxx.246.0/24'
set policy prefix-list IP-xxxxx rule 17 action 'deny'
set policy prefix-list IP-xxxxx rule 17 prefix 'xxx.xxx.247.0/24'
set policy prefix-list IP-xxxxx rule 18 action 'deny'
set policy prefix-list IP-xxxxx rule 18 prefix 'xxx.xxx.248.0/24'
set policy prefix-list IP-xxxxx rule 1 action 'permit'
set policy prefix-list IP-xxxxx rule 1 prefix 'xxx.xxx.240.0/24'
set policy prefix-list IP-xxxxx rule 2 action 'permit'
set policy prefix-list IP-xxxxx rule 2 prefix 'xxx.xxx.241.0/24'
set policy prefix-list IP-xxxxx rule 3 action 'permit'
set policy prefix-list IP-xxxxx rule 3 prefix 'xxx.xxx.243.0/24'
set policy prefix-list IP-xxxxx rule 4 action 'permit'
set policy prefix-list IP-xxxxx rule 4 prefix 'xxx.xxx.244.0/24'
set policy prefix-list IP-xxxxx rule 5 action 'deny'
set policy prefix-list IP-xxxxx rule 5 prefix 'xxx.xxx.245.0/24'
set policy prefix-list IP-xxxxx rule 6 action 'permit'
set policy prefix-list IP-xxxxx rule 6 prefix 'xxx.xxx.249.0/24'
set policy prefix-list IP-xxxxx rule 7 action 'permit'
set policy prefix-list IP-xxxxx rule 7 prefix 'xxx.xxx.250.0/24'
set policy prefix-list IP-xxxxx rule 8 action 'permit'
set policy prefix-list IP-xxxxx rule 8 prefix 'xxx.xxx.251.0/24'
set policy prefix-list IP-xxxxx rule 9 action 'permit'
set policy prefix-list IP-xxxxx rule 9 prefix 'xxx.xxx.252.0/24'
set policy prefix-list IP-xxxxx rule 10 action 'permit'
set policy prefix-list IP-xxxxx rule 10 prefix 'xxx.xxx.253.0/24'
set policy prefix-list IP-xxxxx rule 11 action 'permit'
set policy prefix-list IP-xxxxx rule 11 prefix 'xxx.xxx.254.0/24'
set policy prefix-list IP-xxxxx rule 12 action 'permit'
set policy prefix-list IP-xxxxx rule 12 prefix 'xxx.xxx.255.0/24'
set policy prefix-list IP-xxxxx rule 14 action 'deny'
set policy prefix-list IP-xxxxx rule 14 prefix 'xxx.xxx.9.0/24'
set policy prefix-list IP-xxxxx rule 15 action 'permit'
set policy prefix-list IP-xxxxx rule 15 le '24'
set policy prefix-list IP-xxxxx rule 15 prefix 'xxx.xxx.8.0/21'
set policy prefix-list IP-xxxxx rule 16 action 'deny'
set policy prefix-list IP-xxxxx rule 16 prefix 'xxx.xxx.246.0/24'
set policy prefix-list IP-xxxxx rule 17 action 'deny'
set policy prefix-list IP-xxxxx rule 17 prefix 'xxx.xxx.247.0/24'
set policy prefix-list IP-xxxxx rule 18 action 'deny'
set policy prefix-list IP-xxxxx rule 18 prefix 'xxx.xxx.248.0/24'
set policy prefix-list IP-xxxxx rule 1 action 'permit'
set policy prefix-list IP-xxxxx rule 1 prefix 'xxx.xxx.240.0/24'
set policy prefix-list IP-xxxxx rule 2 action 'permit'
set policy prefix-list IP-xxxxx rule 2 prefix 'xxx.xxx.241.0/24'
set policy prefix-list IP-xxxxx rule 3 action 'permit'
set policy prefix-list IP-xxxxx rule 3 prefix 'xxx.xxx.243.0/24'
set policy prefix-list IP-xxxxx rule 4 action 'permit'
set policy prefix-list IP-xxxxx rule 4 prefix 'xxx.xxx.244.0/24'
set policy prefix-list IP-xxxxx rule 5 action 'permit'
set policy prefix-list IP-xxxxx rule 5 prefix 'xxx.xxx.245.0/24'
set policy prefix-list IP-xxxxx rule 6 action 'permit'
set policy prefix-list IP-xxxxx rule 6 prefix 'xxx.xxx.249.0/24'
set policy prefix-list IP-xxxxx rule 7 action 'permit'
set policy prefix-list IP-xxxxx rule 7 prefix 'xxx.xxx.250.0/24'
set policy prefix-list IP-xxxxx rule 8 action 'permit'
