-
Notifications
You must be signed in to change notification settings - Fork 265
/
Copy pathsampling.map.example
35 lines (35 loc) · 1.36 KB
/
sampling.map.example
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
!
! sampling_map: given at least a router IP, returns a sampling rate
!
! File syntax is key-based. Position of keys inside the same row (rule) is not
! relevant; Spaces are not allowed (ie. 'id = 1' is not valid). The first full
! match wins (like in firewall rules). Negative values mean negations (ie. match
! data NOT entering interface 2: 'in=-2'); 'id' and 'ip' keys don't support
! negative values.
!
! nfacctd: valid keys: id, ip, in, out
!
! sfacctd: valid keys: id, ip, in, out
!
! list of currently supported keys follows:
!
! 'id' SET: sampling rate assigned to a matching packet, flow
! or sample. The result is used to renormalize packet and
! bytes count if [nf|sf]acctd_renormalize configuration
! directive is set to true.
! 'ip' MATCH: in nfacctd this is compared against the source
! IP address of the device originating NetFlow packets;
! in sfacctd this is compared against the AgentId field
! of received sFlow samples. Expected argument are an IP
! address or prefix (ie. XXX.XXX.XXX.XXX/NN).0.0.0.0/0
! would match all IPv4 addresses; ::/0 would match all
! IPv6 addresses.
! 'in' MATCH: Input interface
! 'out' MATCH: Output interface
!
!
! Examples:
!
id=1024 ip=192.168.1.1
id=2048 ip=192.168.2.1 in=5
id=4096 ip=192.168.3.1 out=3