Skip to content

Commit d1ae37f

Browse files
committed
add UDN mention
1 parent e54fe4b commit d1ae37f

File tree

2 files changed

+7
-3
lines changed

2 files changed

+7
-3
lines changed

content/posts/2025-01-28-cli_use_cases.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -163,18 +163,22 @@ Once you updated your policies, you can give another try to your route until you
163163
The drop cause will dissapear and your route should open correctly now. On top of that, you can ensure that the Round Trip Time is correct.
164164
If you are still experienting issues with the route, you may update / get rid of the filter(s) and play with live filtering.
165165
166-
- While running a capture, you can place additionnal live filters to the view by simply typing keywords on your keyboard such as `nodejs`:
166+
- While running a capture, you can place **additionnal live filters** to the view by simply typing keywords on your keyboard such as `nodejs`:
167167
![cli live filter]({page.image('cli/connectivity-scenario-cli-live-filter.png')})
168168
169169
- And add as many keywords as you want by pressing enter:
170170
![cli live filters]({page.image('cli/connectivity-scenario-cli-live-filters.png')})
171171
172-
- If your deployment involve some DNS resolution, you can switch to the DNS display and show latencies and errors:
172+
- If your deployment involve some DNS resolution, you can switch to the **DNS** display and show latencies and errors:
173173
Once you updated your policies, you can give another try to your route until you fix the issue:
174174
![cli dns]({page.image('cli/connectivity-scenario-cli-dns.png')})
175175
176176
Those `NxDomain` errors could be from a misconfiguration in your app deployment trying to reach the wrong domain.
177177
178+
- To check which network is involved, you can switch to **Network Name** enrichment and **UDN** display.
179+
This will show you which network name, interfaces, direction and User Defined Network name involved.
180+
![cli network]({page.image('cli/connectivity-scenario-cli-network.png')})
181+
178182
Once you are done, simply press `CTRL + C` to exit. Your capture will be copied to your local machine for post mortem analysis.
179183
180184
That's the end of the first scenario about connectivity checks !
@@ -214,7 +218,7 @@ What about encrypted traffic ?
214218

215219
Most of the time, your traffic will be secured and you will not have access to the data it holds. However, Wireshark has the ability to decrypt the content if you [provide the proper secrets](https://wiki.wireshark.org/TLS#tls-decryption). However, getting these secrets may be tricky depending on where the encryption happens and needs some juggling.
216220
If you are looking for the traffic between your browser and the cluster, you can simply run the following command to capture [pre-master-secret keylog file](https://wiki.wireshark.org/TLS#using-the-pre-master-secret):
217-
```
221+
```sh
218222
SSLKEYLOGFILE="keylog.txt" chromium-browser &
219223
```
220224

61.2 KB
Loading

0 commit comments

Comments
 (0)