IPSEC: move SA counters into the stats segment
1) stats are accessed via the stat segment which is more condusive to monitoring 2) stats are accurate in the presence of multiple threads. There's no guarantee that an SA is access from only one worker. Change-Id: Id5e217ea253ddfc9480aaedb0d008dea031b1148 Signed-off-by: Neale Ranns <nranns@cisco.com>
This commit is contained in:

committed by
Damjan Marion

parent
684586786e
commit
eba31ecebe
@ -304,6 +304,15 @@ class IpsecTraTests(object):
|
||||
self.logger.info(self.vapi.ppcli("show error"))
|
||||
self.logger.info(self.vapi.ppcli("show ipsec"))
|
||||
|
||||
pkts = p.tra_sa_in.get_stats()['packets']
|
||||
self.assertEqual(pkts, count,
|
||||
"incorrect SA in counts: expected %d != %d" %
|
||||
(count, pkts))
|
||||
pkts = p.tra_sa_out.get_stats()['packets']
|
||||
self.assertEqual(pkts, count,
|
||||
"incorrect SA out counts: expected %d != %d" %
|
||||
(count, pkts))
|
||||
|
||||
self.assert_packet_counter_equal(self.tra4_encrypt_node_name, count)
|
||||
self.assert_packet_counter_equal(self.tra4_decrypt_node_name, count)
|
||||
|
||||
@ -333,6 +342,14 @@ class IpsecTraTests(object):
|
||||
self.logger.info(self.vapi.ppcli("show error"))
|
||||
self.logger.info(self.vapi.ppcli("show ipsec"))
|
||||
|
||||
pkts = p.tra_sa_in.get_stats()['packets']
|
||||
self.assertEqual(pkts, count,
|
||||
"incorrect SA in counts: expected %d != %d" %
|
||||
(count, pkts))
|
||||
pkts = p.tra_sa_out.get_stats()['packets']
|
||||
self.assertEqual(pkts, count,
|
||||
"incorrect SA out counts: expected %d != %d" %
|
||||
(count, pkts))
|
||||
self.assert_packet_counter_equal(self.tra6_encrypt_node_name, count)
|
||||
self.assert_packet_counter_equal(self.tra6_decrypt_node_name, count)
|
||||
|
||||
@ -385,6 +402,17 @@ class IpsecTun4Tests(object):
|
||||
self.assertEqual(pkts, count,
|
||||
"incorrect SPD any policy: expected %d != %d" %
|
||||
(count, pkts))
|
||||
|
||||
if (hasattr(p, "tun_sa_in")):
|
||||
pkts = p.tun_sa_in.get_stats()['packets']
|
||||
self.assertEqual(pkts, count,
|
||||
"incorrect SA in counts: expected %d != %d" %
|
||||
(count, pkts))
|
||||
pkts = p.tun_sa_out.get_stats()['packets']
|
||||
self.assertEqual(pkts, count,
|
||||
"incorrect SA out counts: expected %d != %d" %
|
||||
(count, pkts))
|
||||
|
||||
self.assert_packet_counter_equal(self.tun4_encrypt_node_name, count)
|
||||
self.assert_packet_counter_equal(self.tun4_decrypt_node_name, count)
|
||||
|
||||
@ -433,6 +461,14 @@ class IpsecTun6Tests(object):
|
||||
self.logger.info(self.vapi.ppcli("show error"))
|
||||
self.logger.info(self.vapi.ppcli("show ipsec"))
|
||||
|
||||
pkts = p.tun_sa_in.get_stats()['packets']
|
||||
self.assertEqual(pkts, count,
|
||||
"incorrect SA in counts: expected %d != %d" %
|
||||
(count, pkts))
|
||||
pkts = p.tun_sa_out.get_stats()['packets']
|
||||
self.assertEqual(pkts, count,
|
||||
"incorrect SA out counts: expected %d != %d" %
|
||||
(count, pkts))
|
||||
self.assert_packet_counter_equal(self.tun6_encrypt_node_name, count)
|
||||
self.assert_packet_counter_equal(self.tun6_decrypt_node_name, count)
|
||||
|
||||
|
Reference in New Issue
Block a user