File: sampling.map.example

package info (click to toggle)
pmacct 1.7.8-4
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 11,904 kB
  • sloc: ansic: 110,430; sh: 4,794; cpp: 4,375; python: 3,632; makefile: 525
file content (35 lines) | stat: -rw-r--r-- 1,388 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
! 
! sampling_map: given at least a router IP, returns a sampling rate
!
! File syntax is key-based. Position of keys inside the same row (rule) is not
! relevant; Spaces are not allowed (ie. 'id = 1' is not valid). The first full
! match wins (like in firewall rules). Negative values mean negations (ie. match
! data NOT entering interface 2: 'in=-2'); 'id' and 'ip' keys don't support
! negative values.
!
! nfacctd: valid keys: id, ip, in, out
!
! sfacctd: valid keys: id, ip, in, out
!
! list of currently supported keys follows:
!
! 'id'			SET: sampling rate assigned to a matching packet, flow
!			or sample. The result is used to renormalize packet and
!			bytes count if [nf|sf]acctd_renormalize configuration
!			directive is set to true.
! 'ip'                  MATCH: in nfacctd this is compared against the source
!                       IP address of the device originating NetFlow packets;
!                       in sfacctd this is compared against the AgentId field
!                       of received sFlow samples. Expected argument are an IP
!                       address or prefix (ie. XXX.XXX.XXX.XXX/NN).0.0.0.0/0
!			would match all IPv4 addresses; ::/0 would match all
!			IPv6 addresses.
! 'in'  		MATCH: Input interface 
! 'out' 		MATCH: Output interface 
!
!
! Examples:
!
id=1024		ip=192.168.1.1
id=2048		ip=192.168.2.1 	in=5
id=4096		ip=192.168.3.1 	out=3