[Bloat] Can't Run Tests Against netperf.bufferbloat.net
Toke Høiland-Jørgensen
toke at toke.dk
Fri Feb 7 06:11:30 EST 2020
Rich Brown <richb.hanover at gmail.com> writes:
>> On Feb 6, 2020, at 12:00 PM, Matt Taggart wrote:
>>
>> This smells like a munin or smokeping plugin (or some other sort of
>> monitoring) gathering data for graphing.
>
> Yup. That is a real possibility. The question is what we do about it.
>
> If I understood, we left it at:
>
> 1) Toke was going to look into some way to spread the
> 'netperf.bufferbloat.net' load across several of our netperf servers.
>
> 2) Can someone give me advice about iptables/tc/? to identify IP
> addresses that make "too many" connections and either shut them off or
> dial their bandwidth back to a 3 or 5 kbps?
Not sure if it's possible to do with iptables, but it should be fairly
straight-forward to write an eBPF filtering program that will lock out
an IP after it has used a certain amount of bandwidth. That was the
reason for my question about your kernel version; need to figure out
what types of BPF support you have available :)
-Toke
More information about the Bloat
mailing list