root@k8s:/home/bigvision
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on enp10s0, link-type EN10MB (Ethernet), capture size 262144 bytes
08:47:12.594743 IP 192.168.128.173.49168 > 192.168.128.153.30081: Flags [S], seq 1088259662, win 64240, options [mss 1460,sackOK,TS val 443012888 ecr 0,nop,wscale 7], length 0
0x0000: 4500 003c 357b 4000 4006 82a9 c0a8 80ad E..<5{@.@.......
0x0010: c0a8 8099 c010 7581 40dd 864e 0000 0000 ......u.@..N....
0x0020: a002 faf0 82c6 0000 0204 05b4 0402 080a ................
0x0030: 1a67 d718 0000 0000 0103 0307 .g..........
08:47:12.594932 IP 192.168.128.173.49168 > 192.168.128.153.30081: Flags [.], ack 3752481079, win 502, options [nop,nop,TS val 443012888 ecr 2208783575], length 0
0x0000: 4500 0034 357c 4000 4006 82b0 c0a8 80ad E..45|@.@.......
0x0010: c0a8 8099 c010 7581 40dd 864f dfaa 5137 ......u.@..O..Q7
0x0020: 8010 01f6 82be 0000 0101 080a 1a67 d718 .............g..
0x0030: 83a7 5cd7 ..\.
08:47:12.594994 IP 192.168.128.173.49168 > 192.168.128.153.30081: Flags [P.], seq 0:853, ack 1, win 502, options [nop,nop,TS val 443012888 ecr 2208783575], length 853
0x0000: 4500 0389 357d 4000 4006 7f5a c0a8 80ad E...5}@.@..Z....
0x0010: c0a8 8099 c010 7581 40dd 864f dfaa 5137 ......u.@..O..Q7
0x0020: 8018 01f6 8613 0000 0101 080a 1a67 d718 .............g..
0x0030: 83a7 5cd7 4745 5420 2f61 7069 2f76 312f ..\.GET./api/v1/
- -w log.cap 可以写日志到log.cap中,使用wireshark分析