Taking a TCP dump can often be an important step in troubleshooting issues inside Tanzu Application Service (TAS). However, the nature of a TCP dump can lead to a large volume of data. Therefore it is important to know how to filter that information down more in order to speed up troubleshooting.
This guide is intended to demonstrate how to build an effective filter to observe specific traffic.
HTTP Response codes:
TCP Flags:
Use: filtering tcp handshakes to review the formation of the TCP connection between 2 endpoints.
IP Addresses:
Use: Filtering traffic to and from specific IPs. Often, when looking at packet captures on TAS components, multiple IPs will be communicating with each. Filtering by IP allows for more granular analysis.
Ports:
Use: Filtering on ports allows you to further filter traffic. For example, if you know your app listens on a specific port which is unique, you could filter to only display those packets.
SSL/TLS Tracking:
Use: TLS/SSL is critical in securing traffic inside and outside of Tanzu Application Service. It is possible to filter specific TLS/SSL protocols to verify that a supported version is being passed.
Note: Only TLS versions 1.2 and 1.3 are currently supported by TAS.