.TH "MONGOSNIFF" "1" "March 14, 2013" "2.2.3" "mongodb-manual" .SH NAME mongosniff \- MongoDB . .nr rst2man-indent-level 0 . .de1 rstReportMargin \\$1 \\n[an-margin] level \\n[rst2man-indent-level] level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] - \\n[rst2man-indent0] \\n[rst2man-indent1] \\n[rst2man-indent2] .. .de1 INDENT .\" .rstReportMargin pre: . RS \\$1 . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] . nr rst2man-indent-level +1 .\" .rstReportMargin post: .. .de UNINDENT . RE .\" indent \\n[an-margin] .\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] .nr rst2man-indent-level -1 .\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] .in \\n[rst2man-indent\\n[rst2man-indent-level]]u .. .\" Man page generated from reStructuredText. . .SH SYNOPSIS .sp \fI\%mongosniff\fP provides a low\-level operation tracing/sniffing view into database activity in real time. Think of \fI\%mongosniff\fP as a MongoDB\-specific analogue of \fBtcpdump\fP for TCP/IP network traffic. Typically, \fI\%mongosniff\fP is most frequently used in driver development. .IP Note \fI\%mongosniff\fP requires \fBlibpcap\fP and is only available for Unix\-like systems. Furthermore, the version distributed with the MongoDB binaries is dynamically linked against aversion 0.9 of \fBlibpcap\fP. If your system has a different version of \fBlibpcap\fP, you will need to compile \fI\%mongosniff\fP yourself or create a symbolic link pointing to \fBlibpcap.so.0.9\fP to your local version of \fBlibpcap\fP. Use an operation that resembles the following: .sp .nf .ft C ln \-s /usr/lib/libpcap.so.1.1.1 /usr/lib/libpcap.so.0.9 .ft P .fi .sp Change the path\(aqs and name of the shared library as needed. .RE .sp As an alternative to \fI\%mongosniff\fP, Wireshark, a popular network sniffing tool is capable of inspecting and parsing the MongoDB wire protocol. .SH OPTIONS .INDENT 0.0 .TP .B mongosniff .UNINDENT .INDENT 0.0 .TP .B \-\-help Returns a basic help and usage text. .UNINDENT .INDENT 0.0 .TP .B \-\-forward <:port> Declares a host to forward all parsed requests that the \fI\%mongosniff\fP intercepts to another \fBmongod\fP instance and issue those operations on that database instance. .sp Specify the target host name and port in the \fB<:port>\fP format. .sp To connect to a replica set, you can specify the replica set seed name, and a seed list of set members, in the following format: .sp .nf .ft C /<:port>,,... .ft P .fi .UNINDENT .INDENT 0.0 .TP .B \-\-source , , Specifies source material to inspect. Use \fB\-\-source NET [interface]\fP to inspect traffic from a network interface (e.g. \fBeth0\fP or \fBlo\fP.) Use \fB\-\-source FILE [filename]\fP to read captured packets in \fIpcap\fP format. .sp You may use the \fB\-\-source DIAGLOG [filename]\fP option to read the output files produced by the \fI\-\-diaglog\fP option. .UNINDENT .INDENT 0.0 .TP .B \-\-objcheck Modifies the behavior to \fIonly\fP display invalid BSON objects and nothing else. Use this option for troubleshooting driver development. This option has some performance impact on the performance of \fI\%mongosniff\fP. .UNINDENT .INDENT 0.0 .TP .B Specifies alternate ports to sniff for traffic. By default, \fI\%mongosniff\fP watches for MongoDB traffic on port 27017. Append multiple port numbers to the end of \fI\%mongosniff\fP to monitor traffic on multiple ports. .UNINDENT .SH USAGE .sp Use the following command to connect to a \fBmongod\fP or \fBmongos\fP running on port 27017 \fIand\fP 27018 on the localhost interface: .sp .nf .ft C mongosniff \-\-source NET lo 27017 27018 .ft P .fi .sp Use the following command to only log invalid \fIBSON\fP objects for the \fBmongod\fP or \fBmongos\fP running on the localhost interface and port 27018, for driver development and troubleshooting: .sp .nf .ft C mongosniff \-\-objcheck \-\-source NET lo 27018 .ft P .fi .SH BUILD MONGOSNIFF .sp To build \fBmongosniff\fP yourself, Linux users can use the following procedure: .INDENT 0.0 .IP 1. 3 Obtain prerequisites using your operating systems package management software. Dependencies include: .INDENT 3.0 .IP \(bu 2 \fBlibpcap\fP \- to capture network packets. .IP \(bu 2 \fBgit\fP \- to download the MongoDB source code. .IP \(bu 2 \fBscons\fP and a C++ compiler \- to build \fI\%mongosniff\fP. .UNINDENT .IP 2. 3 Download a copy of the MongoDB source code using \fBgit\fP: .sp .nf .ft C git clone git://github.com/mongodb/mongo.git .ft P .fi .IP 3. 3 Issue the following sequence of commands to change to the \fBmongo/\fP directory and build \fI\%mongosniff\fP: .sp .nf .ft C cd mongo scons mongosniff .ft P .fi .UNINDENT .IP Note If you run \fBscons mongosniff\fP before installing \fBlibpcap\fP you must run \fBscons clean\fP before you can build \fI\%mongosniff\fP. .RE .SH AUTHOR MongoDB Documentation Project .SH COPYRIGHT 2011-2013, 10gen, Inc. .\" Generated by docutils manpage writer. .