@moeller0 thank you, because nf_conntrack: table full after I expanded to 264192 x 10 = 2641920 problem solved, but then the kernel log problems net_ratelimit: 102 callbacks suppressed?
This rate limit is also a mechanism used by Linux to avoid DoS attacks, where every message is logged (causing the storage space to explode). When the kernel logs a message, it USES printk() to check if the log is printed.
This limit can be tuned with /proc/sys/kernel/printk_ratelimit and /proc/sys/kernel/printk_ratelimit_burst. The default configurations are 5 and 10, respectively. That is, the kernel allows 10 messages to be logged every 5 seconds. Exceeds this limit, the kernel will abandon the log, and record ratelimit N: callbacks suppressed.
If want to turn off the ratelimit mechanism, which allows every message to be logged, you can set the message_cost value to 0. However, once you turn off ratelimit, there is a risk that the system will be attacked by the log.