On 12/13/22 02:30, Harish Chandrasekaran wrote:
Hello all,

I'm looking for a utility/command to get the tipc packet/connection
information while running the client and server within the same
card/kernel.

The "tipc link statistics show" gives some insights regarding the packets
across the bearers
Link <10300411:BEARER1-10300431:BEARER-2>
   ACTIVE  MTU:14000  Priority:10  Tolerance:1500 ms  Window:50 packets
   RX packets:9013188 fragments:0/0 bundles:0/0
   TX packets:9430977 fragments:760/190 bundles:0/0
   TX profile sample:613736 packets average:42 octets
   0-64:93% -256:7% -1024:0% -4096:0% -16384:0% -32768:0% -66000:0%
   RX states:2155490 probes:423110 naks:8365 defs:11806 dups:11875
   TX states:2199617 probes:413191 naks:11866 acks:290 retrans:8371
   Congestion link:0  Send queue max:0 avg:0


I'm looking for something similar to the above or something similar to what
netstat provides for tcp packets/connections with in the same card/machine

netstat -s
Tcp:
     1312727 active connection openings
     325217 passive connection openings
     987300 failed connection attempts
     9 connection resets received
     41 connections established
     84939296 segments received
     86976822 segments sent out
     985790 segments retransmitted
     0 bad segments received
     1821 resets sent

Eg: The  hello_server and hello_client run on the same machine. I would
like to check if there are any naks or duplicates or packet drops or if
there are any connection resets or failed connection attempts.

I tried to check if *netstat statistics *captures TIPC connection related
information but it doesn't seem to capture the TIPC related info.

Kindly let me know if there are any utilities or TIPC commands which I can
use to gather such information?

Would greatly appreciate any help.

Sincerely,
Harish

Hi,
Sorry for a late answer.
It is actually possible to observe node internal traffic with tcpdump/wireshark
if  you activate network taps for the loopback device.
The following commit explains it:

commit 6c9081a3915dc0782a8f1424343b794f2cf53d9c
Author: John Rutherford <john.rutherf...@dektech.com.au>
Date:   Wed Aug 7 12:52:29 2019 +1000

    tipc: add loopback device tracking

    Since node internal messages are passed directly to the socket, it is not
    possible to observe those messages via tcpdump or wireshark.

    We now remedy this by making it possible to clone such messages and send     the clones to the loopback interface.  The clones are dropped at reception
    and have no functional role except making the traffic visible.

    The feature is enabled if network taps are active for the loopback device.
    pcap filtering restrictions require the messages to be presented to the
    receiving side of the loopback device.

    v3 - Function dev_nit_active used to check for network taps.
       - Procedure netif_rx_ni used to send cloned messages to loopback device.

    Signed-off-by: John Rutherford <john.rutherf...@dektech.com.au>
    Acked-by: Jon Maloy <jon.ma...@ericsson.com>
    Acked-by: Ying Xue <ying....@windriver.com>
    Signed-off-by: David S. Miller <da...@davemloft.net>


Thanks
///jon



_______________________________________________
tipc-discussion mailing list
tipc-discussion@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/tipc-discussion




_______________________________________________
tipc-discussion mailing list
tipc-discussion@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/tipc-discussion

Reply via email to