Monitoring Network Hops to Peers
3 minute read
This feature collects traceroute-like data to all its connected peers and stores the results in the Trustgrid cloud for historical review.
Network hop monitoring requires version 20220808 or newer to gather the required data.
How it Works
- The node will send out packets to each peer’s public IP and port (if a gateway) with incrementing Time To Live (TTL) values.
- As the packets pass through each router (or hop) along the way the TTL is decreased by one.
- Any time a router receives a packet with at TTL with the value 1 it will drop the packet and can reply with an ICMP packet saying “Time to Live has been exceeded”
- The node uses these ICMP packets to calculate latency to each hop.
Known Limitations
There are several known limitations with gathering this data:
- Routers on the internet are not required to respond with ICMP. This will lead to gaps in the Hop numbers.
- Those that do respond sometimes deprioritize their response which leads to misleading latency numbers.
- If you see a hop with high values, but the the values for higher hop numbers is normal this is not likely the cause of problems
- If a hop has high values and all subsequent hops have higher values this is likely the source of the latency/loss
- Firewall rules have to allow the packets and the responses.
- By utilizing the same TCP port as the gateway, all data collected from edge nodes should be allowed out.
- Some firewalls/routers have trouble correlating the TCP request with the ICMP response which leads to no data
- Gathering this data requires compute resources on the node and the gateway. Trustgrid recommends only enabling on edge nodes that have frequent latency or packet loss issues as a troubleshooting tool.
It is not recommended to enable this feature on public gateways or private gateways with a large number of clients
Enabling Network Hop Monitoring
- Navigate to the node you want to enable
- Verify there version is 20220808 or higher
- Navigate to
Gateway
under theSystem
section - Enable
Network Hop Monitoring
and clickSave
Special Considerations
Azure Nodes
If you enable this on an edge node running on an Azure VM, the default security group rules will prevent responses from intermediate hops on the path. You will still get data from the final hop, which is the target gateway.
You will need to add an inbound rule to the node’s public interface network security group.
The rule needs the settings shown below:
The rule has to allow the destination of any which is not without risk. Make you weight the risks and benefits and are aware what VMs in Azure are using the same security group.
Viewing Network Hop Data
- Navigate to the node you want to view
- Select
Data Plane
on the left - Select the peer you wish to view data for. You will see a table of hops appear in the bottom right.
- You can select a time point on the latency chart, and the hops table will update to show the data for that time point.
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.