Traceflow can be run inside edge to trace the path of packet once it enters edge node.
VMware NSX
We can run traceflow using following steps -
Following outputs are from lab.
1. Take packet capture on edge interface and confirm packet is entering the edge.
edge01> start capture interface 1c7e81b0-f87c-45af-95f7-23a74df9cb40 direction dual expression host 8.8.8.8
<snip>
03:20:55.397809 00:50:56:9d:4c:55 > 00:50:56:3f:01:2f, ethertype IPv4 (0x0800), length 98: 192.168.132.1 > 8.8.8.8: ICMP echo request, id 61994, seq 3, length 64
<base64>AFBWPwEvAFBWnUxVCABFAABUAAAAAEABJfDAqIQBCAgICAgA9+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=</base64>
03:20:55.407483 00:50:56:3f:01:2f > 00:50:56:9d:4c:55, ethertype IPv4 (0x0800), length 98: 8.8.8.8 > 192.168.132.1: ICMP echo reply, id 61994, seq 3, length 64
<base64>AFBWnUxVAFBWPwEvCABFSABUAAAAAGsB+qcICAgIwKiEAQAA/+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=</base64>
- In the above example has value for ICMP echo request is AFBWPwEvAFBWnUxVCABFAABUAAAAAEABJfDAqIQBCAgICAgA9+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc= and for - ICMP echo reply is AFBWnUxVAFBWPwEvCABFSABUAAAAAGsB+qcICAgIwKiEAQAA/+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
2. We can use the following command syntax to run traceflow for the particular flow and check its path.
edge> traceflow <interface uuid> <base64>
edge01> traceflow 1c7e81b0-f87c-45af-95f7-23a74df9cb40 AFBWnUxVAFBWPwEvCABFSABUAAAAAGsB+qcICAgIwKiEAQAA/+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
Packet Trace Results
EVENT : physical_received
PACKET_BASE64 : AFBWnUxVAFBWPwEvCABFSABUAAAAAGsB+qcICAgIwKiEAQAA/+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
PARENT_UUID : bb5b4d7a-1d72-11ef-a276-0050569d394c
TIMESTAMP : 2024-08-22 03:21:15.719933
TRACE_UUID : 97253c44-6035-11ef-a406-0050569d394c
TYPE : physical_node
EVENT : logical_received
PACKET_BASE64 : AFBWnUxVAFBWPwEvCABFSABUAAAAAGsB+qcICAgIwKiEAQAA/+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
PARENT_UUID : c87a198c-edae-4698-a83a-b939fe8bc6e9
TIMESTAMP : 2024-08-22 03:21:15.719940
TRACE_UUID : 97253c44-6035-11ef-a406-0050569d394c
TYPE : logical_router_port
UUID : 1c7e81b0-f87c-45af-95f7-23a74df9cb40
EVENT : logical_received
PACKET_BASE64 : AFBWnUxVAFBWPwEvCABFSABUAAAAAGsB+qcICAgIwKiEAQAA/+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
PARENT_UUID : c87a198c-edae-4698-a83a-b939fe8bc6e9
TIMESTAMP : 2024-08-22 03:21:15.719965
TRACE_UUID : 97253c44-6035-11ef-a406-0050569d394c
TYPE : logical_router_port
UUID : 1c7e81b0-f87c-45af-95f7-23a74df9cb40
EVENT : logical_forwarded
PACKET_BASE64 : AFBWnUxVAFBWPwEvCABFSABUAAAAAGsB+qcICAgIwKiEAQAA/+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
PARENT_UUID : c87a198c-edae-4698-a83a-b939fe8bc6e9
RULE_ID : 1001
TIMESTAMP : 2024-08-22 03:21:15.719966
TRACE_UUID : 97253c44-6035-11ef-a406-0050569d394c
TYPE : logical_router_port
UUID : 1c7e81b0-f87c-45af-95f7-23a74df9cb40
EVENT : logical_delivered
PACKET_BASE64 : RUgAVAAAAABrAfqnCAgICMCohAEAAP/j8ioAA2bGrpcABg2HCAkKCwwNDg8QERITFBUWFxgZGhscHR4fICEiIyQlJicoKSorLC0uLzAxMjM0NTY3
PARENT_UUID : c87a198c-edae-4698-a83a-b939fe8bc6e9
TIMESTAMP : 2024-08-22 03:21:15.719982
TRACE_UUID : 97253c44-6035-11ef-a406-0050569d394c
TYPE : logical_router_port
edge01> traceflow 1c7e81b0-f87c-45af-95f7-23a74df9cb40 AFBWPwEvAFBWnUxVCABFAABUAAAAAEABJfDAqIQBCAgICAgA9+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
Packet Trace Results
EVENT : physical_received
PACKET_BASE64 : AFBWPwEvAFBWnUxVCABFAABUAAAAAEABJfDAqIQBCAgICAgA9+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
