Running rvtrace
When you run rvtrace
on Windows™, you must install WinPcap,
which is included in the IBM® Rational® Performance Test Server installation
program. For more information, see Rational Performance Test Server overview.
The WinPcap software installs DLL files that rvtrace
requires
to capture RVD messages. You also need to ensure that the network
interface that is used is the correct one (specified with the -i
command-line
option). If you do not use the correct interface, rvtrace
cannot
collect any data. You can find network device names in the Windows™ registry or you can run
WinDump, which is the Windows™ version
of tcpdump, the command-line network analyzer for Unix-like systems.
(WinDump can be downloaded from the WinPcap website.)
For example, if you run a command of the following format:
windump -D
The output might look similar to the following:
1.\Device\NPF_GenericDialupAdapter (Generic dialup adapter)
2.\Device\NPF_{AC533C74-32A4-44AD-8675-5A16D50D0170} (3Com EtherLink PCI)
You can use this information when you
run the rvtrace
command.
For example:
rvtrace -i \Device\NPF_{AC533C74-32A4-44AD-8675-5A16D50D0170} -u 60 -snmp -no-display
Unix-like systems
When
you run rvtrace
on Unix-like systems, no other software
is required. However, rvtrace
must be able to open
the network port in promiscuous mode, which requires super user permissions.
Typically, the rvtrace program has "set user to root" enabled. If this is true, it can be run as a normal user. (Contact your system administrator if you need assistance or to verify this.)
You must configure rvtrace
to monitor
the correct network port. A list of network interfaces can be displayed
by running ifconfig
.
For example:
host% /sbin/ifconfig -a
lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232 index 1 inet 127.0.0.1 netmask ff000000
hme0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2 inet 192.168.111.8 netmask ffffff00 broadcast 192.168.111.255
In this case, the hme0
interface
is used when you run the rvtrace
command:
rvtrace -i hme0 -u 60 -snmp -no-display