[Bloat] Can't Run Tests Against netperf.bufferbloat.net

Toke Høiland-Jørgensen toke at toke.dk
Fri Feb 7 06:11:30 EST 2020


Rich Brown <richb.hanover at gmail.com> writes:

>> On Feb 6, 2020, at 12:00 PM, Matt Taggart wrote:
>> 
>> This smells like a munin or smokeping plugin (or some other sort of 
>> monitoring) gathering data for graphing.
>
> Yup. That is a real possibility. The question is what we do about it.
>
> If I understood, we left it at:
>
> 1) Toke was going to look into some way to spread the
> 'netperf.bufferbloat.net' load across several of our netperf servers.
>
> 2) Can someone give me advice about iptables/tc/? to identify IP
> addresses that make "too many" connections and either shut them off or
> dial their bandwidth back to a 3 or 5 kbps?

Not sure if it's possible to do with iptables, but it should be fairly
straight-forward to write an eBPF filtering program that will lock out
an IP after it has used a certain amount of bandwidth. That was the
reason for my question about your kernel version; need to figure out
what types of BPF support you have available :)

-Toke



More information about the Bloat mailing list