网络性能分析

一、ping 检测网络的连通性

[root@master ~]# ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
64 bytes from 8.8.8.8: icmp_seq=1 ttl=45 time=29.0 ms
64 bytes from 8.8.8.8: icmp_seq=2 ttl=45 time=43.3 ms
64 bytes from 8.8.8.8: icmp_seq=3 ttl=45 time=36.2 ms
^C
--- 8.8.8.8 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2002ms
rtt min/avg/max/mdev = 29.076/36.225/43.343/5.826 ms

二、netstat

  • 查看网络性能
ERR/DRP/OVR不为0,很大,代表网络质量有问题
[root@master ~]# netstat -i (检测网络接口状况)
Kernel Interface table
Iface             MTU    RX-OK RX-ERR RX-DRP RX-OVR    TX-OK TX-ERR TX-DRP TX-OVR Flg
docker0          1500        0      0      0 0             0      0      0      0 BMU
ens33            1500  1683463      0      0 0        556252      0      0      0 BMRU
lo              65536  6069135      0      0 0       6069135      0      0      0 LRU
  • 其他常用查询
查看与服务端192.168.2.60:6443连接最多的ip
[root@master ~]# netstat -antp|grep "192.168.2.60:6443"|awk '{print $5}'|sort|uniq -c|sort -nr -k1
      6 192.168.2.60:6443
      1 192.168.2.62:64975

统计各种状态数量
[root@master ~]# netstat -antp|awk '{print $6}'|sort|uniq -c
      1 established)
    224 ESTABLISHED
      1 Foreign
     21 LISTEN
      1 SYN_SENT
     18 TIME_WAIT

三、tcpdump

ens33网络5个tcp包
[root@master ~]# tcpdump -n -c 5 -i ens33 tcp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
21:35:20.715164 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 1975951576:1975951628, ack 2055812032, win 255, length 52
21:35:20.721323 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 52:376, ack 1, win 255, length 324
21:35:20.722239 IP 192.168.2.108.52927 > 192.168.2.60.ssh: Flags [.], ack 376, win 4104, length 0
21:35:20.723497 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 376:636, ack 1, win 255, length 260
21:35:20.724096 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 636:800, ack 1, win 255, length 164
5 packets captured
7 packets received by filter
0 packets dropped by kernel

ens33 22端口的5个包
[root@master ~]# tcpdump -n -c 5 -i ens33 port 22
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
21:36:45.649302 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 1975953068:1975953120, ack 2055812516, win 255, length 52
21:36:45.659072 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 52:376, ack 1, win 255, length 324
21:36:45.659415 IP 192.168.2.108.52927 > 192.168.2.60.ssh: Flags [.], ack 376, win 4104, length 0
21:36:45.659812 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 376:636, ack 1, win 255, length 260
21:36:45.660394 IP 192.168.2.60.ssh > 192.168.2.108.52927: Flags [P.], seq 636:800, ack 1, win 255, length 164

保存到pcap文件
[root@master ~]# tcpdump -w 1.pcap -n -i ens33 port 22
posted @ 2022-02-21 21:26  曾某某scau  阅读(170)  评论(0编辑  收藏  举报