.. as for the segfaults: This seems to be a Perl bug, which also applies to
other Linux distros. I have little hope for
a fix here, bug can provide a patch for a intervalled nfsen reload, which
starts a new process. For example Debian's
Perl seem to have a memory leak somewhere. How often do the segfaults occur?
- Peter
On 24/4/12 9:32 AM, Johannes Lavre wrote:
> In my setup i have a 3com 4800g router that I setup to send sflow v4 flows to
> my nfdump/nfsen server. I tested the server with software implemented flow
> sensor(netflow v9) using softflowd and that works great. I did this to test
> the setup was working now when I enable sflow on my router it does not seem
> to process any of the flow data coming in from the router. I verified with a
> packet dump that the packets are coming throught to the server. But in my
> daemon and message log on the server when I restart nfdump daemon I get this
> in my logs. Is this an unknown issue? I also want to mention that the ports
> that i enabled sflow capture on have vlan traffic flowing throught them. I
> also checked the firewall on the server is letting packets throught to the
> defined port and address that nfsen is using.
>
> Apr 19 07:56:17 nfsen-hvs sfcapd[29864]: Ident: '3com-router' Flows: 0,
> Packets: 0, Bytes: 0, Sequence Errors: 0, Bad Packets: 0
> Apr 19 07:56:17 nfsen-hvs sfcapd[29864]: Total ignored packets: 0
> Apr 19 07:56:17 nfsen-hvs sfcapd[29864]: Updating statinfo in directory
> '/var/log/netflow/live/3com-router'
> Apr 19 07:56:17 nfsen-hvs sfcapd[29864]: Terminating sfcapd.
> Apr 19 07:56:19 nfsen-hvs sfcapd: Add extension: 2 byte input/output
> interface index
> Apr 19 07:56:19 nfsen-hvs sfcapd: Add extension: 4 byte input/output
> interface index
> Apr 19 07:56:19 nfsen-hvs sfcapd: Add extension: 2 byte src/dst AS number
> Apr 19 07:56:19 nfsen-hvs sfcapd: Add extension: 4 byte src/dst AS number
> Apr 19 07:56:19 nfsen-hvs sfcapd[4882]: Standard setsockopt, SO_RCVBUF is
> 112640 Requested length is 200000 bytes
> Apr 19 07:56:19 nfsen-hvs sfcapd[4882]: System set setsockopt, SO_RCVBUF to
> 262142 bytes
> Apr 19 07:56:19 nfsen-hvs sfcapd[4884]: Startup.
>
> nfsend[28791]: segfault at 65c ip 0018b26a sp bfbe2c60 error 4 in
> libperl.so[101000+161000]
> nfsend[28805]: segfault at 65c ip 0018b26a sp bfbe2c60 error 4 in
> libperl.so[101000+161000]
> nfsend[28954]: segfault at 65c ip 0018b26a sp bfbe2c60 error 4 in
> libperl.so[101000+161000]
> nfsend[29339]: segfault at 65c ip 0018b26a sp bfbe2ad0 error 4 in
> libperl.so[101000+161000]
>
>
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
>
>
>
> _______________________________________________
> Nfsen-discuss mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/nfsen-discuss
--
Be nice to your netflow data. Use NfSen and nfdump :)
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Nfsen-discuss mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/nfsen-discuss