set policy prefix-list IP-xxxxx rule 8 prefix 'xxx.xxx.251.0/24'
set policy prefix-list IP-xxxxx rule 9 action 'permit'
set policy prefix-list IP-xxxxx rule 9 prefix 'xxx.xxx.252.0/24'
set policy prefix-list IP-xxxxx rule 10 action 'permit'
set policy prefix-list IP-xxxxx rule 10 prefix 'xxx.xxx.253.0/24'
set policy prefix-list IP-xxxxx rule 11 action 'permit'
set policy prefix-list IP-xxxxx rule 11 prefix 'xxx.xxx.254.0/24'
set policy prefix-list IP-xxxxx rule 12 action 'permit'
set policy prefix-list IP-xxxxx rule 12 prefix 'xxx.xxx.255.0/24'
set policy prefix-list IP-xxxxx rule 13 action 'permit'
set policy prefix-list IP-xxxxx rule 13 prefix 'xxx.xxx.8.0/24'
set policy prefix-list IP-xxxxx rule 14 action 'permit'
set policy prefix-list IP-xxxxx rule 14 prefix 'xxx.xxx.10.0/24'
set policy prefix-list IP-xxxxx rule 15 action 'permit'
set policy prefix-list IP-xxxxx rule 15 prefix 'xxx.xxx.11.0/24'
set policy prefix-list IP-xxxxx rule 16 action 'permit'
set policy prefix-list IP-xxxxx rule 16 prefix 'xxx.xxx.12.0/24'
set policy prefix-list IP-xxxxx rule 17 action 'permit'
set policy prefix-list IP-xxxxx rule 17 prefix 'xxx.xxx.13.0/24'
set policy prefix-list IP-xxxxx rule 18 action 'permit'
set policy prefix-list IP-xxxxx rule 18 prefix 'xxx.xxx.14.0/24'
set policy prefix-list IP-xxxxx rule 19 action 'permit'
set policy prefix-list IP-xxxxx rule 19 prefix 'xxx.xxx.15.0/24'
set policy prefix-list IP-xxxxx rule 1 action 'permit'
set policy prefix-list IP-xxxxx rule 1 prefix 'xxx.xxx.240.0/24'
set policy prefix-list IP-xxxxx rule 2 action 'permit'
set policy prefix-list IP-xxxxx rule 2 prefix 'xxx.xxx.241.0/24'
set policy prefix-list IP-xxxxx rule 3 action 'permit'
set policy prefix-list IP-xxxxx rule 3 prefix 'xxx.xxx.8.0/24'
set policy prefix-list IP-xxxxx rule 4 action 'permit'
set policy prefix-list IP-xxxxx rule 4 prefix 'xxx.xxx.10.0/24'
set policy prefix-list IP-xxxxx rule 5 action 'permit'
set policy prefix-list IP-xxxxx rule 5 prefix 'xxx.xxx.11.0/24'
set policy prefix-list IP-xxxxx rule 6 action 'permit'
set policy prefix-list IP-xxxxx rule 6 prefix 'xxx.xxx.12.0/24'
set policy prefix-list IP-xxxxx rule 7 action 'permit'
set policy prefix-list IP-xxxxx rule 7 prefix 'xxx.xxx.13.0/24'
set policy prefix-list IP-xxxxx rule 8 action 'permit'
set policy prefix-list IP-xxxxx rule 8 prefix 'xxx.xxx.14.0/24'
set policy prefix-list IP-xxxxx rule 9 action 'permit'
set policy prefix-list IP-xxxxx rule 9 prefix 'xxx.xxx.15.0/24'
set policy prefix-list IP-xxxxx rule 10 action 'permit'
set policy prefix-list IP-xxxxx rule 10 prefix 'xxx.xxx.243.0/24'
set policy prefix-list IP-xxxxx rule 11 action 'permit'
set policy prefix-list IP-xxxxx rule 11 prefix 'xxx.xxx.244.0/24'
set policy prefix-list IP-xxxxx rule 12 action 'permit'
set policy prefix-list IP-xxxxx rule 12 prefix 'xxx.xxx.249.0/24'
set policy prefix-list IP-xxxxx rule 13 action 'permit'
set policy prefix-list IP-xxxxx rule 13 prefix 'xxx.xxx.250.0/24'
set policy prefix-list IP-xxxxx rule 14 action 'permit'
set policy prefix-list IP-xxxxx rule 14 prefix 'xxx.xxx.251.0/24'
set policy prefix-list IP-xxxxx rule 15 action 'permit'
set policy prefix-list IP-xxxxx rule 15 prefix 'xxx.xxx.252.0/24'
