VMware NSX
This issue occurs because some server vendors use Reserved Memory Range Reporting (RMRR) for health check and direct access to some hardware.
This prevents DPDK to claim the server physical NICs. This issue is known to affect at least the HP Proliant server series.
Because RMRR is reliant on VT-d extensions being enabled, disabling VT-d in the BIOS allows the datapath to claim the expected interfaces normally. Disabling RMRR for specific interfaces differs depending on the platform and can be convoluted. Disabling VT-d is a simpler approach applicable to the NSX Edge.
To resolve this issue, disable VT-d in the BIOS.
Disclaimer: VMware is not responsible for the accuracy or content of third-party websites, and inclusion of such links does not imply endorsement. Please consult the vendor before making the changes below to ensure there is no impact on server functionality.
To disable on VT-D on HPE ProLiant GEN 10:
To Disable VT-d on an HPE ProLiant Gen 9 Server:
Because RMRR is reliant on VT-d extensions being enabled, disabling VT-d in the BIOS allows the datapath to claim the expected interfaces normally. For more information, see Advisory: (Revision) Linux - KVM Virtual Machine Does Not Start and Displays "Device is ineligible for IOMMU domain attach due to platform RMRR requirement" Message on HPE ProLiant Systems with an Intel Processor.
This article describes the exact same behavior when KVM is used to try to enable PCI passthrough on a NIC on specific HPE ProLiant Servers. The article also provides information on how to disable RMRR for specific interfaces, but they differ for different platforms and can be convoluted. Disabling VT-d is a simpler approach applicable to the NSX Edge.