sbezverk <sbezverk@xxxxxxxxx> wrote: > HI Phil, > > There is no loadblancer, curl is executed from the actual node with both pods, so all traffic is local to the node. > > As per your suggestion I modified nfproxy rules: > > chain k8s-nfproxy-svc-M53CN2XYVUHRQ7UB { > numgen random mod 2 vmap { 0 : goto k8s-nfproxy-sep-I7XZOUOVPIQW4IXA, 1 : goto k8s-nfproxy-sep-ZNSGEJWUBCC5QYMQ } > counter packets 3 bytes 180 comment "" > } > > chain k8s-nfproxy-sep-ZNSGEJWUBCC5QYMQ { > counter packets 0 bytes 0 comment "" > ip saddr 57.112.0.38 meta mark set 0x00004000 comment "" > dnat to 57.112.0.38:8080 fully-random > } > > chain k8s-nfproxy-sep-I7XZOUOVPIQW4IXA { > counter packets 1 bytes 60 comment "" > ip saddr 57.112.0.36 meta mark set 0x00004000 comment "" > dnat to 57.112.0.36:8989 fully-random > } Weird, it looks like it generates 0 and something else, not 1. Works for me on x86_64 with 5.4.10 kernel: table ip test { chain output { type filter hook output priority filter; policy accept; jump k8s-nfproxy-svc-M53CN2XYVUHRQ7UB } chain k8s-nfproxy-svc-M53CN2XYVUHRQ7UB { numgen random mod 2 vmap { 0 : goto k8s-nfproxy-sep-I7XZOUOVPIQW4IXA, 1 : goto k8s-nfproxy-sep-ZNSGEJWUBCC5QYMQ } counter packets 0 bytes 0 } chain k8s-nfproxy-sep-ZNSGEJWUBCC5QYMQ { counter packets 68602 bytes 5763399 ip saddr 57.112.0.38 meta mark set 0x00004000 comment "" } chain k8s-nfproxy-sep-I7XZOUOVPIQW4IXA { counter packets 69159 bytes 5809685 ip saddr 57.112.0.36 meta mark set 0x00004000 comment "" } } (I removed nat rules and then ran ping -f 127.0.0.1). Does it work when you use "numgen inc" instead of "numgen rand" ?