Skip to main content

brc extract pcap

brc extract pcap

Extract PCAP from the Workloads or the remote machines

Synopsis

This command uses the utilities provided by the model to capture the packets from the network interfaces of the workload and stream it back to the local machine. The models should have been installed with the tcpdump utility, most likely when testFramework option was used. By default, most of the BubbleRAN provided models have this option enabled. The capture command is tcpdump and the extra arguments are passed as is to the command.

The option --namespace by default points to a Kubernetes namespace of the default Kubernetes context. You may explicitly provide the context in the format of <context-name>.<namespace> to access the cluster using particular kubectlcontext. The format bare.<machine-name> is reserved for bare-metal machine access where SSH is used to access the machine named <machine-name>. In this case the PCAPs from the machine are streamed back to the local machine.

In the bare-metal context, the system should be configured to not ask the sudo password for the logged-in user over SSH for running the tcpdump command. Otherwise, the piped command will not work as expected.

brc extract pcap [flags]

Examples


# extract the PCAP from the Workload
brc extract pcap <element> | wireshark -k -i -

# extract the PCAP from the remote machine
brc extract pcap --namespace bare.<machine-name> | wireshark -k -i -

Options

  -h, --help   help for pcap

Options inherited from parent commands

  -n, --namespace string   namespace to perform the operations (default "trirematics")
-v, --verbose debug output

SEE ALSO

  • brc extract - Extract logs, configuration, PCAPs, or infrastructure details
Auto generated by spf13/cobra on 8-Jun-2025