set policy prefix-list IP-xxxxx rule 16 action 'permit'
set policy prefix-list IP-xxxxx rule 16 prefix 'xxx.xxx.253.0/24'
set policy prefix-list IP-xxxxx rule 17 action 'permit'
set policy prefix-list IP-xxxxx rule 17 prefix 'xxx.xxx.254.0/24'
set policy prefix-list IP-xxxxx rule 18 action 'permit'
set policy prefix-list IP-xxxxx rule 18 prefix 'xxx.xxx.255.0/24'
set policy prefix-list IP-xxxxx rule 1 action 'permit'
set policy prefix-list IP-xxxxx rule 1 prefix 'xxx.xxx.27.0/24'
set policy prefix-list IP-xxxxx rule 2 action 'permit'
set policy prefix-list IP-xxxxx rule 2 prefix 'xxx.xxx.125.0/24'
set policy prefix-list IP-xxxxx rule 1 action 'permit'
set policy prefix-list IP-xxxxx rule 1 prefix 'xxx.xxx.240.0/24'
set policy prefix-list IP-xxxxx rule 2 action 'permit'
set policy prefix-list IP-xxxxx rule 2 prefix 'xxx.xxx.241.0/24'
set policy prefix-list IP-xxxxx rule 3 action 'permit'
set policy prefix-list IP-xxxxx rule 3 prefix 'xxx.xxx.243.0/24'
set policy prefix-list IP-xxxxx rule 4 action 'permit'
set policy prefix-list IP-xxxxx rule 4 prefix 'xxx.xxx.244.0/24'
set policy prefix-list IP-xxxxx rule 6 action 'permit'
set policy prefix-list IP-xxxxx rule 6 prefix 'xxx.xxx.249.0/24'
set policy prefix-list IP-xxxxx rule 7 action 'permit'
set policy prefix-list IP-xxxxx rule 7 prefix 'xxx.xxx.250.0/24'
set policy prefix-list IP-xxxxx rule 8 action 'permit'
set policy prefix-list IP-xxxxx rule 8 prefix 'xxx.xxx.251.0/24'
set policy prefix-list IP-xxxxx rule 9 action 'permit'
set policy prefix-list IP-xxxxx rule 9 prefix 'xxx.xxx.252.0/24'
set policy prefix-list IP-xxxxx rule 10 action 'permit'
set policy prefix-list IP-xxxxx rule 10 prefix 'xxx.xxx.253.0/24'
set policy prefix-list IP-xxxxx rule 11 action 'permit'
set policy prefix-list IP-xxxxx rule 11 prefix 'xxx.xxx.254.0/24'
set policy prefix-list IP-xxxxx rule 12 action 'permit'
set policy prefix-list IP-xxxxx rule 12 prefix 'xxx.xxx.255.0/24'
set policy prefix-list IP-xxxxx rule 13 action 'permit'
set policy prefix-list IP-xxxxx rule 13 prefix 'xxx.xxx.8.0/24'
set policy prefix-list IP-xxxxx rule 14 action 'permit'
set policy prefix-list IP-xxxxx rule 14 prefix 'xxx.xxx.10.0/24'
set policy prefix-list IP-xxxxx rule 15 action 'permit'
set policy prefix-list IP-xxxxx rule 15 prefix 'xxx.xxx.11.0/24'
set policy prefix-list IP-xxxxx rule 16 action 'permit'
set policy prefix-list IP-xxxxx rule 16 prefix 'xxx.xxx.12.0/24'
set policy prefix-list IP-xxxxx rule 17 action 'permit'
set policy prefix-list IP-xxxxx rule 17 prefix 'xxx.xxx.13.0/24'
set policy prefix-list IP-xxxxx rule 18 action 'permit'
set policy prefix-list IP-xxxxx rule 18 prefix 'xxx.xxx.14.0/24'
set policy prefix-list IP-xxxxx rule 19 action 'permit'
set policy prefix-list IP-xxxxx rule 19 prefix 'xxx.xxx.15.0/24'
set policy prefix-list IP-xxxxx-Cust rule 1 action 'permit'
set policy prefix-list IP-xxxxx-Cust rule 1 prefix 'xxx.xxx.125.0/24'
set policy prefix-list IP-xxxxx-Cust rule 2 action 'permit'
set policy prefix-list IP-xxxxx-Cust rule 2 prefix 'xxx.xxx.27.0/24'
set policy prefix-list IP-xxxxx-Vyos rule 1 action 'permit'
set policy prefix-list IP-xxxxx-Vyos rule 1 prefix 'xxx.xxx.13.0/24'
set policy prefix-list6 IPV6-xxxxx rule 1 action 'permit'
