Support Support Downloads Knowledge Base Juniper Support Portal Community

Knowledge Base

Search our Knowledge Base sites to find answers to your questions.

Ask All Knowledge Base Sites All Knowledge Base Sites JunosE Defect (KA)Knowledge BaseSecurity AdvisoriesTechnical BulletinsTechnotes Sign in to display secure content and recently viewed articles

[Contrail] Tools to capture/analyze vrouter memory



Article ID: KB30995 KB Last Updated: 30 Aug 2019Version: 4.0

This article will describe tools that are used to collect data and analyze Contrail vrouter memory issues.


In order to speed up problem resolution, the following information should be collected and attached when opening a support case.

Customers can run GDB (GNU Debugger) against already generated core dumps or capture them manually when memory leaks are suspected (for example, when you see disproportional vrouter memory consumption compared with number of flows).


This issue can be triggered by a unhandled exception or memory leak.


Get the backtrace of an existing coredump

In general, when submitting a support ticket, it is recommended to run gdb against each existing core dump and provide the backtrace for faster resolution. Run the below commands and gather the outputs.

  1. gdb /usr/bin/contrail-vrouter-agent
  2. bt
  3. bt full


Manually capture contrail-vrouter-agent memory

It is possible to manually capture gcore of the vrouter-agent, if there is suspected memory leak (but no core dump).

Note: This operation can potentially cause a temporary hiccup in traffic. Use it with caution, during a maintenance window.

You need gdb to be installed in the compute node.  Instructions on how to install may vary depending on your Linux distribution, please consult official documentation.  After that, get pid of the contrail-vrouter-agent:

pidof contrail-vrouter-agent

and run:

gcore <pid of vrouter-agent>
Modification History:

2019-08-29: Updated back trace steps.
2019-05-09: Added 'bt full' to list of information to collect.

Comment on this article > Affected Products Browse the Knowledge Base for more articles related to these product categories. Select a category to begin.

Getting Up and Running with Junos

Getting Up and Running with Junos Security Alerts and Vulnerabilities Product Alerts and Software Release Notices Problem Report (PR) Search Tool EOL Notices and Bulletins JTAC User Guide Customer Care User Guide Pathfinder SRX High Availability Configurator SRX VPN Configurator Training Courses and Videos End User Licence Agreement Global Search