HostConntrackLimit #
The number of conntrack is approaching limit
Alert Rule
alert: HostConntrackLimit
annotations:
description: |-
The number of conntrack is approaching limit
VALUE = {{ $value }}
LABELS = {{ $labels }}
runbook: https://srerun.github.io/prometheus-alerts/runbooks/node-exporter/hostconntracklimit/
summary: Host conntrack limit (instance {{ $labels.instance }})
expr: (node_nf_conntrack_entries / node_nf_conntrack_entries_limit > 0.8) * on(instance)
group_left (nodename) node_uname_info{nodename=~".+"}
for: 5m
labels:
severity: warning
Here is a sample runbook for the HostConntrackLimit alert:
Meaning #
The HostConntrackLimit alert is triggered when the number of conntrack entries on a host exceeds 80% of the maximum allowed limit. This can indicate a potential performance issue or even a denial of service (DoS) attack.
Impact #
If left unaddressed, a high conntrack count can lead to:
- Increased system latency and packet loss
- Reduced network throughput
- Potential crashes or freezes of the affected host
- Security risks due to the inability to track new connections
Diagnosis #
To diagnose the issue, follow these steps:
- Check the node_nf_conntrack_entries metric to determine the current conntrack count.
- Verify that the node_nf_conntrack_entries_limit is set correctly and not too low.
- Investigate the cause of the high conntrack count, such as:
- Suspicious network activity or potential DoS attacks
- Resource-intensive applications or services
- Configuration issues or misconfigurations
- Review system logs and network traffic patterns to identify any anomalies.
Mitigation #
To mitigate the issue, follow these steps:
- Increase the conntrack limit (node_nf_conntrack_entries_limit) if it is set too low.
- Implement rate limiting or traffic shaping to reduce the number of incoming connections.
- Optimize system resources and configuration to reduce the load on the host.
- Consider implementing additional security measures, such as firewall rules or intrusion detection systems, to prevent potential DoS attacks.
- Monitor the conntrack count and system performance closely to ensure the issue is resolved and does not recur.
Note: This is a sample runbook, and the specific steps may vary depending on your environment and setup. Be sure to customize the runbook to fit your organization’s needs.