set policy prefix-list6 IPV6-xxxxx rule 1 prefix 'xxxx:xxxx::/48'
set policy prefix-list6 IPV6-xxxxx rule 2 action 'permit'
set policy prefix-list6 IPV6-xxxxx rule 2 prefix 'xxxx:xxxx:1::/48'
set policy prefix-list6 IPV6-xxxxx rule 3 action 'permit'
set policy prefix-list6 IPV6-xxxxx rule 3 prefix 'xxxx:xxxx:2::/48'
set policy prefix-list6 IPV6-xxxxx rule 4 action 'permit'
set policy prefix-list6 IPV6-xxxxx rule 4 prefix 'xxxx:xxxx:3::/48'
set policy prefix-list6 IPV6-xxxxx rule 1 action 'permit'
set policy prefix-list6 IPV6-xxxxx rule 1 prefix 'xxxx:xxxx::/48'
set policy prefix-list6 IPV6-xxxxx rule 2 action 'permit'
set policy prefix-list6 IPV6-xxxxx rule 2 prefix 'xxxx:xxxx:1::/48'
set policy prefix-list6 IPV6-xxxxx rule 3 action 'permit'
set policy prefix-list6 IPV6-xxxxx rule 3 prefix 'xxxx:xxxx:2::/48'
set policy prefix-list6 IPV6-xxxxx rule 4 action 'permit'
set policy prefix-list6 IPV6-xxxxx rule 4 prefix 'xxxx:xxxx:3::/48'
set policy prefix-list6 IPV6-xxxxx rule 1 action 'permit'
set policy prefix-list6 IPV6-xxxxx rule 1 prefix 'xxxx:xxxx::/48'
set policy prefix-list6 IPV6-xxxxx rule 2 action 'permit'
set policy prefix-list6 IPV6-xxxxx rule 2 prefix 'xxxx:xxxx:1::/48'
set policy prefix-list6 IPV6-xxxxx rule 3 action 'permit'
set policy prefix-list6 IPV6-xxxxx rule 3 prefix 'xxxx:xxxx:2::/48'
set policy prefix-list6 IPV6-xxxxx rule 4 action 'permit'
set policy prefix-list6 IPV6-xxxxx rule 4 prefix 'xxxx:xxxx:3::/48'
set policy route-map BGP-xxxxx-Out rule 1 action 'permit'
set policy route-map BGP-xxxxx-Out rule 1 match as-path 'as-path-allroute'
set policy route-map BGP-xxxxx-IN rule 1 action 'permit'
set policy route-map BGP-xxxxx-IN rule 1 match as-path 'Discard-xxxxx-IN'
set policy route-map BGP-xxxxx-IN rule 2 action 'permit'
set policy route-map BGP-xxxxx-IN rule 2 match as-path 'as-path-allroute'
set policy route-map BGP-xxxxx-OUT rule 1 action 'permit'
set policy route-map BGP-xxxxx-OUT rule 1 match ip address prefix-list 'IP-xxxxx'
set policy route-map BGP-xxxxx-OUT rule 1 set
set policy route-map BGP-xxxxx-OUT rule 2 action 'permit'
set policy route-map BGP-xxxxx-OUT rule 2 match as-path 'Regexp-BGP-Cust'
set policy route-map BGP-xxxxx-IPv6-OUT rule 1 action 'permit'
set policy route-map BGP-xxxxx-IPv6-OUT rule 1 match ipv6 address prefix-list 'IPV6-xxxxx'
set policy route-map BGP-xxxxx-IN rule 1 action 'permit'
set policy route-map BGP-xxxxx-IN rule 1 match as-path 'as-path-allroute'
set policy route-map BGP-xxxxx-OUT rule 1 action 'permit'
set policy route-map BGP-xxxxx-OUT rule 1 match ip address prefix-list 'IP-xxxxx'
set policy route-map BGP-xxxxx-OUT rule 2 action 'permit'
set policy route-map BGP-xxxxx-OUT rule 2 match as-path 'Regexp-BGP-Cust'
set policy route-map BGP-xxxxx-IPv6-OUT rule 1 action 'permit'
set policy route-map BGP-xxxxx-IPv6-OUT rule 1 match ipv6 address prefix-list 'IPV6-xxxxx'
set policy route-map BGP-xxxxx-IN rule 1 action 'permit'
set policy route-map BGP-xxxxx-IN rule 1 match as-path 'xxxxx-IN'
set policy route-map BGP-xxxxx-OUT rule 1 action 'permit'
set policy route-map BGP-xxxxx-OUT rule 1 match ip address prefix-list 'IP-xxxxx'
set policy route-map BGP-xxxxx-IN rule 1 action 'permit'
set policy route-map BGP-xxxxx-IN rule 1 match as-path 'xxxxx-IN'
