Good morning. I want to quickly introduce myself. I’m a Principal Engineer on SirusXM’s Media Content Engineering architecture team, where we design linear and file-based media technology systems that power the audio, metadata, and video content on all the SirusXM and Pandora distribution platforms.

Topics

  • The Troubleshooting Process & Getting Ready
  • Hardware Tools
  • Software Techniques

We’re going to cover a lot of material in a short time, so hold on tight! First, we’ll review the troubleshooting process and what you can do to get ready to work on MoIP systems. Then we will briefly look at the hardware tools network engineers use before going through a bunch of tips and tricks for the software we use for troubleshooting.

The Troubleshooting Process & Getting Ready

Let’s get to it…

It’s not that different

from traditional media systems!

The first tip is to remember that troubleshooting MoIP systems is not that different from working on traditional media systems. The process you follow and the techniques you use will feel familiar to you and build on the skills you already have.

Check the cable

Network Patch Bay

It nearly goes without saying that when troubleshooting Media over IP systems, you should not overlook basic checks like cables or turning software switches on.

Step 0: Prepare

Know your network

  • DNS servers
  • NTP & PTP servers
  • Typical traceroute
  • Firewalls & VLANs
  • Use DCIM & IPAM like NetBox

Install applications

Before you start troubleshooting MoIP (or other) systems, you should be prepared with the knowledge and tools for the situation.

  • Know your network’s DNS and time servers
  • Know the usual route hops you see on your network (more on traceroute later)
  • Know where the firewalls are and the VLAN structure
  • Use a data center information management (DCIM) and IP address management (IPAM) system like NetBox
  • Install any software you need — and there’s a bunch we are going to cover — before you need it
  • Consider preparing a USB bootable tool kit. Ventoy makes it easy to not have to pick one. Instead, you can fill a big thumb drive with a variety, like the ones listed here.

Practice Makes Perfect

Using GNS3 to simulate a spine-leaf architecture

We all now how to get to Carnegie Hall, right? But how do you practice with MoIP systems? Network simulators can be a little tricky to set up and resource hungry once running, but you can get hands-on experience with major manufacturer switches in realistic topologies. GNS3 and EVE-NG have open source or free community editions available.

Manufacturers have different policies on using their hardware OS in a simulator. Some require an active support contract to get access to downloads, and others offer simulator-specific versions for training purposes. When trying to learn outside of work, you may need to substitute open source components, like the OpnSense firewall or the Open vSwitch virtual software switch, for commercial components you don’t have access to. In this example, I started building a spine-and-leaf network with simulated Arista switches on an Intel NUC-style computer hosting the GNS3 VM. I was able to test basic connectivity with ease, but I was probably pushing the limits of my hardware if I tried to build a fully redundant red/blue network.

Most network courses and texts start at the bottom of the OSI model and work their way up. Kurose and Ross take the rare, opposite approach of starting with the application layer and working down. This can be more relatable to new network engineers. (Note that this most recent edition is only available as a physical or digital rental or a digital purchase.) Older editions are available used, and I’ve learned something from every edition I’ve looked at.

Troubleshooting Methods

CompTIA [@comptiaGuideNetworkTroubleshooting]

  1. Identify the problem.
  2. Develop a theory.
  3. Test the theory.
  4. Create an action plan.
  5. Implement the solution.
  6. Document the issue.

DECSAR Method [@rossTeachingStructuredTroubleshooting2009]

  1. Define the problem.
  2. Examine the situation.
  3. Consider the causes.
  4. Consider the solution.
  5. Act and test.
  6. Review troubleshooting.

Let’s look at the steps we’ll follow for troubleshooting networked systems. Note that the network-specific CompTIA method is nearly identical to the generic DECSAR method. We’ll identify the problem, work up a theory about the cause, test that theory, create a plan for correcting the issue, put that plan in motion, and close out the documentation we’ve been keeping throughout the process.

