[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Question about normal ops - BGP Flaps nightly
- Subject: Question about normal ops - BGP Flaps nightly
- From: beecher at beecher.cc (Tom Beecher)
- Date: Thu, 21 Nov 2019 11:54:27 -0500
- In-reply-to: <[email protected]>
- References: <CAL9jLaZFSXrU17EV-Z11RfBDFfnB6u=QgDe=G3jP878YMdEo-Q@mail.gmail.com> <[email protected]>
I agree that this sounds like an automated process in some way.
I would suspect that either a vendor code update changed something such
that a given command that would not cause session reset now does, or they
changed their automation to include a command that would cause a reset
without realizing it/slipped through the cracks / etc.
On Thu, Nov 21, 2019 at 9:18 AM Mel Beckman <mel at beckman.org> wrote:
> No. There should be no reason to bounce the session. Do you have soft
> updates turn on?
>
> -mel via cell
>
> > On Nov 21, 2019, at 1:46 AM, Christopher Morrow <morrowc.lists at gmail.com>
> wrote:
> >
> > Howdy!
> > A question of interest to me, currently, is whether it's normal for
> > providers to cause BGP flaps to their customers nightly... This seems,
> > in my case, to be the provider PROBABLY updating prefix-filters on my
> > session(s).
> >
> > Particularly AS56554 is currently getting v4/v6 transit from 2
> > providers, one of which we have 2 links toward. That provider appears
> > to flap both of our ipv6 (only) bgp peers each night at about the same
> > time each night. This smells like: "filter updates', but something
> > that's different than the v4 filter update? (or perhaps they have no
> > v4 filtering to update?)
> >
> > In the end, should customers expect nightly (or on a regular cadence)
> > to see their sessions bounce? It hasn't been my experience in other
> > situations...
> >
> > -chris
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20191121/fb2f7c72/attachment.html>