A redis event sniffer and capture utility
Project description
# Redis Sniffer v1.0.0
## About
This sniffer is based on http://github.com/xupeng/redis-sa
This tool will monitor a specific port and interface for redis traffic and captures the commands being sent to Redis and/or formatted full TCP dump data. This can be used for analysis for debugging or for replaying the transactions as a way of doing real load/performance testing.
Redis Sniffer must be run locally on a Redis server.
## Installation
### Dependencies
There are 2 dependencies for Redis Sniffer 1. pypcap 2. dpkt
### Usage
Please Note: Redis Sniffer must be run as root/sudo since it has to bind to a network interface which is not allowed by non-privileged users.
sudo redis-sniffer -i <interface> -p <port>
The captured Redis traffic will be logged to 2 different files 1. full_output - This will be a formatted version of the pcap data that includes: process time, the client, request size, response size and the command 2. comm_output - This is just a list of all the Redis commands captured by Redis Sniffer. Each line in this file could be replayed without modification for simulated load testing/performance testing/tuning
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.