Message Trace
Source: Wireshark
Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\grpc_pcap\grpc_gnmi_get.pcapng
Messages: 10
[00001] Frame 1 — 🔗 TCP (SYN, ECE, CWR)
⏱️ 2020-09-20T18:57:21.582153Z
💻 gNMI Client ➜ 🎯 gNMI Target
[00002] Frame 2 — 🔗 TCP (SYN, ACK, ECE)
⏱️ 2020-09-20T18:57:21.662794Z
🎯 gNMI Target ➜ 💻 gNMI Client
[00003] Frame 4 — ⚙ HTTP/2 SETTINGS
⏱️ 2020-09-20T18:57:21.663482Z
💻 gNMI Client ➜ 🎯 gNMI Target
[00004] Frame 6 — ⚙ HTTP/2 SETTINGS
⏱️ 2020-09-20T18:57:21.744911Z
🎯 gNMI Target ➜ 💻 gNMI Client
[00006] Frame 8 — 📡 gNMI Get
⏱️ 2020-09-20T18:57:21.745203Z
💻 gNMI Client ➜ 🎯 gNMI Target
[00007] Frame 9 — 📊 HTTP/2 WINDOW_UPDATE
⏱️ 2020-09-20T18:57:21.826722Z
🎯 gNMI Target ➜ 💻 gNMI Client
[00008] Frame 11 — 💓 HTTP/2 PING
⏱️ 2020-09-20T18:57:21.826981Z
💻 gNMI Client ➜ 🎯 gNMI Target
[00009] Frame 12 — 📡 gnmi.GetResponse
⏱️ 2020-09-20T18:57:21.909571Z
🎯 gNMI Target ➜ 💻 gNMI Client
[00010] Frame 14 — 🔗 TCP (FIN, ACK)
⏱️ 2020-09-20T18:57:21.910538Z
💻 gNMI Client ➜ 🎯 gNMI Target
[00011] Frame 16 — 🔗 TCP (FIN, ACK)
⏱️ 2020-09-20T18:57:22.093423Z
🎯 gNMI Target ➜ 💻 gNMI Client