- Community Home
- >
- Networking
- >
- Switching and Routing
- >
- Comware Based
- >
- comware - Output dropped: 1926544
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-31-2020 07:30 AM
12-31-2020 07:30 AM
comware - Output dropped: 1926544
hello
run a display packet-drop Ten-GigabitEthernet1/0/2
Ten-GigabitEthernet1/0/2:
Packets dropped due to full GBP or insufficient bandwidth: 1926544
Packets dropped due to Fast Filter Processor (FFP): 0
Packets dropped due to STP non-forwarding state: 0
Packets dropped due to insufficient data buffer. Input dropped: 0 Output dropped: 1926544
Does this mean that the equipment to which it is connected is not able to receive the traffic? These are esx servers - is it recommended to run burst support ?
What does the drop mean? Is there an injury? Is there anything that can be done? At what level? Customer equipment or switch?
best regard
gadi
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-31-2020 07:51 AM - edited 12-31-2020 07:59 AM
12-31-2020 07:51 AM - edited 12-31-2020 07:59 AM
Re: comware - Output dropped: 1926544
Hello @gadisontag !
This counter shows you packets that were dropped by the switch due to outgoing buffer depletion. Typically it happens when there is a spike in the traffic destined to the device connected on this port. Like when you have 2 x 10G devices simultaneously communicating with 1 x 10G server. Or 40G device that sends data to 10G ESXi server. Normally TCP/IP handles such losses quite well, but it all depends on how much are those 1926544 packets in comparison to total outgoing traffic out of this port. Practically that counter is just a symptom of oversubscription of the Ten1/0/2. As for the impact, you need to test different scenarios with different load, nobody knows your network better than you.
The best solution will be to connect your server using multiple 10G links in order to share the load between NICs. It can be a BAGG (link aggregation) or just multiple standalone ports, it's up to you, but you need to provide more bandwidth to the server if you really feel the impact of the dropped traffic.
You can try two features of Comware switches in order to alleviate this problem:
1. Enable burst mode
system-view
burst-mode enable
The Burst feature enables the switch to automatically allocate cell and packet resources. It is well suited to the following scenarios:
• Traffic enters a switch from a high-speed interface and goes out of a low-speed interface.
• Traffic enters a switch from multiple same-rate interfaces and goes out of an interface with the same rate.
2. Use cut-through Layer 2 forwarding
system-view
cut-through enable
A cut-through forwarding-enabled switch forwards a frame after it receives the first 64 bytes of the frame. This feature reduces the transmission time of a frame within the switch, and enhances forwarding performance.
You can use them separately or together, but the real solution will be providing more bandwidth to the server.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-31-2020 10:37 AM
12-31-2020 10:37 AM
Re: comware - Output dropped: 1926544
thank
What is the impact of running the feature ( burst amd cut throu) ?
have a happy new year
gadi
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-03-2021 12:26 PM - edited 01-03-2021 12:30 PM
01-03-2021 12:26 PM - edited 01-03-2021 12:30 PM
Re: comware - Output dropped: 1926544
Having cut-through enabled will disable CRC checking of frames on the switch itself, so if a frame will get corrupted, the switch won't care much about it and will just forward it "as is" to the destination. Practically you will see CRC error counter increasing on the end-device instead of a switch port if due to some reason you have corrupted frames in your network. When switches working in cut-through mode receive the frame, it will look up its first 6 bytes of the frame that following the preamble. Then the LAN switch will check the destination MAC address in its switching table, and determine the outgoing interface port, and forwards the frame to its destination. No CRC error-checking in cut-through switching process. But the overall latency is lower, in some cases it is much more important.
Burst mode has been already described, it's nothing more than more more suitable buffer resources allocation mechanism for bursty traffic.
I'd try the burst mode first and then the cut-through switching as a last resort option. But as I already mentioned the real solution is more bandwidth.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-08-2021 09:30 AM
09-08-2021 09:30 AM
Re: comware - Output dropped: 1926544
Hello.
My two chassis are:
HP A10508 Switch Chassis JC612A
There are no layer 1 issues.
<CSALUD-SEV-001-SWLAN50>display version
HPE Comware Software, Version 7.1.070, Release 7585P07
Copyright (c) 2010-2020 Hewlett Packard Enterprise Development LP
HP 10508 uptime is 25 weeks, 5 days, 21 hours, 11 minutes
Last reboot reason : USER reboot
Boot image: flash:/10500-CMW710-BOOT-R7585P07.bin
Boot image version: 7.1.070, Release 7585P07
Compiled Jan 14 2020 11:00:00
System image: flash:/10500-CMW710-SYSTEM-R7585P07.bin
System image version: 7.1.070, Release 7585P07
Compiled Jan 14 2020 11:00:00
Can I apply cut-through to avoid packet drops? And, how?
"cut-through enable" command is not recognized (irf cluster mode)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-08-2021 12:25 PM
09-08-2021 12:25 PM
Re: comware - Output dropped: 1926544
Hi @JUANTRON !
This command is not supported on this platform. And I doubt you really need it. It doesn't automagically resolve issues with dropped packets, it just MAY increase traffic forwarding performance. But if your switch struggles to handle traffic in your network maybe you need to revise its hardware configuration - increase number of fabric cards or replace them with more capable ones, change line cards with more newer ones that support higher speeds etc. etc. First, analyze the root cause of packet drops in your network and then plan the corrective measures. Putting arbitrary commands in the config found on forums (even if that forum is our wonderful community) was never a good idea.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-08-2021 11:43 PM
09-08-2021 11:43 PM
Re: comware - Output dropped: 1926544
Thank you Ivan. But, could you tell me why "burst mode" can't be applied on tengigabit interface cards? I think this would solve the problems related to packet drops. Since we enabled this feature on 1 Gbps cards, no more packet drops on these interfaces. Do you know if "burst mode" can be applied on tengigabit interface cards?
I have two HP 10508 chassis in irf cluster mode.
I can't apply "burst mode" feature in the following cards:
HP A10500 16-port 10-GbE SFP+ SC Module JC628A
HPE 10500 16p 1/10GbE SFP+ SF Mod JH193A
But "burst mode" is applied in the following cards:
HP A10500 48-port Gig-T SE Module JC618A
HP 10500 16p GbE SFP/8p GbE Cmbo SE Mod JC763A
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-10-2021 02:02 AM
09-10-2021 02:02 AM
Re: comware - Output dropped: 1926544
In IRF mode:
burst-mode enable chassis chassis-number slot slot-number
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-10-2021 07:44 AM
09-10-2021 07:44 AM
Re: comware - Output dropped: 1926544
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-10-2021 09:07 AM - edited 09-10-2021 09:08 AM
09-10-2021 09:07 AM - edited 09-10-2021 09:08 AM
Re: comware - Output dropped: 1926544
You are welcome!
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00090286en_us
so on HP 10500 16p GbE SFP/8p GbE Cmbo SE Mod JC763A it should work. The rest are not supported by this feature
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-10-2021 09:50 AM
09-10-2021 09:50 AM
Re: comware - Output dropped: 1926544
Thank you Ivan.
Excellent answer.
It's a pity that we can't apply this great feature in our tengig cards. I think It is an engineering problem, because our network it's very well designed. 20 Gbps for the bridge aggregations facing firewalls, so there is sufficient bandwidth for our systems. I guess these packets drops are very common in other networks.
Since We installed new Check Point firewalls, from time to time we see icmp packet losses, and I thought that maybe with this feature the losses would disappear. But I think this icmp drops are due to a defense mechanism associated to the firewall clusters.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-13-2021 11:18 PM
09-13-2021 11:18 PM