Hello Ben, Thanks for the prompt response.
Please have the output from the logs. Below are the logs related to collector, I'm not sure if its related to NetFlow collector or used in some other context. Kindly suggest further. *cat /var/log/openvswitch/ovs-vswitchd.log | grep collector* 2016-05-19T16:05:02.575Z|00955|collectors|WARN|Dropped 7 log messages in last 46 seconds (most recently, 6 seconds ago) due to excessive rate 2016-05-19T16:05:02.575Z|00956|collectors|WARN|sending to collector failed: Connection refused 2016-05-19T16:06:03.099Z|00957|collectors|WARN|Dropped 11 log messages in last 56 seconds (most recently, 6 seconds ago) due to excessive rate 2016-05-19T16:06:03.099Z|00958|collectors|WARN|sending to collector failed: Connection refused 2016-05-19T16:07:03.098Z|00959|collectors|WARN|Dropped 11 log messages in last 56 seconds (most recently, 6 seconds ago) due to excessive rate 2016-05-19T16:07:03.098Z|00960|collectors|WARN|sending to collector failed: Connection refused *sudo tcpdump -ni eth0 udp port 6343* tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes 18:10:15.920796 IP 192.168.56.104.45696 > 192.168.56.103.6343: sFlowv5, IPv4 agent 192.168.56.104, agent-id 0, length 144 18:10:16.920935 IP 192.168.56.104.45696 > 192.168.56.103.6343: sFlowv5, IPv4 agent 192.168.56.104, agent-id 0, length 144 18:10:19.921135 IP 192.168.56.104.45696 > 192.168.56.103.6343: sFlowv5, IPv4 agent 192.168.56.104, agent-id 0, length 144 18:10:22.920902 IP 192.168.56.104.45696 > 192.168.56.103.6343: sFlowv5, IPv4 agent 192.168.56.104, agent-id 0, length 144 ^C 4 packets captured 4 packets received by filter 0 packets dropped by kernel *sudo tcpdump -ni eth0 -vv udp port 2055* tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel Regards, Faraz On Thu, May 19, 2016 at 5:47 PM, Ben Pfaff <b...@ovn.org> wrote: > On Thu, May 19, 2016 at 05:08:40PM +0200, Syed Faraz Ali wrote: > > I've configured NetFlow on the openvswitch, but I'm not getting any > output > > on the collector machine. I've checked using tcpdump and Wireshark on the > > collector machine but couldn't observe any NetFlow related traffic. > > > > *Enabled NetFlow* > > sudo ovs-vsctl -- set Bridge s1 netflow=@nf -- --id=@nf create NetFlow > > targets=\"192.168.56.103:2055\" active-timeout=10 > > > > # ovs-vsctl list netflow > > _uuid : 007d001c-d4fd-440f-8259-b5d167b7310d > > active_timeout : 10 > > add_id_to_interface : false > > engine_id : [] > > engine_type : [] > > external_ids : {} > > targets : ["192.168.56.103:2055"] > > > > On the contrary, when I configure sFlow then I'm getting the sFlow > related > > output. So the problem doesn't seem to be with firewall blocking or with > > machine (I assume). > > Your NetFlow configuration looks OK to me. > > Do you see anything relevant in the OVS log? >
_______________________________________________ discuss mailing list discuss@openvswitch.org http://openvswitch.org/mailman/listinfo/discuss