Sponsored Content
Operating Systems Solaris Slow ssh connection after patching Post 302555873 by DukeNuke2 on Friday 16th of September 2011 01:50:17 AM
Old 09-16-2011
could be the reverse dns... try this for a test:

enter the IP and name of "server2" in your /etc/hosts file and try again to connect with ssh.
 

9 More Discussions You Might Find Interesting

1. Solaris

rsh connection is very slow.....what to look for...???

Hi All, My rsh connecion is very slow, what should I look for...??? Note : I get the rsh connection, but it takes time. Thanks & Regards, jumadhiya. (3 Replies)
Discussion started by: jumadhiya
3 Replies

2. Solaris

ssh very slow

I'm facing a problem when trying to ssh to SUN servers with solaris OS,it takes a long time until prompted for password ..after connecting to the server everything work fine..how can I solve this issue??? (11 Replies)
Discussion started by: mm00123
11 Replies

3. Solaris

ssh login issue after patching

Hi Everybody, Recently i applied patch cluster dated (2009.11.03) for solaris 10 sparc machine(Generic_138888-06) I successfully applied and rebooted the machine , no errors received. But after patching it was not allowing me to login through ssh while telnet was working fine.Logs showed me ... (11 Replies)
Discussion started by: laxmikant
11 Replies

4. Solaris

Slow login via SSH

Hi Guys and Girls, I know this is a common question but I've searched and we've tried the suggestions without luck. When I log into the box via SSH from a windows machine I get a 1 min 20 sec delay. If we add my IP address and machine name to /etc/hosts then I get an instant login. I would be happy... (12 Replies)
Discussion started by: MikeKulls
12 Replies

5. HP-UX

SSH slow at connect

Hi experts, We are getting slow ssh session connections at HP-UX 11.31 servers. We have set the parameters that maybe will affect , and commented at other theads at config file sshd_config : UseDNS no X11Forwarding yes X11DisplayOffset 10 X11UseLocalhost no GSSAPIAuthentication no. ... (7 Replies)
Discussion started by: SapBasisSystem
7 Replies

6. UNIX for Advanced & Expert Users

How keep running a program n an another computer via a connection ssh when the connection is closed?

Hi everybody, I am running a program on a supercomputer via my personal computer through a ssh connection. My program take more than a day to run, so when I left work with my PC I stop the connection with the supercomputer and the program stop. I am wondering if someone know how I can manage... (2 Replies)
Discussion started by: TomTomGre
2 Replies

7. Solaris

Ssh connection broke after patching

Hi, I have a user - e3t3user on two Solaris-10 servers. We did patching source server and after that e3t3user is not able to ssh from one server to another. Passwordless ssh connection is setup between both servers (with ssh keys share). I am not able to figure out, where it is failing. Here is... (1 Reply)
Discussion started by: solaris_1977
1 Replies

8. Solaris

Defunct process are generated after JNLP connection with a slave and the machine gets very slow

Hi everyone, I'm working on continous integration with Jenkins. I’m facing an issue while connecting a slave (solaris sparc 8) with Jenkins ver. 1.532.2 This slave is connected via the option “Launch slave via execution of command on the Master”. Connection is established with: -... (1 Reply)
Discussion started by: javaPIC
1 Replies

9. UNIX for Beginners Questions & Answers

Ssh script to validate ssh connection to multiple serves with status

Hi, I want to validate ssh connection one after one for multiple servers..... password less keys already setup but now i want to validate if ssh is working fine or not... I have .sh script like below and i have servers.txt contains all the list of servers #/bin/bash for host in $(cat... (3 Replies)
Discussion started by: sreeram4
3 Replies
ovs-test(1)							Open vSwitch Manual						       ovs-test(1)

