Bug 2098236 - RFE - Increase the default value of nsslapd-conntablesize.
Summary: RFE - Increase the default value of nsslapd-conntablesize.
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Directory Server
Classification: Red Hat
Component: 389-ds-base
Version: 12.2
Hardware: x86_64
OS: Linux
high
medium
Target Milestone: DS12.2
: dirsrv-12.3
Assignee: Jamie Chapman
QA Contact: LDAP QA Team
Evgenia Martynyuk
URL:
Whiteboard: sync-to-jira
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-06-17 16:40 UTC by Têko Mihinto
Modified: 2023-11-21 15:13 UTC (History)
8 users (show)

Fixed In Version: redhat-ds-12-9030020230711000312-1674d57
Doc Type: Deprecated Functionality
Doc Text:
.The `nsslapd-conntablesize` configuration parameter has been removed from `389-ds-base` The `nsslapd-conntablesize` configuration parameter has been removed from the `389-ds-base` package in RHEL 9.3. Previously, the `nsslapd-conntablesize` configuration attribute specified the size of the connection table that managed established connections. With the introduction of the multi-listener feature, which improves the management of established connections, Directory Server now calculates the size of the connection table dynamically. This also resolves issues, when the connection table size was set too low and it affected the number of connections the server was able to support. Starting with RHEL 9.3, use only `nsslapd-maxdescriptors` and `nsslapd-reservedescriptors` attributes to manage the number of TCP/IP connections Directory Server can support.
Clone Of:
Environment:
Last Closed: 2023-11-21 15:13:16 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github 389ds 389-ds-base issues 5469 0 None closed Increase the default value of nsslapd-conntablesize 2023-02-08 16:44:57 UTC
Red Hat Issue Tracker IDMDS-2526 0 None None None 2022-09-14 15:41:01 UTC
Red Hat Issue Tracker IDMDS-3084 0 None None None 2023-06-01 10:21:54 UTC
Red Hat Issue Tracker IDMDS-3525 0 None None None 2023-08-09 09:44:41 UTC
Red Hat Product Errata RHEA-2023:7429 0 None None None 2023-11-21 15:13:34 UTC

Description Têko Mihinto 2022-06-17 16:40:55 UTC
Description of problem:

There are quite often customer cases about shortage of file descriptors
and LDAP client requests not being processed.
The shortage is usually caused by a low value set for the nsslapd-conntablesize parameter.

The documentation mentions:
==========================================
The number of descriptors available for TCP/IP to serve client connections is determined by nsslapd-conntablesize, and is equal to the nsslapd-maxdescriptors attribute minus the number of file descriptors used by the server as specified in the nsslapd-reservedescriptors attribute for non-client connections, such as index management and managing replication.
==========================================

Nonetheless the gap usually observed between nsslapd-conntablesize and nsslapd-maxdescriptors ( default values ) looks pretty high.

Eg:
# dsconf -D "cn=Directory Manager" ldap://localhost:10389 config get nsslapd-conntablesize nsslapd-maxdescriptors
Enter password for cn=Directory Manager on ldap://localhost:10389: 
nsslapd-conntablesize: 1024
nsslapd-maxdescriptors: 262144
#

Would it be possible to make sure that the default value for nsslapd-conntablesize is set to something around ( nsslapd-maxdescriptors / 2 ) while keeping it capped to 64K [1] ?

[1] https://github.com/389ds/389-ds-base/blob/641221788c6081481d47e658c572fc0b32aed955/ldap/servers/slapd/libglobs.c#L4842

Version-Release number of selected component (if applicable):
RHDS 11.4 on RHEL 8.5.

How reproducible:
Always on my test systems and at customer sites.

Steps to Reproduce:
Install RHDS and check the default values of both parameters.

Actual results:
nsslapd-conntablesize is set to 1K

Expected results:
Have a higher default value.

Additional info:

Comment 1 mreynolds 2023-02-08 16:43:39 UTC
Upstream ticket:

https://github.com/389ds/389-ds-base/issues/5469

Comment 6 bsmejkal 2023-09-07 14:03:36 UTC
============================================================================================================ test session starts =============================================================================================================
platform linux -- Python 3.9.17, pytest-7.4.1, pluggy-0.13.1 -- /usr/bin/python3
cachedir: .pytest_cache
metadata: {'Python': '3.9.17', 'Platform': 'Linux-5.14.0-362.1.1.el9_3.x86_64-x86_64-with-glibc2.34', 'Packages': {'pytest': '7.4.1', 'pluggy': '0.13.1'}, 'Plugins': {'metadata': '3.0.0', 'html': '4.0.0', 'libfaketime': '0.1.2', 'flaky': '3.7.0'}}
389-ds-base: 2.3.5-1.module+el9dsrv+19320+04706864
nss: 3.90.0-3.el9_2
nspr: 4.35.0-3.el9_2
openldap: 2.6.3-1.el9
cyrus-sasl: 2.1.27-21.el9
FIPS: disabled
rootdir: /mnt/tests/rhds/tests/upstream/ds/dirsrvtests
configfile: pytest.ini
plugins: metadata-3.0.0, html-4.0.0, libfaketime-0.1.2, flaky-3.7.0
collected 2 items                                                                                                                                                                                                                            

dirsrvtests/tests/suites/resource_limits/fdlimits_test.py::test_fd_limits PASSED                                                                                                                                                       [ 50%]
dirsrvtests/tests/suites/resource_limits/fdlimits_test.py::test_reserve_descriptor_validation PASSED                                                                                                                                   [100%]

============================================================================================================= 2 passed in 20.28s =============================================================================================================

Marking as VERIFIED.

Comment 7 Evgenia Martynyuk 2023-09-18 13:58:47 UTC
RN passed SME review

Comment 11 errata-xmlrpc 2023-11-21 15:13:16 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (redhat-ds:12 bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2023:7429


Note You need to log in before you can comment on or make changes to this bug.