brc extract pcap
brc extract pcap
Extract PCAP from the Workloads or the remote machines
Synopsis
This command uses the utilities provided by the model to capture the packets from the network interfaces of the
workload and stream it back to the local machine. The models should have been installed with the tcpdump utility, most
likely when testFramework
option was used. By default, most of the BubbleRAN provided models have
this option enabled. The capture command is tcpdump
and the extra arguments are passed as is
to the command.
The option --namespace
by default points to a Kubernetes namespace of the default Kubernetes context. You
may explicitly provide the context in the format of <context-name>.<namespace>
to access the cluster using
particular kubectl
context. The format bare.<machine-name>
is reserved for bare-metal machine
access where SSH is used to access the machine named <machine-name>
. In this case the PCAPs from the
machine are streamed back to the local machine.
In the bare-metal context, the system should be configured to not ask the sudo password for the logged-in user over
SSH for running the tcpdump
command. Otherwise, the piped command will not work as expected.
brc extract pcap [flags]
Examples
# extract the PCAP from the Workload
brc extract pcap <element> | wireshark -k -i -
# extract the PCAP from the remote machine
brc extract pcap --namespace bare.<machine-name> | wireshark -k -i -
Options
-h, --help help for pcap
Options inherited from parent commands
-n, --namespace string namespace to perform the operations (default "trirematics")
-v, --verbose debug output
SEE ALSO
- brc extract - Extract logs, configuration, PCAPs, or infrastructure details