nanog mailing list archives
Re: Question about normal ops - BGP Flaps nightly
From: Christopher Morrow <morrowc.lists () gmail com>
Date: Fri, 22 Nov 2019 08:20:07 +0800
On Fri, Nov 22, 2019 at 12:54 AM Tom Beecher <beecher () beecher cc> wrote:
I agree that this sounds like an automated process in some way. I would suspect that either a vendor code update changed something such that a given command that would not cause session reset now does, or they changed their automation to include a command that would cause a reset without realizing it/slipped through the cracks / etc.
thanks to some private chat with another nanog participant it was noted the reason for failure is: "Error event Operation timed out(60) for I/O session - closing it" This is fine, I suppose, except that I have v4/v6 sessions on the same ptp link/path. So, if v6 times out I'd have expected v4 to also timeout. Strangely I had thought we were told the 2 links we have land on 2 different devices, but router-id tells me that's false as well. :( The sessions appear to reset on both devices (according to syslog) at the same time, I had thought (because our alerter is telling me) the sessions had a gap between the 2 drops. The physical payer is some bidi fiber path across an L2 (ether) network to the provider, perhaps the problem isn't on the l3/bgp parts here, but in the l2 network between. we are at the end of our time here so I think I'll gather some logs and see if the provider can make sense of the issues.
On Thu, Nov 21, 2019 at 9:18 AM Mel Beckman <mel () beckman org> wrote:No. There should be no reason to bounce the session. Do you have soft updates turn on? -mel via cellOn Nov 21, 2019, at 1:46 AM, Christopher Morrow <morrowc.lists () gmail com> wrote: Howdy! A question of interest to me, currently, is whether it's normal for providers to cause BGP flaps to their customers nightly... This seems, in my case, to be the provider PROBABLY updating prefix-filters on my session(s). Particularly AS56554 is currently getting v4/v6 transit from 2 providers, one of which we have 2 links toward. That provider appears to flap both of our ipv6 (only) bgp peers each night at about the same time each night. This smells like: "filter updates', but something that's different than the v4 filter update? (or perhaps they have no v4 filtering to update?) In the end, should customers expect nightly (or on a regular cadence) to see their sessions bounce? It hasn't been my experience in other situations... -chris
Current thread:
- Question about normal ops - BGP Flaps nightly Christopher Morrow (Nov 21)
- Re: Question about normal ops - BGP Flaps nightly Jared Mauch (Nov 21)
- Re: Question about normal ops - BGP Flaps nightly Christopher Morrow (Nov 21)
- Re: Question about normal ops - BGP Flaps nightly Mel Beckman (Nov 21)
- Re: Question about normal ops - BGP Flaps nightly Tom Beecher (Nov 21)
- Re: Question about normal ops - BGP Flaps nightly Christopher Morrow (Nov 21)
- Re: Question about normal ops - BGP Flaps nightly Tom Beecher (Nov 21)
- Re: Question about normal ops - BGP Flaps nightly Baldur Norddahl (Nov 21)
- Re: Question about normal ops - BGP Flaps nightly Saku Ytti (Nov 21)
- Re: Question about normal ops - BGP Flaps nightly Christopher Morrow (Nov 21)
- Re: Question about normal ops - BGP Flaps nightly Baldur Norddahl (Nov 21)
- Re: Question about normal ops - BGP Flaps nightly Christopher Morrow (Nov 21)
- Re: Question about normal ops - BGP Flaps nightly Warren Kumari (Nov 21)
- Re: Question about normal ops - BGP Flaps nightly Yoni Radzin (Nov 22)
- Re: Question about normal ops - BGP Flaps nightly Saku Ytti (Nov 21)
- Re: Question about normal ops - BGP Flaps nightly Jared Mauch (Nov 21)
- Re: Question about normal ops - BGP Flaps nightly Mark Tinka (Nov 27)