You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If the flag is enabled, packets that appear to be vxlan
encapsulated will have the filtering function applied.
Note: Therefore, to avoid getting non-vxlan traffic you
will want to apply a general pcap filter on the vxlan udp
ports.
Signed-off-by: Tom Hadlaw <[email protected]>
Copy file name to clipboardexpand all lines: internal/pwru/types.go
+5
Original file line number
Diff line number
Diff line change
@@ -38,6 +38,7 @@ type Flags struct {
38
38
FilterTrackBpfHelpersbool
39
39
FilterIfnamestring
40
40
FilterPcapstring
41
+
FilterTunnelPcapstring
41
42
FilterKprobeBatchuint
42
43
43
44
OutputTSstring
@@ -52,6 +53,7 @@ type Flags struct {
52
53
OutputFilestring
53
54
OutputJsonbool
54
55
OutputTCPFlagsbool
56
+
OutputTunnelbool
55
57
56
58
KMods []string
57
59
AllKModsbool
@@ -74,6 +76,7 @@ func (f *Flags) SetFlags() {
74
76
flag.BoolVar(&f.FilterTrackSkb, "filter-track-skb", false, "trace a packet even if it does not match given filters (e.g., after NAT or tunnel decapsulation)")
75
77
flag.BoolVar(&f.FilterTrackSkbByStackid, "filter-track-skb-by-stackid", false, "trace a packet even after it is kfreed (e.g., traffic going through bridge)")
0 commit comments