set policy route-map BGP-xxxxx-OUT rule 10 action 'permit'
set policy route-map BGP-xxxxx-OUT rule 10 match ip address prefix-list 'IP-xxxxx'
set policy route-map BGP-xxxxx-OUT rule 20 action 'permit'
set policy route-map BGP-xxxxx-OUT rule 20 match as-path 'Regexp-BGP-Cust'
set policy route-map BGP-xxxxx-IPv6-OUT rule 1 action 'permit'
set policy route-map BGP-xxxxx-IPv6-OUT rule 1 match ipv6 address prefix-list 'IPV6-xxxxx'
set policy route-map BGP-xxxxx-In rule 1 action 'permit'
set policy route-map BGP-xxxxx-In rule 1 set local-preference '400'
set policy route-map BGP-xxxxx-Out rule 1 action 'permit'
set policy route-map BGP-xxxxx-Out rule 1 match ip address prefix-list 'IP-xxxxx-Vyos'
set policy route-map BGP-xxxxx-Out rule 2 action 'permit'
set policy route-map BGP-xxxxx-Out rule 2 match as-path 'Regexp-BGP-Cust'
set policy route-map BGP-xxxxx-xxxxx-IN rule 1 action 'permit'
set policy route-map BGP-xxxxx-xxxxx-IN rule 1 match ip address prefix-list 'IP-Default'
set policy route-map BGP-xxxxx-xxxxx-OUT rule 1 action 'permit'
set policy route-map BGP-xxxxx-xxxxx-OUT rule 1 match ip address prefix-list 'IP-xxxxx'
set policy route-map BGP-xxxxx-xxxxx-OUT rule 1 set as-path-prepend '38150'
set policy route-map BGP-xxxxx-xxxxx-OUT rule 2 action 'permit'
set policy route-map BGP-xxxxx-xxxxx-OUT rule 2 match as-path 'Regexp-BGP-Cust'
set policy route-map BGP-xxxxx-xxxxx-OUT rule 2 set as-path-prepend '38150 38150 38150'
set policy route-map Cust-xxxxx-In rule 1 action 'permit'
set policy route-map Cust-xxxxx-In rule 1 match as-path 'as-path-xxxxx'
set policy route-map Cust-xxxxx-In rule 1 set local-preference '2000'
set policy route-map Cust-xxxxx-Out rule 1 action 'permit'
set policy route-map Cust-xxxxx-Out rule 1 match as-path 'as-path-allroute'
set policy route-map Cust-xxxxx-In rule 1 action 'permit'
set policy route-map Cust-xxxxx-In rule 1 match as-path 'as-path-xxxxx'
set policy route-map Cust-xxxxx-In rule 1 set local-preference '500'
set policy route-map Cust-xxxxx-Out rule 1 action 'permit'
set policy route-map Cust-xxxxx-Out rule 1 match as-path 'as-path-allroute'
set protocols bgp XXXXXX address-family ipv4-unicast network xxx.xxx.249.0/24
set protocols bgp XXXXXX address-family ipv4-unicast network xxx.xxx.13.0/24
set protocols bgp XXXXXX neighbor xxx.xxx.127.129 address-family ipv4-unicast route-map export 'BGP-xxxxx-OUT'
set protocols bgp XXXXXX neighbor xxx.xxx.127.129 address-family ipv4-unicast route-map import 'BGP-xxxxx-IN'
set protocols bgp XXXXXX neighbor xxx.xxx.127.129 description 'BGP-xxxxx'
set protocols bgp XXXXXX neighbor xxx.xxx.127.129 remote-as '7597'
set protocols bgp XXXXXX neighbor xxx.xxx.127.253 address-family ipv4-unicast route-map export 'BGP-xxxxx-OUT'
set protocols bgp XXXXXX neighbor xxx.xxx.127.253 address-family ipv4-unicast route-map import 'BGP-xxxxx-IN'
set protocols bgp XXXXXX neighbor xxx.xxx.127.253 description 'BGP-xxxxx-RS'
set protocols bgp XXXXXX neighbor xxx.xxx.127.253 remote-as '7597'
set protocols bgp XXXXXX neighbor xxx.xxx.99.17 address-family ipv4-unicast route-map export 'BGP-xxxxx-OUT'
set protocols bgp XXXXXX neighbor xxx.xxx.99.17 address-family ipv4-unicast route-map import 'BGP-xxxxx-IN'
