In recent weeks we started receiving alerts whenever a new AWS EC2 Instance running Ubuntu 14.04 LTS was launched for a specific Auto Scaling Group. On average, one new instance would be provisioned per day but the fault would only occur for about one or two of the new instances per week.
The alert was an indicator that the new instance was unable to communicate with the message broker located on another instance. However, after approximately 20 minutes the issue would self-resolve. Also, if we manually provisioned a new replacement instance, it would successfully communicate with the broker.
With the short window of failure and no consistent period between occurrences so this problem continued through several operations shifts and staff members before a plan was established to capture more details of the problem.
On the next alert we were able to investigate and establish several facts:
- The affected instance was unable to communicate due to a connection timeout. It was sending TCP SYN packets and receiving no reply.
- The message broker was receiving the TCP SYN packet from the affected instance and replying with a SYN+ACK packet but the MAC address on the reply packet did not match the MAC address on the incoming SYN packet.
ip neigh showon the message broker instance reported that the IP address of the affected instance was associated with an unrelated MAC address and was in the
STALEstate but occasionally also in the
- The unrelated MAC address was not associated with any other instances running in the VPC nor any that had been recently terminated.
At this point we setup two monitors on the message broker instance while we waited for the problem to self-resolve. The first was a
tcpdump to capture all ARP traffic and the second was a shell script to continuously poll and record the ARP table. The ARP traffic capture contained very little and nothing at all helpful but the ARP table records were very interesting.
While the affected instance was unable to connect to the message broker, the ARP table cycled through the states
DELAY and back to
REACHABLE again, retaining the same incorrect MAC address association the whole time. The
DELAY state never lasted as long as five seconds.
At the moment when the problem self-resolved, the
DELAY state did last for five seconds and then transitioned to the
PROBE state, then to the
FAILED state and finally back to
REACHABLE but this time with the correct MAC address.
This insight lead one of our team members to find this Red Hat bug describing a Linux kernel issue that aligned with exactly the behaviour we were experiencing. Unfortunately the fix for this bug wasn’t merged until Linux kernel 4.11 which was only released in May and reportedly won’t be officially available in Ubuntu until Artful Aardvark 17.10.
Our assessment of all the stale ARP entries on the message broker combined with the known scaling behaviours of the messaging clients suggested that some entries had been there for at least 8 weeks. So this wasn’t a by-product of replacing instances rapidly and recycling IP addresses in the subnet too quickly.
As an interim solution we have implemented a cron job to remove any stale entries from the message broker’s ARP table and this has prevented the alerts from re-appearing for several weeks now.