VMware vSphere ESXi
The testing below is done from the very edge of the virtual network, when the ESXi host is handing the packet off to the physical NIC driver. Begin by confirming which vmnic is in use currently by the vSAN vmkernel adapters (vmk):
esxtop > hit enter > press the letter 'n' to view the networking data.Capturing traffic between the two hosts:
vmkping -I vmk# #.#.#.# -d -s 1472vmkping -I vmk# #.#.#.# -d -s 8972pktcap-uw --uplink vmnic# --capture UplinkSndKernel -o - |tcpdump-uw -ner- arp or icmppktcap-uw --uplink vmnic# --capture UplinkRcvKernel -o - |tcpdump-uw -ner- arp or icmp[source_host_here:~] pktcap-uw --uplink vmnic1 --capture UplinkSndKernel -o - |tcpdump-uw -ner- arp or icmpThe name of the uplink is vmnic1The session capture point is UplinkSndKernelpktcap: The output file is -.pktcap: No server port specified, select #### as the port.pktcap: Local CID #.pktcap: Listen on port ####.pktcap: Main thread: ############.pktcap: Dump thread: ############.pktcap: The output file format is pcapng.pktcap: Recv Thread: ############.pktcap: Accept...pktcap: Vsock connection from port #### cid #.reading from file -, link type ##### (Ethernet), snapshot lenght #####16:57:57.094737 ##.##.##.##.##.## > ##.##.##.##.##.##, ethertype IPv4 (#x####) length ####: #.#.#.# > #.#.#.#: ICMP echo request, id #####, seq 1, length ####16:57:58.095335 ##.##.##.##.##.## > ##.##.##.##.##.##, ethertype IPv4 (#x####) length ####: #.#.#.# > #.#.#.#: ICMP echo request, id #####, seq 2, length ####16:57:59.096922 ##.##.##.##.##.## > ##.##.##.##.##.##, ethertype IPv4 (#x####) length ####: #.#.#.# > #.#.#.#: ICMP echo request, id #####, seq 3, length ####16:58:00.097783 ##.##.##.##.##.## > ##.##.##.##.##.##, ethertype IPv4 (#x####) length ####: #.#.#.# > #.#.#.#: ICMP echo request, id #####, seq 4, length ####
pktcap-uw --uplink vmnic# --capture UplinkRcvKernel -o - |tcpdump-uw -ner- arp or icmppktcap-uw --uplink vmnic# --capture UplinkSndKernel -o - |tcpdump-uw -ner- arp or icmp[destination_host_here:~] pktcap-uw --uplink vmnic1 --capture UplinkSndKernel -o - |tcpdump-uw -ner- arp or icmpThe name of the uplink is vmnic1The session capture point is UplinkSndKernelpktcap: The output file is -.pktcap: No server port specified, select #### as the port.pktcap: Local CID #.pktcap: Listen on port ####.pktcap: Main thread: ############.pktcap: Dump thread: ############.pktcap: The output file format is pcapng.pktcap: Recv Thread: ############.pktcap: Accept...pktcap: Vsock connection from port #### cid #.reading from file -, link type ##### (Ethernet), snapshot lenght #####16:57:57.094737 ##.##.##.##.##.## > ##.##.##.##.##.##, ethertype IPv4 (#x####) length ####: #.#.#.# > #.#.#.#: ICMP echo reply, id #####, seq 1, length ####16:57:58.095335 ##.##.##.##.##.## > ##.##.##.##.##.##, ethertype IPv4 (#x####) length ####: #.#.#.# > #.#.#.#: ICMP echo reply, id #####, seq 2, length ####16:57:59.096922 ##.##.##.##.##.## > ##.##.##.##.##.##, ethertype IPv4 (#x####) length ####: #.#.#.# > #.#.#.#: ICMP echo reply, id #####, seq 3, length ####16:58:00.097783 ##.##.##.##.##.## > ##.##.##.##.##.##, ethertype IPv4 (#x####) length ####: #.#.#.# > #.#.#.#: ICMP echo reply, id #####, seq 4, length ####
If packets are being dropped in the physical network, please work with the server/hardware vendor to resolve this.