On 10/20/25 3:56 PM, Brendan Doyle via discuss wrote:
> When I do a tcpdump on the loopback interface, I get packets like:
> 
> 
>   00:00:00.000008 00:00:00:00:00:00 > 00:00:00:00:00:00, ethertype IPv4 
> (0x0800), length 381: (tos 0x0, ttl 64, id 52083, offset 0, flags [DF], 
> proto UDP (17), length 367)
>      127.0.0.1.34813 > 127.0.0.1.4242: [bad udp cksum 0xff6e -> 0xc601!] 
> UDP, length 339
>          0x0000:  0000 0000 0000 0000 0000 0000 0800 4500
>          0x0010:  016f cb73 4000 4011 7008 7f00 0001 7f00
>          0x0020:  0001 87fd 1092 015b ff6e 000a 0153 68f2
>          0x0030:  69be 0000 0003 2b00 0007 011a 0143 0000
>          0x0040:  03ea 0052 5400 be06 1652 5400 e64f 4608
>          0x0050:  000e 0000 0017 0000 0000 0c6f 766e 2d73
>          0x0060:  6361 3135 2d2d 3100 0440 0600 0000 c010
>          0x0070:  0106 c010 0105 4d35 ead8 fdff 0206 fdff
>          0x0080:  0205 1161 2917 c107 0300 0007 0004 baf0
>          0x0090:  0004 baf0 0000 0000 0000 0001 0000 0000
>          0x00a0:  0000 0002 0000 0000 0000 0001 0000 0000
>          0x00b0:  0000 0002 0000 0000 0000 0002 0000 0000
>          0x00c0:  0000 0000 0000 0000 0000 0000 0000 0000
>          0x00d0:  0000 0000 0000 0000 0000 0000 0000 0000
>          0x00e0:  0000 0000 0000 0000 0000 0000 0000 0000
>          0x00f0:  0000 004a 0000 0000 0000 0094 0200 0000
>          0x0100:  0000 0000 3c00 0000 0000 0000 7800 0000
>          0x0110:  0000 0000 3c00 0000 0000 0000 7800 0000
>          0x0120:  0000 000e 1000 0000 0000 001c 2000 0000
> 
> The metadata which should map to the obs point ID was 1001 which is 03ea 
> hex, and I see
> that in the pkts always at the same offset 0x0040, so it could be that 
> it is being generated
> by OVS, but that nfcapd does not have a template to decode it, I don't 
> know what the ovn/ovs
> templates are.
> 
> What we see in the nfcapd logs are:
> 
> ynamically add source ident: 127-0-0-1 in directory: 
> /root/nfcapd/127-0-0-1/nfcapd.current.1228009
> Process_ipfix: New exporter: SysID: 1, Observation domain 0 from: 127.0.0.1
> Process_ipfix: New exporter: SysID: 2, Observation domain 704643079 
> from: 127.0.0.1
> Process_ipfix: [704643079] Add template 256
> Process_ipfix: [704643079] Add template 257
> 
> But the flows are always like:
> 
> {
>          "type" : "FLOW",
>          "sampled" : 0,
>          "export_sysid" : 2,
>          "t_first" : "2025-10-17T09:07:25.687",
>          "t_last" : "2025-10-17T09:07:25.687",
>          "proto" : 6,
>          "src4_addr" : "192.16.1.5",
>          "dst4_addr" : "192.16.1.6",
>          "src_port" : 60120,
>          "dst_port" : 19765,
>          "fwd_status" : 0,
>          "tcp_flags" : "........",
>          "src_tos" : 0,
>          "in_packets" : 1,
>          "in_bytes" : 60,
>          "input_snmp" : 33,
>          "output_snmp" : 0,
>          "src_mask" : 0,
>          "dst_mask" : 0,
>          "dst_tos" : 0,
>          "direction" : 0,
>          "in_src_mac" : "52:54:00:e6:4f:46",
>          "out_dst_mac" : "00:00:00:00:00:00",
>          "in_dst_mac" : "52:54:00:be:06:16",
>          "out_src_mac" : "00:00:00:00:00:00",
>          "ip4_router" : "127.0.0.1",
>          "t_received" : "2025-10-17T09:07:25.691",
>          "label" : "<none>"
> }
> 
> Could it be I need a newer version of nfcapd? or I need to specify an 
> arg to enable
> OVN/OVS templates, where would I get these templates from?
> 
> The versions I'm using are :
> 
> # nfcapd -V
> nfcapd: Version: 1.6.24
> 
> # nfdump -V
> nfdump: Version: NSEL-NEL1.6.24
> 
> #nfprofile -V
> nfprofile: Version: 1.6.24
> 
> # nfreplay -V
> nfreplay: Version: 1.6.24
> 

Yeah, it seems like you need a newer version.  AFAICT, nfcapd only supports
these fields starting with 1.7.0:
  https://github.com/phaag/nfdump/issues/351
  
https://github.com/phaag/nfdump/commit/2d786aa383a3691a86c702633752d8146c4a5b1a

Information is in the packet, old nfcapd just doesn't parse/show it.

Best regards, Ilya Maximets.
_______________________________________________
discuss mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-discuss

Reply via email to