set protocols bgp XXXXXX neighbor xxx.xxx.99.17 address-family ipv4-unicast soft-reconfiguration inbound
set protocols bgp XXXXXX neighbor xxx.xxx.99.17 remote-as '4761'
set protocols bgp XXXXXX neighbor xxx.xxx.38.1 address-family ipv4-unicast route-map export 'BGP-xxxxx-OUT'
set protocols bgp XXXXXX neighbor xxx.xxx.38.1 address-family ipv4-unicast route-map import 'BGP-xxxxx-IN'
set protocols bgp XXXXXX neighbor xxx.xxx.38.1 address-family ipv4-unicast soft-reconfiguration inbound
set protocols bgp XXXXXX neighbor xxx.xxx.38.1 remote-as '17922'
set protocols bgp XXXXXX neighbor xxx.xxx.242.2 address-family ipv4-unicast nexthop-self
set protocols bgp XXXXXX neighbor xxx.xxx.242.2 address-family ipv4-unicast route-map export 'BGP-xxxxx-OUT'
set protocols bgp XXXXXX neighbor xxx.xxx.242.2 address-family ipv4-unicast route-map import 'BGP-xxxxx-IN'
set protocols bgp XXXXXX neighbor xxx.xxx.242.2 address-family ipv4-unicast route-reflector-client
set protocols bgp XXXXXX neighbor xxx.xxx.242.2 address-family ipv4-unicast soft-reconfiguration inbound
set protocols bgp XXXXXX neighbor xxx.xxx.242.2 remote-as '38150'
set protocols bgp XXXXXX neighbor xxx.xxx.242.2 update-source 'xxx.xxx.242.3'
set protocols bgp XXXXXX neighbor xxx.xxx.249.2 address-family ipv4-unicast route-map export 'Cust-xxxxx-Out'
set protocols bgp XXXXXX neighbor xxx.xxx.249.2 address-family ipv4-unicast route-map import 'Cust-xxxxx-In'
set protocols bgp XXXXXX neighbor xxx.xxx.249.2 address-family ipv4-unicast soft-reconfiguration inbound
set protocols bgp XXXXXX neighbor xxx.xxx.249.2 description 'Cust-xxxxx'
set protocols bgp XXXXXX neighbor xxx.xxx.249.2 remote-as '136079'
set protocols bgp XXXXXX neighbor xxx.xxx.249.6 address-family ipv4-unicast route-map export 'Cust-xxxxx-Out'
set protocols bgp XXXXXX neighbor xxx.xxx.249.6 address-family ipv4-unicast route-map import 'Cust-xxxxx-In'
set protocols bgp XXXXXX neighbor xxx.xxx.249.6 address-family ipv4-unicast soft-reconfiguration inbound
set protocols bgp XXXXXX neighbor xxx.xxx.249.6 description 'Cust-xxxxx'
set protocols bgp XXXXXX neighbor xxx.xxx.249.6 remote-as '141675'
set protocols bgp XXXXXX neighbor xxx.xxx.249.14 address-family ipv4-unicast nexthop-self
set protocols bgp XXXXXX neighbor xxx.xxx.249.14 address-family ipv4-unicast route-map export 'BGP-xxxxx-xxxxx-OUT'
set protocols bgp XXXXXX neighbor xxx.xxx.249.14 address-family ipv4-unicast route-reflector-client
set protocols bgp XXXXXX neighbor xxx.xxx.249.14 address-family ipv4-unicast soft-reconfiguration inbound
set protocols bgp XXXXXX neighbor xxx.xxx.249.14 description 'BGP-xxxxx-TELKOM'
set protocols bgp XXXXXX neighbor xxx.xxx.249.14 remote-as '38150'
set protocols bgp XXXXXX neighbor xxx.xxx.249.17 address-family ipv4-unicast nexthop-self
set protocols bgp XXXXXX neighbor xxx.xxx.249.17 address-family ipv4-unicast route-map export 'BGP-xxxxx-Out'
set protocols bgp XXXXXX neighbor xxx.xxx.249.17 address-family ipv4-unicast soft-reconfiguration inbound
set protocols bgp XXXXXX neighbor xxx.xxx.249.17 description 'BGP-xxxxx-AS38150'
set protocols bgp XXXXXX neighbor xxx.xxx.249.17 remote-as '38150'
set protocols bgp XXXXXX neighbor xxx.xxx.249.17 shutdown
