Forum Discussion
Jan 27, 2015
Hi LD24,
as NikhilB already recommended, a TCPDUMP may help to find out the issue:tcpdump -nnni 0.0:nnnp -s 0 -w /shared/monitoring.cap host
It will trace all client- and serverside traffic initiated by your operations manager tool and perhaps it might make sense to add another filter (i.e. 'and host ) depending on the way you forward the monitoring traffic.
The tcpdump syntax above is adding the so called "F5 Ethernet Trailer" data (the "nnn"-flag in the interface definition) to your raw dump file /shared/monitoring.cap and contains as well the related traffic on "peer" side (triggered by the "p"-flag in the interface definition). Description of and required WireShark plugin to decode the trailer data can be found here on DevCentral. Thanks, Stephan