Troubleshooting Model

flowchart LR
  classDef sub opacity:0
  classDef note fill:#fff, stroke:#fff, font-size:24pt

  subgraph notes [" "]
    OSI
    tcp(TCP/IP)
  end
  subgraph Check the Application
    direction TB
    Application --- Presentation --- Session
    app2[Application]
  end
  OSI -.-> Application
  tcp  -.-> app2
  Session --- Transport
  app2 --- trans2[Transport]
  app2 ~~~ Session
  subgraph Check the Protocol Stack
    direction TB
    Transport --- Network --- ll(Logical Link)
    trans2 --- Internet
    Internet --- na(Network Access)
  end
  ll --- Physical
  na --- phys2[Physical*]
  subgraph Check the Cable/NIC
    Physical
    phys2
  end
  class notes sub
  class OSI,tcp note

I find it useful to translate the formal OSI and TCP/IP models for networks into a troubleshooting model. Think of it as translator for between what you see in the wild and what you learn. Having the different perspectives helps with the theorizing steps that we just looked at.

The upper three layers of the OSI model roughly correspond to problems or fixes in the application that you are troubleshooting. There’s disagreement on whether the TCP/IP model includes the physical layer, but nothing works without it. That’s where our cable checks come in. In the middle are the three layers that point you towards looking at the device protocol stack. Is the network mask correct? Are you getting the correct DNS answer? You get the idea of the clues that point here.

Hardware Tools

We’ve prepared ourselves, now what are some hardware tools that can help with troubleshooting?

Cable Testers

Klein Tools Cable Tester

:heavy_check_mark: Continuity

:heavy_check_mark: Pinout

:x: Connectivity

:x: Crosstalk, attenuation, interference…

:x: Cable break location

Cable testers will verify continuity on the conductors and tell you if the pinout on both ends matches. Basic testers, like this Klein Tools, will not tell you if a cable will work with certainty or at a specific speed.

Network Testers

Fluke Networks LinkIQ+

:heavy_check_mark: Continuity

:heavy_check_mark: Pinout

:heavy_check_mark: Connectivity

:x: Crosstalk, attenuation, interference…

:x: Cable break location

A step-up in price, network testers will actually verify connectivity and line rate of a connection. Features vary, but most network testers don’t tell you the quality of the cable (crosstalk, attenuation, interference, etc.) or tell you where a break in a cable is.

Certifiers

Fluke Networks DSX CableAnalyzer

:heavy_check_mark: Continuity

:heavy_check_mark: Pinout

:heavy_check_mark: Connectivity

:heavy_check_mark: Crosstalk, attenuation, interference…

:x: Cable break location

Cable certifiers are often a corporate purchase and bought as part of a testing kit. There are lots of accessories and add-ons needed to cover the cable types you want to test. Again, features vary, but certifiers will give you statistics for the quality of a cable and features for managing bulk cable tests.

TDRs & OTDRs

EXFO MaxTester 715D

:heavy_check_mark: Continuity

:heavy_check_mark: Pinout

:heavy_check_mark: Connectivity

:heavy_check_mark: Crosstalk, attenuation, interference…

:heavy_check_mark: Cable break location

:information_source: Have & know how to use a launch fiber/box

Time domain reflectometers and their optical cousins are the ultimate physical layer troubleshooting tool. They can help you locate cable breaks and passive network components like patches. But they are expensive and make sure you have all the accessories you need, like a launch box, before you need to use your OTDR.

Other Hardware Tools

  • Wire stripper
  • Crimp tool
  • Punch down tool
  • Optical Power Meter (aka light meter)
  • Loopback adapter
  • Tone generator

Most of the other tools you need for working on professional media networks are probably already in your toolkit.

  • We all have a preferred style of wire stripper.
  • RJ45 crimp tools come in a variety of styles. I’m sure people get religious about their preferences, so find one that is right for you.
  • 110 punch down tools are important for patch bays and keystone jacks. Make sure you understand which way the cut side should face.
  • An optical power meter or a visual fault locator are the optical equivalents of a continuity tester.
  • I haven’t used a loopback adapter often, but I am glad that I always put it back in the same pocket in my tool bag.
  • Tone generators get a workout when the electricians labelled all the cables “1”.

And I hope we’ve all learned how to build better racks than these.

Software Techniques

Let’s turn our attention to tips and tricks for software-based troubleshooting techniques.

