Hi Ruben,

Interesting behaviour you are describing. 

In-line for a comment about the high interface value: 

On Thu, Jan 23, 2014 at 09:01:56PM +0100, Ruben Laban wrote:

> As for the ports, I meant to say interfaces ;-) So I did a snmpwalk
> against the switch and this told that those interface numbers 211
> and 48 correspond to respectively trk2 (2nd configured trunk) and
> port 48. So far, so good. The number 1073741823 doesn't show up at
> all in the snmpwalk though, which is rather odd. Then again the
> number is 0x3FFFFFFF which is probably something "special".

Indeed, that is a "special" indicating that there is no input/output
interface (depending which field the 0x3FFFFFFF is found). This is
typically the case if you ping the switch itself, for example.

Cheers,
Paolo

> On 2014-01-23 14:50, Paolo Lucente wrote:
> >Hi Ruben,
> >
> >Those are input and ouput interfaces of the switch, expressed as SNMP
> >ifIndexes. If you see later in the CSV you have SRC_PORT and DST_PORT
> >fields which are zero - making sense since the packets IP protocol is
> >ICMP.
> >
> >In general, if you see anything strange with sFlow and want to debug
> >or confirmation whether it's pmacct or the switch, you can resort to
> >sflowtool.
> >
> >On your question about the free traffic generator: +1 for Ostinato.
> >
> >Cheers,
> >Paolo
> >
> >On Thu, Jan 23, 2014 at 08:28:18AM +0100, Ruben Laban wrote:
> >>Hi,
> >>
> >>I'm currently in the process of migrating from a monitoring and
> >>accounting setup based on pmacctd/libpcap to sfacctd/sflow. However,
> >>while doing so I ran into a few things:
> >>
> >>* Can sfacctd somehow also "process" the polled (interface globals)
> >>data?
> >>
> >>* How can one "decipher" the IN_IFACE and OUT_IFACE fields? For
> >>example:
> >>
> >>TAG,TAG2,CLASS,SRC_MAC,DST_MAC,VLAN,COS,ETYPE,SRC_AS,DST_AS,BGP_COMMS,AS_PATH,PREF,MED,PEER_SRC_AS,PEER_DST_AS,PEER_SRC_IP,PEER_DST_IP,IN_IFACE,OUT_IFACE,MPLS_VPN_RD,SRC_IP,DST_IP,SRC_MASK,DST_MASK,SRC_PORT,DST_PORT,TCP_FLAGS,PROTOCOL,TOS,PACKETS,FLOWS,BYTES
> >>
> >>0,0,unknown,00:00:00:00:00:00,00:00:00:00:00:00,0,0,0,0,0,0,,0,0,0,0,10.255.255.12,,211,48,0:0:0,10.255.255.2,10.255.255.1,0,0,0,0,0,icmp,0,2,0,204
> >>
> >>0,0,unknown,00:00:00:00:00:00,00:00:00:00:00:00,0,0,0,0,0,0,,0,0,0,0,10.255.255.12,,1073741823,1073741823,0:0:0,10.255.255.1,10.255.255.2,0,0,0,0,0,icmp,0,1,0,102
> >>
> >>I have a continuous ping running between 10.255.255.1 and
> >>10.255.255.2 which passes ports that are sampled by sFlow. However,
> >>the ports 211, 48 and 1073741823 look rather bogus to me. So either
> >>my switches (HP 2920) send garbled data, or some more effort is
> >>needed to turn it into something useful.
> >>
> >>On a slightly related note, but probably rather off-topic: what are
> >>commonly used free methods of generating lots of network traffic.
> >>Ideally it would be something that could create several hundred Mbps
> >>of random traffic.
> >>
> >>Regards,
> >>Ruben
> >>
> >>_______________________________________________
> >>pmacct-discussion mailing list
> >>http://www.pmacct.net/#mailinglists
> >
> >_______________________________________________
> >pmacct-discussion mailing list
> >http://www.pmacct.net/#mailinglists
> 
> 
> _______________________________________________
> pmacct-discussion mailing list
> http://www.pmacct.net/#mailinglists

_______________________________________________
pmacct-discussion mailing list
http://www.pmacct.net/#mailinglists

Reply via email to