网络性能分析
一、ping 检测网络的连通性
[root@master ~]# ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
64 bytes from 8.8.8.8: icmp_seq=1 ttl=45 time=29.0 ms
64 bytes from 8.8.8.8: icmp_seq=2 ttl=45 time=43.3 ms
64 bytes from 8.8.8.8: icmp_seq=3 ttl=45 time=36.2 ms
^C
--- 8.8.8.8 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2002ms
rtt min/avg/max/mdev = 29.076/36.225/43.343/5.826 ms
二、netstat
- 查看网络性能
ERR/DRP/OVR不为0,很大,代表网络质量有问题
[root@master ~]# netstat -i (检测网络接口状况)
Kernel Interface table
Iface MTU RX-OK RX-ERR RX-DRP RX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg
docker0 1500 0 0 0 0 0 0 0 0 BMU
ens33 1500 1683463 0 0 0 556252 0 0 0 BMRU
lo 65536 6069135 0 0 0 6069135 0 0 0 LRU
- 其他常用查询
查看与服务端192.168.2.60:6443连接最多的ip
[root@master ~]# netstat -antp|grep "192.168.2.60:6443"|awk '{print $5}'|sort|uniq -c|sort -nr -k1
6 192.168.2.60:6443
1 192.168.2.62:64975
统计各种状态数量
[root@master ~]# netstat -antp|awk '{print $6}'|sort|uniq -c
1 established)
224 ESTABLISHED
1 Foreign
21 LISTEN
1 SYN_SENT
18 TIME_WAIT
三、tcpdump
ens33网络5个tcp包
[root@master ~]# tcpdump -n -c 5 -i ens33 tcp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
21:35:20.715164 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 1975951576:1975951628, ack 2055812032, win 255, length 52
21:35:20.721323 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 52:376, ack 1, win 255, length 324
21:35:20.722239 IP 192.168.2.108.52927 > 192.168.2.60.ssh: Flags [.], ack 376, win 4104, length 0
21:35:20.723497 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 376:636, ack 1, win 255, length 260
21:35:20.724096 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 636:800, ack 1, win 255, length 164
5 packets captured
7 packets received by filter
0 packets dropped by kernel
ens33 22端口的5个包
[root@master ~]# tcpdump -n -c 5 -i ens33 port 22
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
21:36:45.649302 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 1975953068:1975953120, ack 2055812516, win 255, length 52
21:36:45.659072 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 52:376, ack 1, win 255, length 324
21:36:45.659415 IP 192.168.2.108.52927 > 192.168.2.60.ssh: Flags [.], ack 376, win 4104, length 0
21:36:45.659812 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 376:636, ack 1, win 255, length 260
21:36:45.660394 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 636:800, ack 1, win 255, length 164
保存到pcap文件
[root@master ~]# tcpdump -w 1.pcap -n -i ens33 port 22