Check the deets (Windows)

ipconfig

  • /all: Prints everything
  • /release & /renew: use wildcards for interface
  • /flushdns: Force clearing DNS cache

netsh

  • Print all IPv4 network info: netsh interface ipv4 show config
  • Save config: netsh int dump > mycfg.dat
  • Restore config: netsh exec mycfg.dat
  • Work with a remote machine: netsh set machine <remotecomputer>

Unless you have a remarkable memory of a small network, you are going to want to find out how the network is configured on a computer.

On Windows, you do that with ipconfig, usually with the /all switch. That will print out the IP address, network mask, default router, DNS servers, and more for every network interface. You can also /release or /renew DHCP-assigned addresses, which you can limit to specific interfaces. Windows interface names are long, so wildcards save some typing. Sometimes you need to clear the DNS cache with /flushdns to get a new record that has an unexpired TTL.

If you need to script setting or getting the configuration, you can use netsh. Like with most switch or router command line interfaces, you can shorten subcommands for netsh. If you want to list all the network information, like you can do with ipconfig, you can shorten the command to netsh int ip sho conf. netsh has an interactive mode and allows you to set, as well as get, the configuration. Even more useful, you can dump the configuration, make changes and restore the saved configuration. You can even make changes to another computer. Be careful that you don’t make that remote computer unreachable.

Just the facts (Linux)

ip & ifconfig

  • ip combines ifconfig with route & arp
  • ip has a simpler, more consistent interface [@kenlonIpVsIfconfig2023]
  • ip a: list all addresses
  • ip a show up: list addresses on active interfaces
  • ip -ts mon: monitor network changes

DHCP release/renew

:warning: Releasing/renewing an IP address always brings down the interface.

  • sudo dhclient -r && sudo dhclient
  • sudo dhcpcd -k && sudo dhcpcd
  • sudo networkctl renew wlo1
  • sudo pump -r && sudo pump -R

On Linux, older documentation talks about ifconfig (interface config) for getting most of the same information as Windows’ ipconfig. But newer distributions ship with the ip utility. You will find it easier to use, plus it combines information about the arp cache and route table that you need to run separately from ifconfig and ipconfig. You still need to use other utilities for DHCP and DNS.

Like with netsh, you can shorten subcommands for ip. Listing all IP addresses is as quick as ip a. If you want to filter the address list, say to print active interfaces, add show plus the query, in this case up. Keep track of changes to the network connections with ip mon. Adding -ts gives you a scroll-friendly timestamp.

The exact procedure for releasing and renewing DHCP leases on Linux depends on the distribution. One of these commands should do the trick. Make sure you have a backup plan for accessing the device if you are working on it remotely.

Finding your way

Address Resolution Protocol

  • Print table
    • Windows: arp -a
    • Linux: ip n
  • Add an entry
    • Windows: arp -s 192.0.2.5 00-a0-b0-c0-d0-e0
    • Linux: sudo ip n a 192.0.2.5 ll 00:a0:b0:c0:d0:e0 dev eth0

Static routes

  • Print table
    • Windows: route print
    • Linux: ip r
  • Add a route
    • Windows: route add 198.51.100.0 mask 255.255.255.0 192.0.2.1 METRIC 3 IF 1
    • Linux: sudo ip r a 198.51.100.0/24 via 192.0.2.1 dev eth0

When everything is working right, layer 2 to layer 3 handoffs happen without needing a second thought. But every once in a while, we need to take a look at the Address Resolution Protocol table. You can do that with arp -a on Windows or ip n on Linux.

Even less often, you need to add a table entry, when you, for example change the IP address of a remote computer to something inaccessible, and you are desperate to not have to go into the office at 2am. That’s something that I’ve definitely never ever done. On Windows, add an ARP entry by entering the target IP address and the matching MAC address separating the octets with hyphens. On Linux, make sure you put lladdr, or ll for short, between the IP and MAC addresses and specify the interface.

In professional media systems, you may need to work with static routes on endpoint devices if you separate multicast and unicast on different virtual networks or if you have red & blue networks. Print the route table on Windows with route print and on Linux with ip r. Setting temporary static routes on Windows means entering the destination network with its network mask in dotted decimal form, the gateway, the cost metric, and the interface. Note that route uses interface numbers that aren’t used in any of the other commands we’ve looked out. Printing the route table also includes the interface number mapping.

On Linux, the command is more straightforward. You enter the destination in CIDR notation, include the word via to identify the gateway, and enter the standard interface name.

Give it your best Sean Connery

ping

  • Test reachability of a host
  • Reports dropped packets and round trip time
  • -t (Windows): infinite packets
  • -4: force IPv4

tracert (Windows)/traceroute (Linux)

  • Test each route hop to a host
  • -h (Windows)/-m (Linux): max hops

After checking the configuration of a problem computer, you will want to check if you can reach another device. ping uses ICMP to send an echo request, wait for an echo reply, and measure the round trip time. The RTT tells you the latency of a connection. If you ignore Captain Ramius’s order and add -t to your Windows ping, you can measure RTT over time and look for intermittent dropped packets. Linux defaults to infinite pings. Use Ctrl+C to end the ping and show the calculated statistics. If you are pinging by name, in particular outside your own network, ping may default to an IPv6 address. Use -4 to force pinging the target’s IPv4 address.

Each “hop” on the path between devices can be the cause of dropped packets or high latency. traceroute/tracert manipulate the time-to-live (TTL) to ping router hops one by one. Note the emphasis on routers there. You can’t directly measure the impact of any switches or other layer 2 devices with ping or traceroute. Router configurations may prevent a traceroute from ever finishing. Use -h on Windows and -m on Linux to set the hop limit.

Exotic Pings

pathping (Windows) / mtr (Linux)

  • ping and tracert mashed together
  • hop behavior over time

arping (Linux)

  • Give it an IP, send an L2 ARP who-has
  • Give it a MAC address, send an ICMP ping

Sometimes ping and traceroute don’t give you the clues you are looking for. ICMP pings aren’t the same as TCP or UDP. You can get ping-like tests with Nmap, which we’ll cover later.

ping and tracert will give you slightly different views of the network, so why not get the best of both worlds? On Windows, PathPing gives you individual hop statistics over a longer period of time. My Trace Route (mtr) will give you similar measurements on Linux. Note that you will need to install it as it isn’t a standard utility.

Linux lets you test layer 2 connectivity with arping. Give arping an IP address, it will send link layer frames to the associated MAC address and report the round trip time. Give it a MAC address, and it will ping the resolved IP address.

Outside Looking In

Looking Glass Servers

SmokePing

SmokePing

All the pings we’ve talked about so far test from a device that you control out to another device, but sometimes you need to test from the public Internet in to your network. Looking glass servers let you remotely run ping or traceroute to another device. Significant connectivity providers, like Hurricane Electric and Lumen, run these servers, which lets you choose where you test from, geographically and network connectivity-wise. Check the server lists to find the right one to test with for your situation.

Want to do a quick, longer term (up to about a month) test from the outside? DSLReports still runs a SmokePing service, which does periodic packet loss and latency tests. The higher on the graph, the higher the latency. The darker the “smoke”, the more pings with a given latency. The smokier the graph, the more jitter there is. Before using the DSLReports service, check the terms of service to make sure it works for your situation or consider setting up vaping for a similar self-hosted test.

Name That Computer: dig (Windows/Linux)

  • Windows install: Download & Tools Only install
  • Specific/all record type: dig example.com <rrtype|ANY>
  • Specific DNS server: @mydnsserver.example.com
  • Be brief: +short
  • Long but readable: +multiline +noall +answer +nocmd
  • Traceroute: +trace
  • Interactive: omit host

GUI Alternative (Windows)

You will still frequently work with IP addresses, but DNS is an important part of modern MoIP systems. You can perform basic DNS queries with nslookup. When you need to look up more specialized or complex records, like NMOS can use, you will need to dig for the information. While part of the default packages of most Linux distributions, you will need to install dig from the ISC BIND DNS tools. Download the installer, which also includes the BIND DNS server, and start the installation wizard. Be sure to select Tools Only, unless you really want that DNS server.

