Skip to content
This repository has been archived by the owner on May 10, 2022. It is now read-only.

mikhainin/tarantool-dissector

Repository files navigation

⚠️ WARNING: This repository is no longer active, support was moved to https://github.com/tarantool/tarantool-dissector

Tarantool protocol dissector

Tarantool is an in-memory computing platform. It uses binary protocol named IProto for communicating. See protocol description in documentation.

In Wireshark the user can control how protocols are dissected. Each protocol has its own dissector and user may add his own dissectors written in Lua. This dissector implemented for Tarantool binary protocol.

Wireshark

How to use

  • Setup Wireshark. See chapter Building and Installing Wireshark in documentation.
  • Put a Lua file with dissector and MessagePack.lua to a directory with plugins for Wireshark, directory depends on operating system, please refer to chapter Plugin folders. Note that Wireshark requires root privileges, make sure you are using plugin directory for a user that is used for running Wireshark. It possible to run Wireshark in terminal and pass Lua extension explicitly: wireshark -X lua_script:tarantool.dissector.lua or tshark -X lua_script:tarantool.dissector.lua -V.
  • If for some reason you still use Tarantool <= 1.5, use tarantool15.dissector.lua
  • Run Wireshark. By default Tarantool protocol dissector decodes TCP packets with port 3301. However one can change a port for dissector in Wireshark settings, see chapter Control Protocol dissection.

How to test

There is a script test.lua that uses Tarantool instance remotely via network and covers most part of IProto commands. For testing one can run Wireshark on local interface lo0 with filtering by port 3301 and run script with command tarantool test.lua.

Releases

No releases published

Packages

No packages published

Languages