To determine if the high metric is a cause for concern, you must perform a packet capture on the Service Engine. This allows you to differentiate between actual packet drops and the observed connection resets that increment the UI counter.
Verification Steps:
- Capture Packets: Initiate a packet capture on the affected Service Engine for 2-3 minutes. Ensure you capture 'All Traffic' to get a complete picture. After the capture is complete, download and extract the resulting files.
- Check for Actual Packet Drops:
- Locate and open the '<se-uuid>_dropped_core_0.pcapng' file.
- This file contains only packets that were dropped by the Service Engine. If this file is empty or does not contain any relevant TCP data connection packets, it confirms the Service Engine is not the source of dropped traffic.
- Investigate Connection Resets (RSTs):
- Next, open the main traffic file, '<se-uuid>_se_core_0.pcapng', in a tool like Wireshark.
- This file contains the normal traffic flow. Apply the display filter
tcp.flags.reset==1 to isolate all the RST packets that increment the "Dropped Connections" counter.
- Assess the Source:
- Examine the source and destination IPs of the filtered RST packets from the 'se_core_0.pcapng' file.
- If the resets originate from expected connections or sources, such as health monitors or applications that normally terminate sessions this way, then the high "Dropped Connections" count is benign and can be safely ignored.
- If the resets are from unexpected sources, it indicates an issue with the client or backend application that warrants further investigation.
Addressing the root cause of unexpected RST packets will not only resolve potential application issues but also allow the "Dropped Connections" metric to be used as a more accurate indicator of network health.
Please reach out to Broadcom Support if you need assistance with performing the service engine packet capture.