@@ -601,7 +601,7 @@ func (m *Manager) filterOutbound(packetData []byte, size int) bool {
601
601
602
602
srcIP , dstIP := m .extractIPs (d )
603
603
if ! srcIP .IsValid () {
604
- m .logger .Error ("Unknown network layer: %v" , d .decoded [0 ])
604
+ m .logger .Error1 ("Unknown network layer: %v" , d .decoded [0 ])
605
605
return false
606
606
}
607
607
@@ -727,21 +727,21 @@ func (m *Manager) filterInbound(packetData []byte, size int) bool {
727
727
728
728
srcIP , dstIP := m .extractIPs (d )
729
729
if ! srcIP .IsValid () {
730
- m .logger .Error ("Unknown network layer: %v" , d .decoded [0 ])
730
+ m .logger .Error1 ("Unknown network layer: %v" , d .decoded [0 ])
731
731
return true
732
732
}
733
733
734
734
// TODO: pass fragments of routed packets to forwarder
735
735
if fragment {
736
- m .logger .Trace ("packet is a fragment: src=%v dst=%v id=%v flags=%v" ,
736
+ m .logger .Trace4 ("packet is a fragment: src=%v dst=%v id=%v flags=%v" ,
737
737
srcIP , dstIP , d .ip4 .Id , d .ip4 .Flags )
738
738
return false
739
739
}
740
740
741
741
if translated := m .translateInboundReverse (packetData , d ); translated {
742
742
// Re-decode after translation to get original addresses
743
743
if err := d .parser .DecodeLayers (packetData , & d .decoded ); err != nil {
744
- m .logger .Error ("Failed to re-decode packet after reverse DNAT: %v" , err )
744
+ m .logger .Error1 ("Failed to re-decode packet after reverse DNAT: %v" , err )
745
745
return true
746
746
}
747
747
srcIP , dstIP = m .extractIPs (d )
@@ -766,7 +766,7 @@ func (m *Manager) handleLocalTraffic(d *decoder, srcIP, dstIP netip.Addr, packet
766
766
_ , pnum := getProtocolFromPacket (d )
767
767
srcPort , dstPort := getPortsFromPacket (d )
768
768
769
- m .logger .Trace ("Dropping local packet (ACL denied): rule_id=%s proto=%v src=%s:%d dst=%s:%d" ,
769
+ m .logger .Trace6 ("Dropping local packet (ACL denied): rule_id=%s proto=%v src=%s:%d dst=%s:%d" ,
770
770
ruleID , pnum , srcIP , srcPort , dstIP , dstPort )
771
771
772
772
m .flowLogger .StoreEvent (nftypes.EventFields {
@@ -807,7 +807,7 @@ func (m *Manager) handleForwardedLocalTraffic(packetData []byte) bool {
807
807
}
808
808
809
809
if err := fwd .InjectIncomingPacket (packetData ); err != nil {
810
- m .logger .Error ("Failed to inject local packet: %v" , err )
810
+ m .logger .Error1 ("Failed to inject local packet: %v" , err )
811
811
}
812
812
813
813
// don't process this packet further
@@ -819,7 +819,7 @@ func (m *Manager) handleForwardedLocalTraffic(packetData []byte) bool {
819
819
func (m * Manager ) handleRoutedTraffic (d * decoder , srcIP , dstIP netip.Addr , packetData []byte , size int ) bool {
820
820
// Drop if routing is disabled
821
821
if ! m .routingEnabled .Load () {
822
- m .logger .Trace ("Dropping routed packet (routing disabled): src=%s dst=%s" ,
822
+ m .logger .Trace2 ("Dropping routed packet (routing disabled): src=%s dst=%s" ,
823
823
srcIP , dstIP )
824
824
return true
825
825
}
@@ -835,7 +835,7 @@ func (m *Manager) handleRoutedTraffic(d *decoder, srcIP, dstIP netip.Addr, packe
835
835
836
836
ruleID , pass := m .routeACLsPass (srcIP , dstIP , proto , srcPort , dstPort )
837
837
if ! pass {
838
- m .logger .Trace ("Dropping routed packet (ACL denied): rule_id=%s proto=%v src=%s:%d dst=%s:%d" ,
838
+ m .logger .Trace6 ("Dropping routed packet (ACL denied): rule_id=%s proto=%v src=%s:%d dst=%s:%d" ,
839
839
ruleID , pnum , srcIP , srcPort , dstIP , dstPort )
840
840
841
841
m .flowLogger .StoreEvent (nftypes.EventFields {
@@ -863,7 +863,7 @@ func (m *Manager) handleRoutedTraffic(d *decoder, srcIP, dstIP netip.Addr, packe
863
863
fwd .RegisterRuleID (srcIP , dstIP , srcPort , dstPort , ruleID )
864
864
865
865
if err := fwd .InjectIncomingPacket (packetData ); err != nil {
866
- m .logger .Error ("Failed to inject routed packet: %v" , err )
866
+ m .logger .Error1 ("Failed to inject routed packet: %v" , err )
867
867
fwd .DeleteRuleID (srcIP , dstIP , srcPort , dstPort )
868
868
}
869
869
}
@@ -901,7 +901,7 @@ func getPortsFromPacket(d *decoder) (srcPort, dstPort uint16) {
901
901
// It returns true, true if the packet is a fragment and valid.
902
902
func (m * Manager ) isValidPacket (d * decoder , packetData []byte ) (bool , bool ) {
903
903
if err := d .parser .DecodeLayers (packetData , & d .decoded ); err != nil {
904
- m .logger .Trace ("couldn't decode packet, err: %s" , err )
904
+ m .logger .Trace1 ("couldn't decode packet, err: %s" , err )
905
905
return false , false
906
906
}
907
907
0 commit comments