Promiscuous mode IP Accounting
http://www.pmacct.net/
pmacct is a small set of passive network monitoring tools to measure, account, classify and aggregate IPv4 and IPv6 traffic; a pluggable and flexible architecture allows to store the collected traffic data into memory tables or SQL (MySQL, SQLite, PostgreSQL) databases. pmacct supports fully customizable historical data breakdown, flow sampling, filtering and tagging, recovery actions, and triggers. Libpcap, sFlow v2/v4/v5 and NetFlow v1/v5/v7/v8/v9 are supported, both unicast and multicast. Also, a client program makes it easy to export data to tools like RRDtool, GNUPlot, Net-SNMP, MRTG, and Cacti.
- Devel package for openSUSE:Factory
-
4
derived packages
- Links to openSUSE:Factory / pmacct
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout server:monitoring/pmacct && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_link | 0000000124 124 Bytes | |
nfacctd.conf | 0000000688 688 Bytes | |
pmacct-1.7.3.tar.gz | 0001467237 1.4 MB | |
pmacct.1 | 0000003869 3.78 KB | |
pmacct.changes | 0000074456 72.7 KB | |
pmacct.nfacctd.service | 0000000228 228 Bytes | |
pmacct.nfacctd.sysconfig | 0000000193 193 Bytes | |
pmacct.pmacctd.service | 0000000237 237 Bytes | |
pmacct.pmacctd.sysconfig | 0000000285 285 Bytes | |
pmacct.sfacctd.service | 0000000226 226 Bytes | |
pmacct.sfacctd.sysconfig | 0000000193 193 Bytes | |
pmacct.spec | 0000005449 5.32 KB | |
pmacctd.conf | 0000000688 688 Bytes | |
sfacctd.conf | 0000000688 688 Bytes |
Revision 89 (latest revision is 108)
Lars Vogdt (lrupp)
accepted
request 704836
from
Martin Hauke (mnhauke)
(revision 89)
- Update to version 1.7.3 + Introduced the RPKI daemon to build a ROA database and check prefixes validation status and coverages. Resource Public Key Infrastructure (RPKI) is a specialized public key infrastructure (PKI) framework designed to secure the Internet routing. RPKI uses certificates to allow Local Internet Registries (LIRs) to list the Internet number resources they hold. These attestations are called Route Origination Authorizations (ROAs). ROA information can be acquired in one of the two following ways: 1) importing it using the rpki_roas_file config directive from a file in the RIPE Validator format or 2) connecting to a RPKI RTR Cache for live ROA updates; the cache IP address/port being defined by the rpki_rtr_cache config directive (and a few more optional rpki_rtr_* directives are available and can be reviwed in the CONFIG-KEYS doc). The ROA fields will be populated with one of these five values: 'u' Unknown, 'v' Valid, 'i' Invalid no overlaps, 'V' Invalid with a covering Valid prefix, 'U' Invalid with a covering Unknown prefix. + Introducing pmgrpcd.py, written in Python, a daemon to handle gRPC- based Streaming Telemetry sessions and unmarshall GPB data. Code was mostly courtesy by Matthias Arnold ( @tbearma1 ). This is in addition (or feeding into) pmtelemetryd, written in C, a daemon to handle TCP/UDP-based Streaming Telemetry sessions with JSON-encoded data. + pmacctd, uacctd: added support for CFP (Cisco FabricPath) and Cisco Virtual Network Tag protocols. + print plugin: added 'custom' to print_output. This is to cover two main use-cases: 1) use JSON or Avro encodings but fix the format of the messages in a custom way and 2) use a different encoding than JSON or Avro. See also example in examples/custom and new directives print_output_custom_lib and print_output_custom_cfg_file. The patch
Comments 0