NAME
ovs-test - check Linux drivers for performance and vlan problems SYNOPSIS
ovs-test -s port ovs-test -c server1 server2 [-b bandwidth] Common options: [-h | --help] [-V | --version] DESCRIPTION
The ovs-test program may be used to check for problems sending 802.1Q traffic that Open vSwitch may uncover. These problems can occur when Open vSwitch is used to send 802.1Q traffic through physical interfaces running certain drivers of certain Linux kernel versions. To run a test, configure Open vSwitch to tag traffic originating from server1 and forward it to the server2. On both servers run ovs-test in server mode. Then, on any other host, run the ovs-test in client mode. The client will connect to both ovs-test servers and schedule tests between them. ovs-test will perform UDP and TCP tests. UDP tests can report packet loss and achieved bandwidth, because UDP flow control is done inside ovs-test. It is also possible to specify target bandwidth for UDP. By default it is 1Mbit/s. TCP tests report only achieved bandwidth, because kernel TCP stack takes care of flow control and packet loss. TCP tests are essential to detect potential TSO related VLAN issues. To determine whether Open vSwitch is encountering any 802.1Q related problems, the user must compare packet loss and achieved bandwidth in a setup where traffic is being tagged against one where it is not. If in the tagged setup both servers are unable to communicate or the achieved bandwidth is lower, then, most likely, Open vSwitch has encountered a pre-existing kernel or driver bug. Some examples of the types of problems that may be encountered are: o When NICs use VLAN stripping on receive they must pass a pointer to a vlan_group when reporting the stripped tag to the networking core. If no vlan_group is in use then some drivers just drop the extracted tag. Drivers are supposed to only enable stripping if a vlan_group is registered but not all of them do that. o On receive, some drivers handle priority tagged packets specially and don't pass the tag onto the network stack at all, so Open vSwitch never has a chance to see it. o Some drivers size their receive buffers based on whether a vlan_group is enabled, meaning that a maximum size packet with a VLAN tag will not fit if no vlan_group is configured. o On transmit, some drivers expect that VLAN acceleration will be used if it is available, which can only be done if a vlan_group is configured. In these cases, the driver may fail to parse the packet and correctly setup checksum offloading or TSO. Client Mode An ovs-test client will connect to two ovs-test servers and will ask them to exchange traffic. Server Mode To conduct tests, two ovs-test servers must be running on two different hosts where client can connect. The actual test traffic is exchanged only between both ovs-test server test IP addresses. It is recommended that both servers have their test IP addresses in the same subnet, otherwise one will need to change routing so that the test traffic actually goes through the interface that he originally intended to test. OPTIONS
-s, --server port Run in server mode and wait for a client to establish XML RPC Control Connection on TCP port. It is recommended to have ethtool installed on the server so that it could retrieve information about NIC driver. -c, --client server1 server2 Run in client mode and schedule tests between server1 and server2, where each server must be given in following format - Con- trolIP[:ControlPort][,TestIP[:TestPort]]. If TestIP is omitted then ovs-test server will use the ControlIP for testing purposes. ControlPort is TCP port where server will listen for incoming XML/RPC control connections to schedule tests (by default it is 15531). TestPort is port which will be used by server to listen for test traffic (by default it is 15532). -b, --bandwidth bandwidth Target bandwidth for UDP tests. The bandwidth must be given in bits per second. It is possible to use postfix M or K to alter the target bandwidth magnitude. -h, --help Prints a brief help message to the console. -V, --version Prints version information to the console. EXAMPLES
Set up a bridge which forwards traffic originating from 1.2.3.4 out eth1 with VLAN tag 10. ovs-vsctl -- add-br vlan-br -- add-port vlan-br eth1 -- add-port vlan-br vlan-br-tag tag=10 -- set Interface vlan-br-tag type=internal ifconfig vlan-br-tag up 1.2.3.4 On two different hosts start ovs-test in server mode and tell them to listen on port 15531 for incoming client control connections: 1.2.3.4: ovs-test -s 15531 1.2.3.5: ovs-test -s 15531 On any other host start ovs-test in client mode and ask it to connect to those two servers - one at 1.2.3.4 and another at 1.2.3.5 (by default client will use TCP port 15531 to establish control channel). ovs-test -c 1.2.3.4 1.2.3.5 SEE ALSO ovs-vswitchd(8), ovs-ofctl(8), ovs-vsctl(8), ovs-vlan-test(8), ethtool(8), uname(1) Open vSwitch October 2011 ovs-test(1)
All times are GMT -4. The time now is 12:39 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy