![]() ![]() ![]() I tried your command, please see below #terminal 1Īnd tshark -i lo0 -Y "mand=3" -T fields -e mysql.query is same with tshark -i lo -Y "mand=3" also nothing output. So how could I use wireshark to implement this? It's convenient to capture only query sql and very clearly displayed these query sql. After that you can add a custom column with the field name ‘mysql.query’ to have a list of queries that where executed. To filter out the mysql packets you just use the filter ‘mysql‘ or ‘mysql.query != “”‘ when you only want packets that request a query. ![]() Then I executed two query sql in mysql terminal select version() īut very disappointing I cannot find these two sql packets in wireshark So I installed a wireshark to capture these query sql send from local. Because we develop using remote Mysql server, so cannot check query sql easily, if use local server you can tail - f general_log_file to see which sql are executed when call some http interface. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |