-
Notifications
You must be signed in to change notification settings - Fork 262
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[sfacctd] Filtering traffic by interface #784
Comments
Hi Milan ( @Tucaa ), The way i would recommend, yes, is pre_tag_map + pre_tag_filter. When you say "this didn't yield the desired results", can you characterize this better? For sure, i guess, you see the flows entering interface
In other words you influence the flow of evaluation of Let me know if there is more. Paolo |
Hi Milan ( @Tucaa ), Oversight from my side: in_iface and out_iface do not exist in the context of pre_tag_map. There is in (input interface) and out (output interface). Can you re-write in_iface as in and out_iface as out and give it another try? Paolo |
Hi Paolo, Sorry about the delayed response. I've tried using the in and out keys (instead of in_iface and out_iface), and it works. Thank you for the assistance! Milan |
Perfect Milan, thanks for confirming. Paolo |
Hi Paolo,
I've been experimenting with the sfacctd daemon and I'm curious if it's possible to filter traffic only on specified interfaces. I need to apply this filter to a set of five tables, not all data. I attempted to add this filter as a pre_tag_filter in the pre-tag.map file. For testing purposes, I added the following to the pre-tag.map file:
set_tag=1 in_iface=100005
set_tag=2 out_iface =100005
In the sfacctd.conf file, I configured:
pre_tag_filter[mytable5in]: 1
However, this didn't yield the desired results.
I'm wondering if it's possible to filter traffic based on the inbound and outbound interfaces, and what would be the best approach to achieve this. Let me know if you need more information.
Milan
The text was updated successfully, but these errors were encountered: