This chapter describes the troubleshooting and diagnostic tools available on SR Linux, including BFD support, sFlow support, traffic monitoring, and packet-tracing functions.
Bidirectional Forwarding Detection (BFD) is a lightweight mechanism used to monitor the liveliness of a remote neighbor. Because of this lightweight nature, BFD can send and receive messages at a much higher rate than other control plane hello mechanisms. This attribute allows connection failures to be detected faster than other hello mechanisms.
SR Linux supports BFD asynchronous mode, where BFD control packets are sent between two systems to activate and maintain BFD neighbor sessions between them.
BFD is supported for the BGP routing protocol, supporting IPv4 and IPv6 BGP peering. SR Linux supports one BFD session per port/connector, or 288 sessions for an 8-slot chassis.
Micro-BFD, where BFD sessions are established for individual members of a link aggregation group (LAG) is also supported. If the BFD session for one of the links indicates a connection failure, the link is taken out of service from the perspective of the LAG.
See the BFD chapter in the SR Linux Configuration Basics Guide for configuration information.
The SR Linux supports sFlow version 5 behavior and formats. sFlow is used to monitor data traffic flows traversing different points in a network. The sFlow functionality uses an sFlow agent and an sFlow collector. The agent is software that runs on a network element and samples and reports flow headers and statistics. The collector is software that typically runs on a remote server and receives the flow headers and statistics from one or more sFlow agents.
On the SR Linux, sFlow samples flow data and reports the samples to configured sFlow collectors. Up to eight sFlow collectors can be configured. When sFlow is enabled on an interface, the sFlow agent streams interface statistics to the configured sFlow collectors.
See the sFlow chapter of the SR Linux Troubleshooting Toolkit for configuration information and examples.
SR Linux features an interactive packet mirroring tool that samples packets entering the system on any interface matching a set of parameters, and streams the header details either to the current login session or to a specified output file.
When the packet mirroring tool is activated, mirroring policies are dynamically populated on all ingress ports, and matching packets are sent to the CPM for display. Header information for the matching packets is displayed in either tcpdump format or hex format, depending on the options chosen.
When the packet mirroring tool is deactivated, the mirroring policies are automatically removed from all ingress interfaces.
See the Interactive traffic monitoring chapter of the SR Linux Troubleshooting Toolkit guide for usage information.
SR Linux includes a packet-trace tool that reports the forwarding behavior of a probe packet. The probe packet is injected into a specified interface forwarding context, and the packet-trace tool records the forwarding destination or egress port for the probe packet, as well as any matched ACL records or reasons for discarding the packet. The probe packet can be specified in Scapy format, base64 format, or pcap file format.See the Packet-trace tool chapter of the SR Linux Troubleshooting Toolkit guide for usage information.