PARENT_UUID : bb5b4d7a-1d72-11ef-a276-0050569d394c
TIMESTAMP : 2024-08-22 03:21:47.863399
TRACE_UUID : aa4dd646-6035-11ef-a406-0050569d394c
TYPE : physical_node
EVENT : logical_received
PACKET_BASE64 : AFBWPwEvAFBWnUxVCABFAABUAAAAAEABJfDAqIQBCAgICAgA9+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
PARENT_UUID : c87a198c-edae-4698-a83a-b939fe8bc6e9
TIMESTAMP : 2024-08-22 03:21:47.863401
TRACE_UUID : aa4dd646-6035-11ef-a406-0050569d394c
TYPE : logical_router_port
UUID : 1c7e81b0-f87c-45af-95f7-23a74df9cb40
EVENT : logical_received
PACKET_BASE64 : AFBWPwEvAFBWnUxVCABFAABUAAAAAEABJfDAqIQBCAgICAgA9+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
PARENT_UUID : c87a198c-edae-4698-a83a-b939fe8bc6e9
TIMESTAMP : 2024-08-22 03:21:47.863460
TRACE_UUID : aa4dd646-6035-11ef-a406-0050569d394c
TYPE : logical_router_port
UUID : 1c7e81b0-f87c-45af-95f7-23a74df9cb40
EVENT : logical_forwarded
PACKET_BASE64 : AFBWPwEvAFBWnUxVCABFAABUAAAAAEABJfDAqIQBCAgICAgA9+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
PARENT_UUID : c87a198c-edae-4698-a83a-b939fe8bc6e9
RULE_ID : 1001
TIMESTAMP : 2024-08-22 03:21:47.863481
TRACE_UUID : aa4dd646-6035-11ef-a406-0050569d394c
TYPE : logical_router_port
UUID : 1c7e81b0-f87c-45af-95f7-23a74df9cb40
EVENT : logical_route_info
NEXTHOP : 192.168.133.254
PACKET_BASE64 : RQAAVAAAAABAASXwwKiEAQgICAgIAPfj8ioAA2bGrpcABg2HCAkKCwwNDg8QERITFBUWFxgZGhscHR4fICEiIyQlJicoKSorLC0uLzAxMjM0NTY3
PARENT_UUID : c87a198c-edae-4698-a83a-b939fe8bc6e9
PREFIX_LEN : 0
ROUTE PREFIX : 0.0.0.0
TIMESTAMP : 2024-08-22 03:21:47.863514
TRACE_UUID : aa4dd646-6035-11ef-a406-0050569d394c
TYPE : logical_router_port
UUID : 1c7e81b0-f87c-45af-95f7-23a74df9cb40
EVENT : logical_received
PACKET_BASE64 : AFBWPwEvAFBWnUxVCABFAABUAAAAAD8BJvDAqIQBCAgICAgA9+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
PARENT_UUID : c87a198c-edae-4698-a83a-b939fe8bc6e9
TIMESTAMP : 2024-08-22 03:21:47.863522
TRACE_UUID : aa4dd646-6035-11ef-a406-0050569d394c
TYPE : logical_router_port
UUID : aac3cf7c-6465-4209-bea4-6386806bff05
EVENT : logical_forwarded
PACKET_BASE64 : AFBWPwEvAFBWnUxVCABFAABUAAAAAD8BJvDAqIQBCAgICAgA9+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
PARENT_UUID : c87a198c-edae-4698-a83a-b939fe8bc6e9
RULE_ID : 1001
TIMESTAMP : 2024-08-22 03:21:47.863522
TRACE_UUID : aa4dd646-6035-11ef-a406-0050569d394c
TYPE : logical_router_port
UUID : aac3cf7c-6465-4209-bea4-6386806bff05
EVENT : logical_forwarded
PACKET_BASE64 : AFBWPwEwAFBWnZvhCABFAABUAAAAAD8BJvDAqIQBCAgICAgA9+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
PARENT_UUID : c87a198c-edae-4698-a83a-b939fe8bc6e9
TIMESTAMP : 2024-08-22 03:21:47.863525
TRACE_UUID : aa4dd646-6035-11ef-a406-0050569d394c
TYPE : logical_router_port
UUID : aac3cf7c-6465-4209-bea4-6386806bff05
EVENT : logical_received
PACKET_BASE64 : AFBWPwEwAFBWnZvhCABFAABUAAAAAD8BJvDAqIQBCAgICAgA9+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
PARENT_UUID : fca215ee-5d40-4bb6-b261-62c6b43f1458
TIMESTAMP : 2024-08-22 03:21:47.863527
TRACE_UUID : aa4dd646-6035-11ef-a406-0050569d394c
TYPE : logical_switch_port
UUID : a4bde7c7-00a5-48cb-b48b-1f8276759906
EVENT : physical_forwarded
NAME : fp-eth2
PACKET_BASE64 : AFBWPwEwAFBWnZvhCABFAABUAAAAAD8BJvDAqIQBCAgICAgA9+PyKgADZsaulwAGDYcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc=
PARENT_UUID : 00000000-0000-0000-0000-000000000002
TIMESTAMP : 2024-08-22 03:21:47.863529
TRACE_UUID : aa4dd646-6035-11ef-a406-0050569d394c
TYPE : physical_pnic
Below is the output of traceflow when packet is getting dropped on the edge.
