|
|
我发了工单给他们客服了。
他们的技术真是有问题 ,,,矬的很。
我运行了 tcpdump -ni ens3 port not 2052 (2052是ssh的端口),发现存在一堆的内部 arp request,一直在占用网卡的资源
cpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ens3, link-type EN10MB (Ethernet), capture size 262144 bytes
02:53:18.270169 ARP, Request who-has 96.44.187.221 tell 96.44.187.217, length 46
02:53:18.291044 IP 155.94.133.238.35099 > 255.255.255.255.20086: UDP, length 35
02:53:18.291118 ARP, Request who-has 204.44.66.176 tell 204.44.66.1, length 46
02:53:18.312881 ARP, Request who-has 204.44.68.106 tell 204.44.68.1, length 46
02:53:18.312902 ARP, Request who-has 204.44.83.149 tell 204.44.83.1, length 46
02:53:18.312907 ARP, Request who-has 204.44.83.21 tell 204.44.83.1, length 46
02:53:18.312909 ARP, Request who-has 204.44.82.156 tell 204.44.82.1, length 46
02:53:18.312911 ARP, Request who-has 155.94.182.76 tell 155.94.182.1, length 46
02:53:18.312913 ARP, Request who-has 204.44.82.95 tell 204.44.82.1, length 46
02:53:18.312915 ARP, Request who-has 198.55.102.233 tell 198.55.102.1, length 46
02:53:18.315049 ARP, Request who-has 204.44.68.10 tell 204.44.68.1, length 46
02:53:18.315867 ARP, Request who-has 204.44.82.84 tell 204.44.82.1, length 46
02:53:18.319718 ARP, Request who-has 198.55.122.21 tell 198.55.122.1, length 46
02:53:18.325845 ARP, Request who-has 107.150.4.244 tell 107.150.4.1, length 46
02:53:18.329364 ARP, Request who-has 155.94.205.198 tell 155.94.205.1, length 46
02:53:18.330252 ARP, Request who-has 198.55.102.28 tell 198.55.102.1, length 46
02:53:18.338575 ARP, Request who-has 155.94.192.5 tell 155.94.192.1, length 46
特么,我就奇了怪了,他们就不懂在网关上将小鸡的MAC与IP地址绑定一下?非要各个网关满网络里的查找IP对应的MAC地址?
愚蠢的要命。
这个玩意,一直的查询,小鸡们还得一直响应各个网关不眠不休的查询请求。
干。
小鸡的负载哪里受的了?小鸡的网络带宽全特么被这些本可以避免的查询占用,啥都不干都能跑流量。
废物。 |
|