Skip to content

Commit e95477f

Browse files
committed
Rename UPF-PP to MEC-DP
1 parent 4f65804 commit e95477f

File tree

2 files changed

+12
-12
lines changed

2 files changed

+12
-12
lines changed

articles/private-5g-core/data-plane-packet-capture.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.custom: template-how-to, devx-track-azurecli
1212

1313
# Perform packet capture on a packet core instance
1414

15-
Packet capture for control or data plane packets is performed using the **UPF Trace** tool. UPF Trace is similar to **tcpdump**, a data-network packet analyzer computer program that runs on a command line interface (CLI). You can use UPF Trace to monitor and record packets on any user plane interface on the access network (N3 interface) or data network (N6 interface) on your device, as well as the control plane (N2 interface). You can access UPF Trace using the Azure portal or the Azure CLI.
15+
Packet capture for control or data plane packets is performed using the **MEC-Dataplane Trace** tool. MEC-Dataplane (MEC-DP) Trace is similar to **tcpdump**, a data-network packet analyzer computer program that runs on a command line interface (CLI). You can use MEC-DP Trace to monitor and record packets on any user plane interface on the access network (N3 interface) or data network (N6 interface) on your device, as well as the control plane (N2 interface). You can access MEC-DP Trace using the Azure portal or the Azure CLI.
1616

1717
Packet capture works by mirroring packets to a Linux kernel interface, which can then be monitored using tcpdump. In this how-to guide, you'll learn how to perform packet capture on a packet core instance.
1818

@@ -58,16 +58,16 @@ To perform packet capture using the command line, you must:
5858

5959
## Performing packet capture using the Azure CLI
6060

61-
1. In a command line with kubectl access to the Azure Arc-enabled Kubernetes cluster, enter the UPF-PP troubleshooter pod:
61+
1. In a command line with kubectl access to the Azure Arc-enabled Kubernetes cluster, enter the MEC-DP troubleshooter pod:
6262

6363
```azurecli
64-
kubectl exec -it -n core core-upf-pp-0 -c troubleshooter -- bash
64+
kubectl exec -it -n core core-mec-dp-0 -c troubleshooter -- bash
6565
```
6666
6767
1. View the list of configured user plane interfaces:
6868
6969
```azurecli
70-
upft list
70+
mect list
7171
```
7272
7373
This should report a single interface on the control plane network (N2), a single interface on the access network (N3) and an interface for each attached data network (N6). For example:
@@ -80,9 +80,9 @@ To perform packet capture using the command line, you must:
8080
n6trace2 (Data Network: test)
8181
```
8282
83-
1. Run `upftdump` with any parameters that you would usually pass to tcpdump. In particular, `-i` to specify the interface, and `-w` to specify where to write to. Close the UPFT tool when done by pressing <kbd>Ctrl + C</kbd>. The following examples are common use cases:
84-
- To run capture packets on all interfaces run `upftdump -i any -w any.pcap`
85-
- To run capture packets for the N3 interface and the N6 interface for a single data network, enter the UPF-PP troubleshooter pod in two separate windows. In one window run `upftdump -i n3trace -w n3.pcap` and in the other window run `upftdump -i <N6 interface> -w n6.pcap` (use the N6 interface for the data network as identified in step 2).
83+
1. Run `mectdump` with any parameters that you would usually pass to tcpdump. In particular, `-i` to specify the interface, and `-w` to specify where to write to. Close the tool when finished by pressing <kbd>Ctrl + C</kbd>. The following examples are common use cases:
84+
- To run capture packets on all interfaces, run `mectdump -i any -w any.pcap`
85+
- To run capture packets for the N3 interface and the N6 interface for a single data network, enter the MEC-DP troubleshooter pod in two separate windows. In one window run `mectdump -i n3trace -w n3.pcap` and in the other window run `mectdump -i <N6 interface> -w n6.pcap` (use the N6 interface for the data network as identified in step 2).
8686
8787
> [!IMPORTANT]
8888
> Packet capture files might be large, particularly when running packet capture on all interfaces. Specify filters when running packet capture to reduce the file size - see the tcpdump documentation for the available filters.
@@ -96,15 +96,15 @@ To perform packet capture using the command line, you must:
9696
1. Copy the output files:
9797
9898
```azurecli
99-
kubectl cp -n core core-upf-pp-0:<path to output file> <location to copy to> -c troubleshooter
99+
kubectl cp -n core core-mec-dp-0:<path to output file> <location to copy to> -c troubleshooter
100100
```
101101
102102
The `tcpdump` might have been stopped in the middle of writing a packet, which can cause this step to produce an error stating `unexpected EOF`. However, your file should have copied successfully, but you can check your target output file to confirm.
103103
104104
1. Remove the output files:
105105
106106
```azurecli
107-
kubectl exec -it -n core core-upf-pp-0 -c troubleshooter -- rm <path to output file>
107+
kubectl exec -it -n core core-mec-dp-0 -c troubleshooter -- rm <path to output file>
108108
```
109109
110110
## Next steps

articles/private-5g-core/ping-traceroute.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,16 +27,16 @@ To access the local UI, see [Tutorial: Connect to Azure Stack Edge Pro with GPU]
2727

2828
## Run the ping and traceroute tools
2929

30-
1. In a command line with kubectl access to the Azure Arc-enabled Kubernetes cluster, enter the UPF-PP troubleshooter pod:
30+
1. In a command line with kubectl access to the Azure Arc-enabled Kubernetes cluster, enter the MEC-DP troubleshooter pod:
3131

3232
```azurecli
33-
kubectl exec -it -n core core-upf-pp-0 -c troubleshooter -- bash
33+
kubectl exec -it -n core core-mec-dp-0 -c troubleshooter -- bash
3434
```
3535
3636
1. View the list of configured user plane interfaces:
3737
3838
```azurecli
39-
upft list
39+
mect list
4040
```
4141
4242
This should report a single interface on the control plane network (N2), a single interface on the access network (N3) and an interface for each attached data network (N6). For example:

0 commit comments

Comments
 (0)