On 3/25/21 12:40 PM, Dumitru Ceara wrote: >> Also, to see exactly where the packet is dropped, please share the >> output of: >> >> inport=$(ovs-vsctl --bare --columns ofport list interface vm1) >> flow=40440000000340440000000108004500005417cd40004001b3980a000102644000020800e1d35d0a0001c1635c6000000000d789050000000000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637 > To "demystify" this a bit, I got the packet contents by running the > following command while ping was running from vm1: > > ip netns exec vm1 tcpdump -vvvnne -i vm1 -c1 -XX | ovs-tcpundump > >> ovs-appctl ofproto/trace br-int in_port=$in_port $flow | ovn-detrace
And here's a typo, sorry, should be: ovs-appctl ofproto/trace br-int in_port=$inport $flow | ovn-detrace _______________________________________________ discuss mailing list disc...@openvswitch.org https://mail.openvswitch.org/mailman/listinfo/ovs-discuss