With dig you can request a specific record type, like PTR or TXT (used by NMOS), or all records for a name with the pseudotype of ANY.

nslookup can be confusing when you need to query a specific DNS server. With dig, you identify the DNS server by prefacing it with an @ symbol. dig defaults to printing a lot of information about your query, but sometimes that’s TMI. Fortunately, you can format the response for the situation. +short gives you the answer to the query with nothing else, great for scripting. If you still want a longer view of the answer, but without the default query information, there are options for that, too. You can even follow the resolution path from root server to authoritative server, for a sort of DNS traceroute. If you have a lot of DNS queries to run, you can enter interactive mode by leaving off the target address.

If you prefer a GUI, NirSoft offers DNSDataView for Windows. It will only query a limited set of record types. But it can create reports. Diagnosing DNS issues sometimes means following a trail of CNAMEs and reverse lookups, which DNSDataView will automate for you.

What’s This Computer Doing?

netstat (Windows)

  • Choose protocol: -p (tcp|udp)
  • Only listening ports: netstat -a | find /i "listening"
  • Executable & process ID: netstat -abo
  • GUI: TCPView or Resource Monitor

ss (Linux)

  • Choose protocol: --tcp or --udp
  • Only listening ports: -l
  • Filters
    • Source address: ss -nt src 192.0.2.0/24
    • Destination port: ss -ant dst :8080

What a computer is (or isn’t) doing on a network isn’t always visible from the applications we use. Is the server actually waiting for incoming connections? Which server did the app actually connect to?

On Windows, the command line tool netstat (“network statistics”) can show incoming and outgoing connections. It can be helpful to limit the protocol to TCP or UDP individually, since the lists get long. Printing all the listening ports with -l answers that first question about waiting for incoming connections.

Piping the output to find lets you filter out all the incoming and outgoing connections. If you are using Powershell, you will need triple quotes around listening. It isn’t surprising that your computer might sit for a while, seeming to do nothing. Remember find is going through that long list of incoming, outgoing, and listening ports to sift out the listening ports.

Now you know that some program is listening, but which program is it? Add the b and o switches, and you get the executable path and process ID of the listening application. I recommend against piping to find this time, because netstat uses a multi-line output format with b option.

If you need that kind of detailed information, you should consider switching to a GUI program for viewing the connection status, and you have two choices. TCPView gives you more control over what you see, but Resource Monitor is available on nearly every Windows device that should still be in use.

For Linux, you can still use netstat, though the syntax is a little different from the Windows command. The newer ss utility gives you more control over that long list of connections with filters. Working on a server and want to see if a particular device connected? Filter on the source address or even a whole subnet, like shown here in CIDR notation. You can check which servers a device connected to on a specific port by using a colon prefixed port number.

What’s That Computer Doing?

:warning: Get permission and think about maintenance windows before using these tools!

Port scanning: Nmap

  • Scan multiple ports & addresses: nmap -p 80,25,443,110 198.51.100.20-100
  • TCP Scan: -sS (SYN) or -sT (Connect)
  • UDP Scan: -sU
  • Service & version detection: -sV
  • OS detection: -O

Vulnerability Scanning

Before we talk about finding out what is going on with another computer on a network, proceed with caution. Make sure you have permission to use these tools. If your enterprise security team is doing their job, they will know what you are up to. Besides being concerned about policy violation risks, there is another, familiar risk to consider. Depending on how you use these tools, they carry the danger of causing outages. Consider running these tools during planned maintenance windows and on offline systems.

With that out of the way, let’s talk about how to find out what is going on with another device, especially one you don’t have the ability to work directly on. (But you have permission to muck around, right?) You can use Nmap to scan for open ports, those programs waiting for incoming connections. Specify the scan type, UDP or one of the TCP methods, depending on what service you want to ping. Nmap can also guess at the specific service and version running or detect the OS of the scanned device.

Vulnerability scanning is an essential part of security preparedness. You want to know what your exposure is, so you can take the right mitigation steps. The most common response is remediation, or patching the vulnerability, but you might take other actions until you verify the patch with a vendor or test it out yourself. Nessus and the less commercialized OpenVAS (aka Greenbone) scanners are the most common in use. Use OpenVAS’s Docker container to get up and running fast and without unnecessary complexity.

Packet Capture

We’ll be covering packet capture and analysis in more depth later today, but I do want to share one Wireshark tip with you. Use capture, or pcap, filters as much as you can to keep your memory and file sizes manageable. Display filters are easier to work with and more expressive, but media systems are chatty, generating a lot of packets that take some sifting. I try to start with a short, unfiltered capture, figure out the packets I’m generally interested in, and then run a longer capture that filters out as much of the noise as possible.

It can also be more convenient to run a packet capture on the command line with tcpdump and then analyze it later with Wireshark.

Packet Generators

  • PacketStorm: MoIP-focused tools
  • Keysight (formerly Ixia): :moneybag::moneybag::moneybag:
  • Ostinato: Build yourself or reasonably priced binaries

Working with “real” network traffic isn’t always possible or ideal. Packet generators let you synthesize or replay network traffic. One common use case is for load testing. Some packet generators can pump out a lot of flows, more than you can reasonably get going by hand with a few clients in a lab environment.

But commercial packet generators can be well beyond our budgets, and we need some packets to learn or experiment with. Ostinato is open source, free as in beer if you build it yourself, or affordably available as pre-built binaries.

Performance Benchmarking

Disk

  • IOMeter: Use v1.0.1
  • # of Workers = # of Cores/vCPUs
  • Work up a realistic test plan

Network

  • Iperf2: Multicast & other media flows
  • Iperf3: IT workloads or public Internet

“Is it fast enough?” The specs say that the disk, CPU, RAM… name your component should be, but we all know reality doesn’t match spec sheets. Even though IOMeter hasn’t been updated in a while, it remains the best disk performance benchmarking tool readily available. Spend a bit of time working out a realistic test plan for your benchmark. You can simulate different phases of disk use. Generally, you can have as many workers to create I/O load as you have cores or vCPUs available to your test machine. Be careful about selecting disks to test, you don’t want to put a system disk or project files in danger.

For network performance tests, Iperf2 and Iperf3 have overlapping feature sets. Iperf2 is better for multicast and other media flows. Use Iperf3 for more typical IT workload or public Internet tests. No matter which version you use, you need to install Iperf on two devices. One simulates a server and listens for incoming connections, while the other plays the client role and sends simulated data to the server.

SNMP

SNMP is still widely deployed for device monitoring even with advances in observability tools. The built-in Windows utilities limit the troubleshooting you can do. The Net-SNMP project gives you a rich set of command line tools. The project team is not producing Windows binaries with recent releases, so you either need to use them on a Linux machine, install the package in Windows Subsystem for Linux, build binaries yourself, or install older versions. Once you have access to Net-SNMP, snmpwalk prints out a whole tree’s worth of information.

The simple part of SNMP refers to the protocol design, not about its user-friendliness. A graphical MIB browser helps explore a new device’s metrics. iReasoning and FrameFlow each offer popular GUI clients.

Time

NTP

PTP

PTP Track Hound v2

When troubleshooting time related issues, one of your first checks should be a device’s NTP source. You need to specify 1 or 3 or more NTP servers for the client to work properly. If you have 2 NTP servers, common in media facilities with a pair of redundant sync generators, you have to set one of those sources as the preferred source. The NTP algorithm won’t be able to figure out the correct adjustment without a preferred server.

Another common problem is using the built-in Windows time client. Do yourself a favor, disable that service and install the Meinberg port of the reference NTP tools. That client works, uses the same easy to distribute configuration file as the Linux version, and gives you ntpq for basic monitoring.

Meinberg also has a separate NTP monitoring tool, as well as free and paid PTP monitoring solutions. For PTP, you can use EBU LIST for detailed analysis.

Multicast

Sometimes all you need is a barebones RTP stream for a quick test. VLC can stream files over RTP. Choose your source file, enter your multicast address, set your media configuration, and your stream is going. Use VLC, or another program to receive the stream on another device.

Multicast Hammer helps you stress test multicast networking. Like Iperf, it can operate in client or server mode. When acting as a client, you specify the number of multicast groups to subscribe, the address of the first group, and the port number to listen on. Multicast Hammer then subscribes to the sequential addresses starting at the one you specified. The server works similarly, with the addition of transmit speed, packet size, and burst options.

We talked about iperf for benchmarking multicast before, but if you need a multicast test that isn’t at all finicky and lets you choose the network interface to use, Simple Command Line Multicast Testing Tool does what it says on the tin.

