Hello Folks,
I have these nice kernel messages on my virtualized NethSecurity 8 23.05.5-ns.1.4.1 system:
net_ratelimit: 978 callbacks suppressed
nfnetlink_queue: nf_queue: full at 4096 entries, dropping packets(s)
nfnetlink_queue: nf_queue: full at 4096 entries, dropping packets(s)
nfnetlink_queue: nf_queue: full at 4096 entries, dropping packets(s)
[...more...]
Looking into the nfnetlink_queue:
cat /proc/net/netfilter/nfnetlink_queue
4 2508 0 2 1518 0 0 8701082 1
5 2571026936 0 2 1518 0 0 7904397 1
6 2336528095 0 2 1518 0 0 3941436 1
7 3875946501 1625 2 1518 110076 0 31682176 1
The docs say this means:
queue_number peer_portid: good chance it is process ID of software listening to the queue queue_total: current number of packets waiting in the queue copy_mode: 0 and 1 only message only provide meta data. If 2, the message provides a part of packet of size copy range. copy_range: length of packet data to put in message queue_dropped: number of packets dropped because queue was full user_dropped: number of packets dropped because netlink message could not be sent to userspace. If this counter is not zero, try to increase netlink buffer size. On the application side, you will see gap in packet id if netlink message are lost. id_sequence: packet id of last packet The last field is always ā1ā and is ignored.
So Iām too late to the party, right now there are no queues that have dropped packets. But there were some recently, else there wouldnāt be the kernel messagesā¦
Okay, perhaps more relavent is: what to do about full nfnetlink queues (4096 entries is the limit it seems)? Can one increase the number of queues? Or adjust something else? Or add more horse power? I can give the NethSec VM more vCPUs, but I am not so sure the firewall will scale to parallelize with more cores.
Iād be happy to hear your ideas.
Thnx.