I compared this with another application that makes use of port 443 and used the forward plugin rather than the secure plugin.
And from the tcpdump you can see that for the application that works on 443 was able to receive acknowledgement from the load balancer, which could have come after the application would have sent out a TCP ack.
[root@rm-sftynet-qa01-devicefiltering-apivm01 ~]# tcpdump -i eth0 src 168.63.129.16 and port 443
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
11:53:52.978372 IP 168.63.129.16.54754 > 10.0.0.4.https: Flags [F.], seq 2030601259, ack 3743586656, win 513, length 0
11:53:52.978690 IP 168.63.129.16.54835 > 10.0.0.4.https: Flags [SEW], seq 2814343234, win 8192, options [mss 1440,nop,wscale 8,nop,nop,sackOK], length 0
11:53:52.978928 IP 168.63.129.16.54754 > 10.0.0.4.https: Flags [.], ack 2, win 513, length 0
11:53:52.978931 IP 168.63.129.16.54835 > 10.0.0.4.https: Flags [.], ack 3633393567, win 513, length 0
11:53:57.978406 IP 168.63.129.16.54835 > 10.0.0.4.https: Flags [F.], seq 0, ack 1, win 513, length 0
11:53:57.979295 IP 168.63.129.16.54847 > 10.0.0.4.https: Flags [SEW], seq 3867076172, win 8192, options [mss 1440,nop,wscale 8,nop,nop,sackOK], length 0
11:53:57.979958 IP 168.63.129.16.54835 > 10.0.0.4.https: Flags [.], ack 2, win 513, length 0
This is how it looks on the fluentd side where it did not receive any ack message from the LB.
11:58:29.904604 IP 168.63.129.16.50327 > 10.4.1.11.24224: Flags [SEW], seq 777293687, win 8192, options [mss 1440,nop,wscale 8,nop,nop,sackOK], length 0
11:58:32.904366 IP 168.63.129.16.50327 > 10.4.1.11.24224: Flags [SEW], seq 777293687, win 8192, options [mss 1440,nop,wscale 8,nop,nop,sackOK], length 0
11:58:34.904905 IP 168.63.129.16.50362 > 10.4.1.11.24224: Flags [SEW], seq 2497065274, win 8192, options [mss 1440,nop,wscale 8,nop,nop,sackOK], length 0
11:58:37.904536 IP 168.63.129.16.50362 > 10.4.1.11.24224: Flags [SEW], seq 2497065274, win 8192, options [mss 1440,nop,wscale 8,nop,nop,sackOK], length 0
11:58:39.905295 IP 168.63.129.16.50409 > 10.4.1.11.24224: Flags [SEW], seq 3072265725, win 8192, options [mss 1440,nop,wscale 8,nop,nop,sackOK], length 0
11:58:42.944834 IP 168.63.129.16.50409 > 10.4.1.11.24224: Flags [SEW], seq 3072265725, win 8192, options [mss 1440,nop,wscale 8,nop,nop,sackOK], length 0
11:58:44.905535 IP 168.63.129.16.50463 > 10.4.1.11.24224: Flags [SEW], seq 1070785877, win 8192, options [mss 1440,nop,wscale 8,nop,nop,sackOK], length 0
So the question is ..does the fluentd service send back a TCP ack back ?