APIs

Testing an NMOS API with Bruno

The first time you come face to face with a RESTful API, it can feel like a bit of a dark art, but there are two ways to turn that art into science. First, don’t try to handcraft an API request. Use an API testing tool. Leading free or open source testers have recently made user un-friendly changes, so I can’t strongly recommend one right now. There are plenty of choices depending on your needs and preferences.

  • Milkman is modular, offering a variety of transport and other useful plugins.
  • Bruno is an offline, file-based storage API tool. Note that the developers are planning to release some transports that are of interest to professional media networks in a freemium version
  • insomnium forked one of the popular API tools from before the problematic changes, but hasn’t had active development since then.

The second tip for API troubleshooting is you should try to work from formal API specifications, often in the form of OpenAPI descriptions or smithy contracts for event-based APIs.

If you know little about an API, a full test tool might not be a good place to start. Ncat, from the Nmap team, is a modern update to netcat. Ncat can be a sender, a receiver, or a proxy. If you want to figure out something like a quirky tally protocol, start Ncat, type commands, and view responses. It can even use TLS encryption.

NMOS & 2110

  • sdpoker for troubleshooting SDP files
  • AMWA NMOS Testing Tool for automated compliance testing
  • Easy-NMOS: Docker compose for NMOS registry, virtual node, & Testing Tool
  • Riedel NMOS Explorer for quick browsing devices
  • EBU LIST for timing analysis, ANC decoding, A/V sync, redundancy comparison, and more!

There are some great open source and freely available tools for NMOS and SMPTE ST 2110 troubleshooting. Mentioned before, EBU LIST is great for analyzing your video and audio flows. Different vendors have different implementations and interpretations of SDP descriptions, which sdpoker can help you reconcile.

AMWA, the organization behind NMOS has also released an automated testing tool. This is the same setup used during the JT-NM tested events that you can use for verifying compatibility for the devices and systems that you use in your facility.

Whether you are trying to learn more, test new devices, or you are actively troubleshooting an issue, how many times have you wished you could set up your own router control system? In the MoIP world, we can actually do that, and there even is an “easy button” for it. Easy-NMOS is a docker compose-based recipe for spinning up an NMOS registry, a virtual node, and the testing tool.

Also, Riedel has a freely available browser for quick peeks into an NMOS registry.

Containers

  • Understand docker networks
    • Don’t use bridge0
    • Expose minimal ports with -p
  • netshoot: “a Docker + Kubernetes network trouble-shooting swiss-army container”
  • Go back to basics: traefik/whoami

Containers can make your life easier, but if you have to troubleshoot Docker networking, you might be questioning your tech stack choices. First, make sure you understand how docker networks work. A good cheat sheet will help with some secure best practices, like not using the default network and only exposing necessary ports.

You can use the netshoot container to access some great troubleshooting tools. But its real strength is being able to troubleshoot from inside a specific docker network or even inside another container’s namespace. You’ll need to do that when you don’t have those troubleshooting tools already built in to the problem container.

If you still can’t make sense of a Docker issue, it can help to go back to the basics. The whoami container, from the Traefik reverse proxy team, gives you all the building blocks of a real container — latency, a JSON api, health checks — stripped down to lightweight essentials. Get your network problem sorted out with whoami and then go back to your real container.

Keep Searching

The last tip I’ll leave you with is to keep your eyes open. You never know when you’ll find the next tool or technique that will help you solve problems faster or deal with more complex or just plain weird issues. There’s lots more Awesome out there.

References


  1. Photo by jet dela cruz on Unsplash↩︎

  2. Photo by Robert Linder on Unsplash↩︎

  3. Photo by Jordan Harrison on Unsplash↩︎

  4. Photo by Trust “Tru” Katsande on Unsplash↩︎

  5. Photo by Shinichiro Ichimura on Unsplash↩︎

  6. Photo by Frankie Lopez on Unsplash↩︎

  7. Photo by Mikhail McVerry on Unsplash↩︎

  8. Photo by Rubenz Arizta on Unsplash↩︎

  9. Photo by Girl with red hat on Unsplash↩︎