TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Tracing HTTP Requests with tcpflow

109 点作者 ananthakumaran超过 2 年前

8 条评论

imiric超过 2 年前
For a tool that understands TCP and HTTP conversations, the filter syntax is awfully similar to tcpdump&#x27;s, and having to use `grep -A 15` to filter specific requests seems clunky.<p>It&#x27;s good knowing this tool exists, but I think I&#x27;ll stick to tcpdump and Wireshark. In Wireshark it&#x27;s trivial to use the `http.request` filter to do this, and following the TCP conversation with decoded bodies, or specifying a TLS cert, is equally simple.
评论 #33587576 未加载
jimmyed超过 2 年前
There is also netpeek[1] which has better filtering capabilities and UX overall. It supports ngrep like bpf filters which we found useful.<p>1: <a href="https:&#x2F;&#x2F;github.com&#x2F;darshanime&#x2F;netpeek" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;darshanime&#x2F;netpeek</a>
thegabez超过 2 年前
This assumes you have shell and those tools installed via your Dockerfile. Best practice is to have a multi stage build and just have the working binary, keeping the image as light as possible.<p>So when do you make a fat image with debug tools and when do you keep it skinny?
评论 #33586644 未加载
ystad超过 2 年前
A thought. I would usually start with my application logs. Reverting to a tcp tool for a http app problem seems cobtrived
评论 #33583791 未加载
nhoughto超过 2 年前
This looks handy, better ergonomics than strace to just hook into http requests of a running process.<p>I wonder how it works with TLS if it’s working at the socket level..
评论 #33581746 未加载
评论 #33581363 未加载
_ZeD_超过 2 年前
in this space I have successfully used mitmproxy, charles and, with the best experience, fiddler<p>mitmproxy.org www.charlesproxy.com <a href="https:&#x2F;&#x2F;www.telerik.com&#x2F;fiddler&#x2F;fiddler-classic" rel="nofollow">https:&#x2F;&#x2F;www.telerik.com&#x2F;fiddler&#x2F;fiddler-classic</a>
评论 #33584102 未加载
29athrowaway超过 2 年前
There&#x27;s also termshark, a TUI for tshark inspired by Wireshark.<p>You also have mitmproxy which can be useful if TLS is involved.
aftbit超过 2 年前
Just because I know them better, I would have used `netstat -putln` and `tcpdump -i lo -n -A port 8000` to do the same thing. I&#x27;ll take a look at tcpflow and ss though - it&#x27;s always nice to know more tools.