Conversation
…o/from given AS, based on prefix list matches
|
To illustrate: Once applied, statistics can be obtained per AS: |
|
Outside of bgpq4, I'm not sure this is the best way to obtain this information. Flow sampling is more robust and gives you more information. |
I think there are use cases for both approaches. IP filters are more accurate, they count every byte in every packet - so if you're trying to match DNS traffic, or some other specific application or attack for example, you get a more detailed view. Plus, the stats can readily be displayed on a Grafana dashboard when you already have gNMI infrastructure in place. I'd say let users try it in practice, and see if it helps them. We may have to evolve it a bit to target more specific use cases - this is just a starting point to hint at what's possible |
|
Then just use fastnetmon or similar software. Use case of bgpq4 is completely different than traffic accounting. |
|
@jbemmel The point isn't what's possible, it's that your feature request does not match the goals set for this software. Use Kentik or other flow monitoring solutions, and write the applicable ACLs yourself. |
Sample usage:
The generated filters "CloudFlare-in" and "CloudFlare-out" can be assigned as ingress/egress filters to interfaces, to count traffic to/from CloudFlare (based on IRR prefix list matches)
That way, peering operators can gain insight into the amount of traffic (packets/bytes) they are sending/receiving to a given AS, for example to optimize transit peering arrangements