[ovs-discuss] Collecting NetFlow data

Syed Faraz Ali farazali86 at gmail.com
Thu May 19 16:17:45 UTC 2016


Hello Ben,

Thanks for the prompt response.

Please have the output from the logs. Below are the logs related to
collector, I'm not sure if its related to NetFlow collector or used in some
other context. Kindly suggest further.

*cat /var/log/openvswitch/ovs-vswitchd.log | grep collector*
2016-05-19T16:05:02.575Z|00955|collectors|WARN|Dropped 7 log messages in
last 46 seconds (most recently, 6 seconds ago) due to excessive rate
2016-05-19T16:05:02.575Z|00956|collectors|WARN|sending to collector failed:
Connection refused
2016-05-19T16:06:03.099Z|00957|collectors|WARN|Dropped 11 log messages in
last 56 seconds (most recently, 6 seconds ago) due to excessive rate
2016-05-19T16:06:03.099Z|00958|collectors|WARN|sending to collector failed:
Connection refused
2016-05-19T16:07:03.098Z|00959|collectors|WARN|Dropped 11 log messages in
last 56 seconds (most recently, 6 seconds ago) due to excessive rate
2016-05-19T16:07:03.098Z|00960|collectors|WARN|sending to collector failed:
Connection refused


*sudo tcpdump -ni eth0 udp port 6343*
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
18:10:15.920796 IP 192.168.56.104.45696 > 192.168.56.103.6343: sFlowv5,
IPv4 agent 192.168.56.104, agent-id 0, length 144
18:10:16.920935 IP 192.168.56.104.45696 > 192.168.56.103.6343: sFlowv5,
IPv4 agent 192.168.56.104, agent-id 0, length 144
18:10:19.921135 IP 192.168.56.104.45696 > 192.168.56.103.6343: sFlowv5,
IPv4 agent 192.168.56.104, agent-id 0, length 144
18:10:22.920902 IP 192.168.56.104.45696 > 192.168.56.103.6343: sFlowv5,
IPv4 agent 192.168.56.104, agent-id 0, length 144
^C
4 packets captured
4 packets received by filter
0 packets dropped by kernel

*sudo tcpdump -ni eth0 -vv udp port 2055*
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535
bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel

Regards,
Faraz

On Thu, May 19, 2016 at 5:47 PM, Ben Pfaff <blp at ovn.org> wrote:

> On Thu, May 19, 2016 at 05:08:40PM +0200, Syed Faraz Ali wrote:
> > I've configured NetFlow on the openvswitch, but I'm not getting any
> output
> > on the collector machine. I've checked using tcpdump and Wireshark on the
> > collector machine but couldn't observe any NetFlow related traffic.
> >
> > *Enabled NetFlow*
> > sudo ovs-vsctl -- set Bridge s1 netflow=@nf -- --id=@nf create NetFlow
> > targets=\"192.168.56.103:2055\" active-timeout=10
> >
> > # ovs-vsctl list netflow
> > _uuid               : 007d001c-d4fd-440f-8259-b5d167b7310d
> > active_timeout      : 10
> > add_id_to_interface : false
> > engine_id           : []
> > engine_type         : []
> > external_ids        : {}
> > targets             : ["192.168.56.103:2055"]
> >
> > On the contrary, when I configure sFlow then I'm getting the sFlow
> related
> > output. So the problem doesn't seem to be with firewall blocking or with
> > machine (I assume).
>
> Your NetFlow configuration looks OK to me.
>
> Do you see anything relevant in the OVS log?
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://openvswitch.org/pipermail/ovs-discuss/attachments/20160519/82ab4869/attachment-0002.html>


More information about the discuss mailing list