This article contains information about the newnslog Internet Protocol (IP) counters and a brief description of the counters.
Using the Counters
Log on to the NetScaler using an SSH client, change to SHELL, navigate to the /var/nslog directory, and then use the ‘nsconmsg’ command to see comprehensive statistics using the different counters available. For the detailed procedure refer to Citrix Blog – NetScaler ‘Counters’ Grab-Bag!.
The newnslog IP Counters
The following table lists the different newnslog IP counters and a brief description of the counter.
Counter |
Description |
ip_tot_rxpkts |
IP packets received |
ip_tot_rxbytes |
Bytes of IP data received |
ip_tot_txpkts |
IP packets transmitted |
ip_tot_txbytes |
Bytes of IP data transmitted |
ip_tot_rxMbits |
Megabits of IP data received |
ip_tot_txMbits |
Megabits of IP data transmitted. |
ip_tot_routedpkts |
Total routed packets |
ip_tot_routedMbits |
Total routed Mbits |
ip_tot_fragments |
IP fragments received |
ip_tot_addr_lookup_done |
IP address lookups performed by the NetScaler appliance. When a packet is received on a non-established session, the NetScaler appliance checks if the destination IP address is one of the NetScaler owned IP addresses. |
ip_tot_udp_frag_fwd |
UDP fragments forwarded to the client or the server |
ip_tot_tcp_frag_fwd |
TCP fragments forwarded to the client or the server |
ip_tot_makefrag_pkts |
Fragmented packets created by the NetScaler |
ip_tot_reass_attempts |
IP packets that the NetScaler appliance attempts to reassemble. If one of the fragments is missing, the entire packet is dropped. |
ip_tot_reass_success |
Fragmented IP packets successfully reassembled on the NetScaler appliance |
ip_tot_l2_mode_drops |
Total number of IP packets dropped due to L2 Mode disabled |
ip_tot_l3_mode_drops |
Total number of IP packets dropped due to L3 Mode disabled |
ip_tot_secondary_pe_drops |
Total number of IP packets dropped by the Secondary NetScaler appliance |
ip_tot_loopback_drops |
Total number of Loopback IP packets dropped |
ip_tot_subnet_bcast_drops |
Total number of IP packets dropped due to destination address as subnet broadcast |
ip_err_badchecksums |
Packets received with an IP checksum error |
ip_err_reass_failure |
Packets received that could not be reassembled. This can occur when there is a checksum failure, an identification field mismatch, or when one of the fragments is missing. |
ip_err_reass_len_err |
Packets received for which the reassembled data exceeds the Ethernet packet data length of 1500 bytes. |
ip_err_reass_zerolenfrags |
Packets received with a fragment length of 0 bytes. |
ip_err_reass_dupfrags |
Duplicate IP fragments received. This can occur when the acknowledgement was not received within the expected time. |
ip_err_reass_ooofrags |
Fragments received that are out of order. |
ip_err_unknown_destination |
Packets received in which the destination IP address was not reachable or not owned by the NetScaler appliance. |
ip_err_bad_transport |
Packets received in which the protocol specified in the IP header is unknown to the NetScaler appliance. |
ip_err_natvip_down |
Packets received for which the Virtual IP is down. This can occur when all the services bound to the Virtual IP are down or the Virtual IP is manually disabled. |
ip_err_fixheader |
Packets received that contain an error in one or more components of the IP header. |
ip_tot_addr_lookup_failed |
IP address lookups performed by the NetScaler appliance that have failed because the destination IP address of the packet does not match any of the NetScaler owned IP addresses. |
ip_err_hdrsize |
Packets received in which an invalid data length is specified, or the value in the length field and the actual data length do not match. The range for the Ethernet packet data length is 0-1500 bytes. |
ip_err_packetlen |
Total number of packets received by the NetScaler appliance with invalid IP packet size |
ip_err_nsblen |
Truncated IP packets received. An overflow in the routers along the path can truncate IP packets. |
net_err_noniplen |
Truncated non-IP packets received |
ip_err_zero_nexthop |
Packets received that contain a 0 value in the next hop field. These packets are dropped. |
net_err_badlen_txpkts |
Packets received with a length greater than the normal maximum transmission unit of 1514 bytes. |
net_err_badMACAddr_txpkts |
IP packets transmitted with a bad MAC address |
ip_err_max_clients |
Attempts to open a new connection to a service for which the maximum limit has been exceeded. Default value, 0, applies no limit. |
ip_err_unknown_services |
Packets received on a port or service that is not configured |
ip_err_landattack |
Land-attack packets received. The source and the destination addresses are the same. |
ip_err_ttl_expired |
Packets for which the time-to-live (TTL) expired during transit. These packets are dropped. |