![]() So how could I use wireshark to implement this? It's convenient to capture only query sql and very clearly displayed these query sql. After that you can add a custom column with the field name ‘mysql.query’ to have a list of queries that where executed. To filter out the mysql packets you just use the filter ‘mysql‘ or ‘mysql.query != “”‘ when you only want packets that request a query. Then I executed two query sql in mysql terminal select version() īut very disappointing I cannot find these two sql packets in wireshark So I installed a wireshark to capture these query sql send from local. ![]() Because we develop using remote Mysql server, so cannot check query sql easily, if use local server you can tail - f general_log_file to see which sql are executed when call some http interface. ![]()
0 Comments
Leave a Reply. |