To reproduce the issue, I have entered a null route on T0_GW for my destination 8.8.8.8 and next hop as null. Packet will get dropped on T0 which we can see in the below traceflow.
Pcap has been taken on the T0 downlink, we see ICMP request packets going out.
edge01> start capture interface 38b49f07-a670-53a7-9532-ef2523ee94a6 direction dual expression host 8.8.8.8
01:38:59.229010 02:50:56:56:44:55 > 02:50:56:56:44:52, ethertype IPv4 (0x0800), length 98: 172.16.10.201 > 8.8.8.8: ICMP echo request, id 49158, seq 237, length 64
<base64>AlBWVkRSAlBWVkRVCABFAABUHeZAAD8BVtqsEArJCAgICAgAKBjABgDti0yDpwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=</base64>
01:39:00.229112 02:50:56:56:44:55 > 02:50:56:56:44:52, ethertype IPv4 (0x0800), length 98: 172.16.10.201 > 8.8.8.8: ICMP echo request, id 49158, seq 238, length 64
<base64>AlBWVkRSAlBWVkRVCABFAABUHjVAAD8BVousEArJCAgICAgAjdPABgDuFpCSpwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=</base64>
01:39:01.229716 02:50:56:56:44:55 > 02:50:56:56:44:52, ethertype IPv4 (0x0800), length 98: 172.16.10.201 > 8.8.8.8: ICMP echo request, id 49158, seq 239, length 64
<base64>AlBWVkRSAlBWVkRVCABFAABUHmJAAD8BVl6sEArJCAgICAgA3I/ABgDvuNKhpwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=</base64>
01:39:02.230167 02:50:56:56:44:55 > 02:50:56:56:44:52, ethertype IPv4 (0x0800), length 98: 172.16.10.201 > 8.8.8.8: ICMP echo request, id 49158, seq 240, length 64
<base64>AlBWVkRSAlBWVkRVCABFAABUHoJAAD8BVj6sEArJCAgICAgAvEvABgDwyRWxpwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=</base64>
01:39:03.229766 02:50:56:56:44:55 > 02:50:56:56:44:52, ethertype IPv4 (0x0800), length 98: 172.16.10.201 > 8.8.8.8: ICMP echo request, id 49158, seq 241, length 64
<base64>AlBWVkRSAlBWVkRVCABFAABUHuNAAD8BVd2sEArJCAgICAgA+gfABgDxfFjApwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=</base64>
Traceflow show packet dropped on interface-
edge01> traceflow 38b49f07-a670-53a7-9532-ef2523ee94a6 AlBWVkRSAlBWVkRVCABFAABUHuNAAD8BVd2sEArJCAgICAgA+gfABgDxfFjApwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
Packet Trace Results
EVENT : physical_received
PACKET_BASE64 : AlBWVkRSAlBWVkRVCABFAABUHuNAAD8BVd2sEArJCAgICAgA+gfABgDxfFjApwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
PARENT_UUID : 14312bac-48e0-11ef-880c-0050569d275f
TIMESTAMP : 2024-08-30 01:39:25.940524
TRACE_UUID : b0bc8b12-6670-11ef-9ffd-0050569d275f
TYPE : physical_node
EVENT : logical_received
PACKET_BASE64 : AlBWVkRSAlBWVkRVCABFAABUHuNAAD8BVd2sEArJCAgICAgA+gfABgDxfFjApwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
PARENT_UUID : 51301aac-7c3e-4fad-b8d5-337ea7036435
TIMESTAMP : 2024-08-30 01:39:25.940526
TRACE_UUID : b0bc8b12-6670-11ef-9ffd-0050569d275f
TYPE : logical_router_port
UUID : 38b49f07-a670-53a7-9532-ef2523ee94a6
EVENT : logical_dropped
PACKET_BASE64 : RQAAVB7jQAA/AVXdrBAKyQgICAgIAPoHwAYA8XxYwKcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
PARENT_UUID : 0ba7b87a-8446-4c78-85ec-89582683f526
REASON : Dropped by interface
TIMESTAMP : 2024-08-30 01:39:25.941707
TRACE_UUID : b0bc8b12-6670-11ef-9ffd-0050569d275f
TYPE : logical_router_blackhole