set protocols bgp XXXXXX neighbor xxx.xxx.249.22 address-family ipv4-unicast nexthop-self
set protocols bgp XXXXXX neighbor xxx.xxx.249.22 address-family ipv4-unicast route-map export 'BGP-xxxxx-Out'
set protocols bgp XXXXXX neighbor xxx.xxx.249.22 address-family ipv4-unicast route-reflector-client
set protocols bgp XXXXXX neighbor xxx.xxx.249.22 address-family ipv4-unicast soft-reconfiguration inbound
set protocols bgp XXXXXX neighbor xxx.xxx.249.22 remote-as '38150'
set protocols bgp XXXXXX neighbor xxxx:xxxx:0:5::2 address-family ipv6-unicast nexthop-self
set protocols bgp XXXXXX neighbor xxxx:xxxx:0:5::2 address-family ipv6-unicast route-reflector-client
set protocols bgp XXXXXX neighbor xxxx:xxxx:0:5::2 description 'BGP-IPv6-xxxxx-JOG'
set protocols bgp XXXXXX neighbor xxxx:xxxx:0:5::2 remote-as '38150'
set protocols bgp XXXXXX neighbor xxxx:xxxx:a:2::1 address-family ipv6-unicast nexthop-self
set protocols bgp XXXXXX neighbor xxxx:xxxx:a:2::1 address-family ipv6-unicast route-map export 'BGP-xxxxx-IPv6-OUT'
set protocols bgp XXXXXX neighbor xxxx:xxxx:a:2::1 address-family ipv6-unicast route-reflector-client
set protocols bgp XXXXXX neighbor xxxx:xxxx:a:2::1 description 'BGP-IPV6-xxxxx'
set protocols bgp XXXXXX neighbor xxxx:xxxx:a:2::1 remote-as '38150'
set protocols bgp XXXXXX neighbor xxxx:xxxx:1000:8:0:1:7922:1 address-family ipv6-unicast route-map export 'BGP-xxxxx-IPv6-OUT'
set protocols bgp XXXXXX neighbor xxxx:xxxx:1000:8:0:1:7922:1 description 'xxxxx-IPv6'
set protocols bgp XXXXXX neighbor xxxx:xxxx:1000:8:0:1:7922:1 remote-as '17922'
set protocols bgp XXXXXX neighbor xxxx:xxxx:1001:1::51 address-family ipv6-unicast route-map export 'BGP-xxxxx-IPv6-OUT'
set protocols bgp XXXXXX neighbor xxxx:xxxx:1001:1::51 description 'xxxxx-IPV6'
set protocols bgp XXXXXX neighbor xxxx:xxxx:1001:1::51 remote-as '4761'
set protocols bgp XXXXXX parameters bestpath as-path multipath-relax
set protocols ospf area 0 network 'xxx.xxx.249.20/30'
set protocols ospf area 0 network 'xxx.xxx.249.16/30'
set protocols ospf area 0 network 'xxx.xxx.242.3/32'
set protocols ospf area 0 network 'xxx.xxx.242.40/30'
set protocols ospf area 0 network 'xxx.xxx.249.12/30'
set protocols ospf log-adjacency-changes
set protocols ospf parameters abr-type 'cisco'
set protocols ospf parameters router-id 'xxx.xxx.249.21'
set protocols ospf passive-interface 'eth2'
set protocols ospf passive-interface 'eth2.400'
set protocols ospf passive-interface 'eth2.401'
set protocols ospf passive-interface 'eth3'
set protocols ospf passive-interface 'eth1'
set protocols ospfv3 area 0 interface 'eth2.150'
set protocols ospfv3 area 0 interface 'eth3.404'
set protocols ospfv3 parameters router-id 'xxx.xxx.249.21'
set protocols static route xxx.xxx.249.0/24 blackhole distance '254'
set protocols static route xxx.xxx.13.0/24 blackhole distance '254'
set system config-management commit-revisions '100'
set system conntrack expect-table-size '20971520'
set system conntrack hash-size '20971520'
set system conntrack log icmp new
set system conntrack log other new
set system conntrack log tcp new
set system conntrack log udp new
set system conntrack table-size '20971520'
set system conntrack timeout tcp close '10'
set system conntrack timeout tcp close-wait '30'
