Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

A tcpcopy module for replaying MySQL sessions with skip-grant-table enabled.

License

Unknown, Unknown licenses found

Licenses found

Unknown
LICENSE
Unknown
COPYING
NotificationsYou must be signed in to change notification settings

session-replay-tools/mysql-sgt-replay-module

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

28 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Themysql-sgt-replay-module is a TCPCopy extension designed to replay MySQL sessions, enabling realistic testing of MySQL applications.

For detailed information, please consultTCPCopy before proceeding.

Installation

Installingintercept on the Assistant Server

  1. git clone git://github.com/session-replay-tools/intercept.git
  2. cd intercept
  3. ./configure
  4. make
  5. make install

Installingtcpcopy on the Online Server

  1. git clone git://github.com/session-replay-tools/tcpcopy.git
  2. cd tcpcopy
  3. git clone git://github.com/session-replay-tools/mysql-sgt-replay-module.git
  4. ./configure --set-protocol-module=mysql-sgt-replay-module
  5. make
  6. make install

Usage Guide

1.On the Target Server Running MySQL Applications:

a) Configure Routing to Direct Response Packets to the Assistant Server

For example, assuming10.110.12.18 is the IP address of the assistant server and10.110.12.15 is the MySQL client IP address, use the following route command to direct all responses from10.110.12.15 to the assistant server:

route add -host 10.110.12.15 gw 10.110.12.18

b) Start MySQL with--skip-grant-tables

2.On the Assistant Server Runningintercept (Root Privilege or CAP_NET_RAW Capability Required):

./intercept -F <filter> -i <device>

Note that the filter format is the same as the pcap filter. For example:

./intercept -i eth0 -F 'tcp and src port 3306' -d

In this example,intercept will capture response packets from a TCP-based application listening on port 3306, using the eth0 network device.

Please note thatip_forward is not enabled on the assistant server.

3)On the Online Source Server (Root Privilege or CAP_NET_RAW Capability Required):

./tcpcopy -x localServerPort-targetServerIP:targetServerPort -s <intercept server> [-c <ip range>]

For example (assuming 10.110.12.17 is the IP address of the target server):

./tcpcopy -x 3306-10.110.12.17:3306 -s 10.110.12.18

tcpcopy captures MySQL packets (assuming MySQL listens on port 3306) on the current server, modifies them as needed, and forwards them to port 3306 on10.110.12.17 (the target MySQL server). It also connects to10.110.12.18 to request thatintercept forwards the response packets to it.

Note

  1. Only the complete sesssion could be replayed
  2. Currently, it does not support MySQL 8.0 yet.
  3. For additional assistance, visittcpcopy.

Release History

  • 2017.03 v1.0 mysql-sgt-replay-module released
  • 2024.09 v1.0 Open source fully uses English

Bugs and Feature Requests

Have a bug or a feature request?Please open a new issue. Before opening any issue, please search for existing issues.

Copyright and License

Copyright 2024 underthe BSD license.

About

A tcpcopy module for replaying MySQL sessions with skip-grant-table enabled.

Topics

Resources

License

Unknown, Unknown licenses found

Licenses found

Unknown
LICENSE
Unknown
COPYING

Stars

Watchers

Forks

Packages

No packages published

Contributors2

  •  
  •  

Languages


[8]ページ先頭

©2009-2025 Movatter.jp