Skip to main content

A redis event sniffer and capture utility

Project description

# Redis Sniffer v1.0.0

## About

This sniffer is based on http://github.com/xupeng/redis-sa

This tool will monitor a specific port and interface for redis traffic and captures the commands being sent to Redis and/or formatted full TCP dump data. This can be used for analysis for debugging or for replaying the transactions as a way of doing real load/performance testing.

Redis Sniffer must be run locally on a Redis server.

## Installation

### Dependencies

There are 2 dependencies for Redis Sniffer 1. pypcap 2. dpkt

### Usage

Please Note: Redis Sniffer must be run as root/sudo since it has to bind to a network interface which is not allowed by non-privileged users.

sudo redis-sniffer -i <interface> -p <port>

The captured Redis traffic will be logged to 2 different files 1. full_output - This will be a formatted version of the pcap data that includes: process time, the client, request size, response size and the command 2. comm_output - This is just a list of all the Redis commands captured by Redis Sniffer. Each line in this file could be replayed without modification for simulated load testing/performance testing/tuning

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

redis-sniffer_1.0.0.tgz (31.3 kB view hashes)

Uploaded Source

Built Distribution

redis_sniffer-1.0.0-py2.7.egg (7.0 kB view hashes)

Uploaded Source

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page