Tarantool is an in-memory computing platform. It uses binary protocol named IProto for communicating. See protocol description in documentation.
In Wireshark the user can control how protocols are dissected. Each protocol has its own dissector and user may add his own dissectors written in Lua. This dissector implemented for Tarantool binary protocol.
- Setup Wireshark. See chapter Building and Installing Wireshark in documentation.
- Put a Lua file with dissector and
MessagePack.lua
to a directory with plugins for Wireshark, directory depends on operating system, please refer to chapter Plugin folders. Note that Wireshark requires root privileges, make sure you are using plugin directory for a user that is used for running Wireshark. It possible to run Wireshark in terminal and pass Lua extension explicitly:wireshark -X lua_script:tarantool.dissector.lua
ortshark -X lua_script:tarantool.dissector.lua -V
. - If for some reason you still use Tarantool <= 1.5, use
tarantool15.dissector.lua
- Run Wireshark. By default Tarantool protocol dissector decodes TCP packets with port 3301. However one can change a port for dissector in Wireshark settings, see chapter Control Protocol dissection.
There is a script test.lua
that uses Tarantool instance remotely via network
and covers most part of IProto commands. For testing one can run Wireshark on
local interface lo0
with filtering by port 3301 and run script with command
tarantool test.lua
.