SYN Cookies & Linux
This started as debugging application timeouts and turned into a deep dive into linux tcp ip stack writing my own netlink query tools. Might be long. Might be rambling. Any comments appreciated.
Recently when debugging a timeout issues on a java application, I stumbled upon an interesting problem. The application was making requests to a Loab balancer virtual IP and getting a connection timeout exception in the logs. Unsure of why this was i went poking into nstat counters to see how the LBdealing with all its connections.
The LB takes thousands of connections a second which i would consider a fairly busy server. net.core.somaxconn
is the argument provided to the listen syscall. By default its 128 in ubuntu 14.04. Because it was under high
load the server had filled the listen queue almost instantly. Then quickly after filled the SYN queue.
Which is defined by the kernel param net.ipv4.tcp_max_syn_backlog
. This is the queue length for how many SYN connections the kernel can backup once the listen queue is full. Both of these settings were causing very poor networking performance.
So the default settings are not high enough for dealing with heavy traffic loads. The server quickly defaulted to using SYN cookies to deal with the large connection count. If your server has the following option enabled.
net.ipv4.tcp_syncookies = 1
SYN cookies are not a bad thing they will make your server look very fast at responding under high load because the connection is not queued. Im not going to head into serious detail on syn cookies and how they work. But both of these links are great and helped me understand my issue more. Nom Nom hence the article pciture!
- This link to github engineering blog explains syn floods and the handshake in detail
- This link talks about syn floods
TcpExtSyncookiesSent
TcpExtSyncookiesRecv
TcpExtSyncookiesFailed
TcpExtPruneCalled
TcpExtTW
TcpExtListenDrops
TcpExtTCPTimeouts
Some useful metrics to track above. Can get these from snmpd if you use it The issue that was plaguing the load balancer was that when the TCP handshake is being negotiated with SYN cookies the connection is not actually opened straight away. Only once the final ACK is received by the server it will be opened. But if both the listen queue & the syn queue are full the connection will just be dropped upon the arrival of the ACK. Because the client has already assumed the connection is opened, you will get a timeout on the client side. So SYN cookies are useful for taking load of the server during high network bursts but due to the full queues it was causing problems. Another issue you might hit at this high network workloads is that the number of connections will fill the time wait bucket. The kernel can only handle so many sockets in tw state. Chances are if your 1 ip:port bound this wont affect you. But if you have multiple instances of application or mulitple IPs bound for the application you can hit this quite easily. In Ubuntu 14.04 net.ipv4.tcp_max_tw_buckets = 32768 is the number of TW connections you can hold. This is actually quite a sensible limit because you will struggle to saturate this with standard configurations. If you reach this the kernel will start to prune connections from the TW bucket which isnt a good thing as TW is useful and part of the TCP standard for a reason. If you are dealing with lots of connections then this problem may creep up on you slowly. Increase number if you start to hit issues. But its very dependant on your rates of connections. There are other ways to deal with TW sockets mentioned in the blog below and I encourage you to read it as they all have different affects. More handshake diagrams & an outstanding post on time-wait state Time Wait All this investigation lead me into doing lots of reading into kernel metrics and counters for tcp connections.
/proc/net/tcp
/proc/net/tcp6
struct inet_diag_req_v2 {
__u8 sdiag_family;
__u8 sdiag_protocol;
__u8 idiag_ext;
__u8 pad;
__u32 idiag_states;
struct inet_diag_sockid id;
}
Couple of good links:
- Brilliant article on how to query Netlink here
- Not that informative but shows serious perf gains can be made from netlink over proc reading here
Netlink is fussy fussy when it comes to the msg being exactly how it expects it. I had a hell of a time getting errors back from it, or alternatively it just hanging when listening for the recvfrom. You need to make sure that you are giving the kernel the correct kernel struct exactly as it wants it. Forunately I found a repo online that had some netlink code in python, stripped it down & ported it to python3 and ended up with a simple inet_diag request that parsed the socket table and could give me all the info from a inet_diag_msg struct. Here on github
If your interested in a more robust and generic netlink lib in python, facebook have a great one called gnlpy. I should probably have used this, but while learning the simpler the better.
The problem with this python tooling was that it churned the CPU quite heavily when running on heavily loaded machines it was building structs dicts for each socket and when your machine has 200k sockets that can be expensive. Probably could have spent time making it more performant in python. But I have been playing with rust recently and quite enjoying it, so what better excuse did i need for another rewrite in something that should give me more speed and less resources. After porting to rust it can run smoothly without any cpu churn while collecting the stats for you. You can find the tool here on github and it works great for collecting socket info. Im adding other options to it with some ss functionality etc. Going to add a daemon mode so it can run and send the stats you need to statsd listener
I learned lots from what just seemed like a timeout issue on a java app. In summary:
- Use netlink rather than parsing proc. It can be expensive at scale
- Rust makes things flyyyyy!
- Facebook has a pretty cool netlink lib called gnlpy. Really should port my code to use that
- And try to get it to run little faster without the cpu churn..