From patchwork Thu Sep 3 14:53:17 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Flavio Leitner X-Patchwork-Id: 514126 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from archives.nicira.com (unknown [IPv6:2600:3c00::f03c:91ff:fe6e:bdf7]) by ozlabs.org (Postfix) with ESMTP id 5D569140285 for ; Fri, 4 Sep 2015 00:58:04 +1000 (AEST) Received: from archives.nicira.com (localhost [127.0.0.1]) by archives.nicira.com (Postfix) with ESMTP id 8727D10B44; Thu, 3 Sep 2015 07:58:03 -0700 (PDT) X-Original-To: dev@openvswitch.org Delivered-To: dev@openvswitch.org Received: from mx3v1.cudamail.com (mx3.cudamail.com [64.34.241.5]) by archives.nicira.com (Postfix) with ESMTPS id CF9F510B42 for ; Thu, 3 Sep 2015 07:58:02 -0700 (PDT) Received: from bar3.cudamail.com (bar1 [192.168.15.1]) by mx3v1.cudamail.com (Postfix) with ESMTP id 0365D618E67 for ; Thu, 3 Sep 2015 08:58:02 -0600 (MDT) X-ASG-Debug-ID: 1441292280-03dd7b127c47ddb0001-byXFYA Received: from mx3-pf3.cudamail.com ([192.168.14.3]) by bar3.cudamail.com with ESMTP id z77E2bjIPrNo9qq3 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 03 Sep 2015 08:58:00 -0600 (MDT) X-Barracuda-Envelope-From: fbl@sysclose.org X-Barracuda-RBL-Trusted-Forwarder: 192.168.14.3 Received: from unknown (HELO sender163-mail.zoho.com) (74.201.84.163) by mx3-pf3.cudamail.com with ESMTPS (AES128-SHA encrypted); 3 Sep 2015 14:57:58 -0000 Received-SPF: none (mx3-pf3.cudamail.com: domain at sysclose.org does not designate permitted sender hosts) X-Barracuda-Apparent-Source-IP: 74.201.84.163 X-Barracuda-RBL-IP: 74.201.84.163 Received: from x240.home.com (187.121.131.217 [187.121.131.217]) by mx.zohomail.com with SMTPS id 1441292048938112.37750064866873; Thu, 3 Sep 2015 07:54:08 -0700 (PDT) X-CudaMail-Envelope-Sender: fbl@sysclose.org From: Flavio Leitner To: X-CudaMail-MID: CM-V3-902019361 X-CudaMail-DTE: 090315 X-CudaMail-Originating-IP: 74.201.84.163 Date: Thu, 3 Sep 2015 11:53:17 -0300 X-ASG-Orig-Subj: [##CM-V3-902019361##][PATCH] FAQ: mention about plotnetcfg tool Message-Id: <1441291997-31483-1-git-send-email-fbl@sysclose.org> X-Mailer: git-send-email 2.1.0 X-ZohoMail: Ss SS_10 UW UB iCHF_INT_SMD_EXT UW UB SGR3_0_11085_285 X-ZohoMail-Owner: <1441291997-31483-1-git-send-email-fbl@sysclose.org>+zmo_0_ X-ZohoMail-Sender: 187.121.131.217 X-Zoho-Virus-Status: 2 X-GBUdb-Analysis: 0, 74.201.84.163, Ugly c=0.372106 p=-0.135135 Source Normal X-MessageSniffer-Rules: 0-0-0-3017-c X-Barracuda-Connect: UNKNOWN[192.168.14.3] X-Barracuda-Start-Time: 1441292280 X-Barracuda-Encrypted: DHE-RSA-AES256-SHA X-Barracuda-URL: https://web.cudamail.com:443/cgi-mod/mark.cgi X-Virus-Scanned: by bsmtpd at cudamail.com X-Barracuda-BRTS-Status: 1 X-Barracuda-Spam-Score: 0.60 X-Barracuda-Spam-Status: No, SCORE=0.60 using per-user scores of TAG_LEVEL=3.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=3.0 tests=BSF_SC5_MJ1963, RDNS_NONE X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.22191 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- 0.10 RDNS_NONE Delivered to trusted network by a host with no rDNS 0.50 BSF_SC5_MJ1963 Custom Rule MJ1963 Cc: Flavio Leitner Subject: [ovs-dev] [PATCH] FAQ: mention about plotnetcfg tool X-BeenThere: dev@openvswitch.org X-Mailman-Version: 2.1.16 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: dev-bounces@openvswitch.org Sender: "dev" The plotnetcfg is an open source tool to visualy represent relationship between network interfaces on a single host. It helps to understand the path of a packet on a host. Signed-off-by: Flavio Leitner --- FAQ.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/FAQ.md b/FAQ.md index 5ce42b9..631f6a4 100644 --- a/FAQ.md +++ b/FAQ.md @@ -1623,6 +1623,9 @@ A: To debug network behavior problems, trace the path of a packet, that's correct, then trace the path of the response packet back to the origin. + The open source tool called "plotnetcfg" can help to understand the + relationship between the networking devices on a single host. + Usually a simple ICMP echo request and reply ("ping") packet is good enough. Start by initiating an ongoing "ping" from the origin host to a remote host. If you are tracking down a connectivity