Idea ID 2806885
when running service discovery we need to map processes that are listening on IPv6.
ASM_Enhanced Package, asm_Disc_TCP.py script.
When running netstat -nap we get the list of processes, like:
tcp 0 0 127.0.0.1:3030 0.0.0.0:* LISTEN 3288/ruby
tcp6 0 0 :::5009 :::* LISTEN 3373/dockerd
This tcp6 line is not processes and we cannot continue Service Discovery from that endpoint.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.