To debug protocols issues you need to use of course TCP packet sniffers. So I started with the following test for Solaris:
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
mkfile 5M /tmp/5MegSol | |
sudo snoop -t a host nfs.sample.com > /tmp/capture & | |
cp /tmp/5MegSol /mnt/nfs/ | |
ps -ef|grep snoop|grep -v grep |awk '{print $2}'|xargs sudo kill 2>/dev/null | |
less /tmp/capture |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
13:49:23.32024 solaris.sample.com -> nfs.sample.com TCP D=2049 S=1016 Push Ack=2575691166 Seq=2647130780 Len=1460 Win | |
=49640 | |
13:49:23.32056 nfs.sample.com -> solaris.sample.com TCP D=1016 S=2049 Ack=2647108880 Seq=2575691166 Len=0 Win=501 | |
13:49:23.32058 solaris.sample.com -> nfs.sample.com TCP D=2049 S=1016 Ack=2575691166 Seq=2647132240 Len=1460 Win=4964 | |
0 | |
13:49:23.32059 solaris.sample.com -> nfs.sample.com TCP D=2049 S=1016 Push Ack=2575691166 Seq=2647133700 Len=1460 Win | |
=49640 | |
13:49:23.32175 nfs.sample.com -> solaris.sample.com TCP D=1016 S=2049 Ack=2647111800 Seq=2575691166 Len=0 Win=501 | |
13:49:23.32179 solaris.sample.com -> nfs.sample.com TCP D=2049 S=1016 Ack=2575691166 Seq=2647135160 Len=1460 Win=4964 | |
0 | |
13:49:23.32180 solaris.sample.com -> nfs.sample.com TCP D=2049 S=1016 Push Ack=2575691166 Seq=2647136620 Len=1460 Win | |
=49640 | |
13:49:23.32194 nfs.sample.com -> solaris.sample.com RPC R XID=1086274887 Success |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
fallocate -l 5M /tmp/5Meg | |
sudo tcpdump -s0 -S -i eth0 host nfs.sample.com > /tmp/capture & | |
cp /tmp//5Meg /mnt/nfs/ | |
sudo killall tcpdump | |
less /tmp/capture |
No comments:
Post a Comment