set system conntrack timeout tcp established '600'
set system conntrack timeout tcp fin-wait '30'
set system conntrack timeout tcp last-ack '30'
set system conntrack timeout tcp syn-recv '30'
set system conntrack timeout tcp syn-sent '30'
set system conntrack timeout tcp time-wait '30'
set system conntrack timeout udp other '600'
set system conntrack timeout udp stream '600'
set system console device ttyS0 speed '115200'
set system ip arp table-size '32768'
set system ip multipath layer4-hashing
set system ipv6 multipath layer4-hashing
set system ipv6 neighbor table-size '32768'
set system option performance 'throughput'
set system sysctl custom net.core.rmem_max value '446464'
set system sysctl custom net.core.wmem_max value '425984'
set system sysctl custom net.ipv4.icmp_ratelimit value '1000'
set system sysctl custom net.ipv4.icmp_ratemask value '4120'
set system sysctl custom net.ipv6.route.max_size value '655360'
set system sysctl custom vm.swappiness value '1'
set system sysctl custom vm.vfs_cache_pressure value '50'
set system syslog global facility all level 'info'
set system syslog global facility protocols level 'debug'
sorry i need more characters
how about this? could this be the cause?
sh system memory cache
Active / Total Objects (% used) : 3045917 / 3110399 (97.9%)
Active / Total Slabs (% used) : 65730 / 65730 (100.0%)
Active / Total Caches (% used) : 99 / 119 (83.2%)
Active / Total Size (% used) : 321831.84K / 334589.66K (96.2%)
Minimum / Average / Maximum Object : 0.01K / 0.11K / 8.00K
Only “odd” I see is that your FRR/bgp process takes about 2.3GB of RAM, but this is expected if you do one or more full bgp-tables and/or soft-reconfigure (which will double the RAM usage).
These ulimits are set in 1.5-rolling, you could try to adjust them and see if it helps in your 1.3-rolling (and reboot or at least restart processes):
vyos@vyos:~$ ulimit -a
core file size (blocks, -c) 0
data seg size (kbytes, -d) unlimited
scheduling priority (-e) 0
file size (blocks, -f) unlimited
pending signals (-i) 31706
max locked memory (kbytes, -l) 1018792
max memory size (kbytes, -m) unlimited
open files (-n) 1024
pipe size (512 bytes, -p) 8
POSIX message queues (bytes, -q) 819200
real-time priority (-r) 0
stack size (kbytes, -s) 8192
cpu time (seconds, -t) unlimited
max user processes (-u) 31706
virtual memory (kbytes, -v) unlimited
file locks (-x) unlimited
However Im not sure where these values are set within the Debian backend in VyOS (a regular Debian installation uses /etc/security/limits.conf but that is just default vanilla Debian).
Other thing to verify (along that arp theory, besides it was found out that changing arp/ndp table-size isnt properly set during boot but it works if you manually do a commit afterwards (changing the value, commit and changing it back, commit again: ⚓ T5575 ARP/NDP table-size isnt set properly) is what the kernel think about limit of arp-entries:
But, for the ulimit i can’t change the max locked memory.
I did with pending signals and max user processes with common ulimit command. But when i try to change the max locked memory, i got this error
~$ ulimit -l 1018792
-vbash: ulimit: max locked memory: cannot modify limit: Operation not permitted