Mysql Replay Module Save

A tcpcopy module for MySQL session replay

Project README

A TCPCopy module for MySQL Replay

mysql-replay-module is a TCPCopy module that can be used to replay MySQL sessions to support real testing of MySQL applications.

Please refer to TCPCopy for more details before reading the following.

Installation

Getting intercept installed on the assistant server

  1. git clone git://github.com/session-replay-tools/intercept.git
  2. cd intercept
  3. ./configure --with-resp-payload
  4. make
  5. make install

Getting tcpcopy installed on the online server

  1. git clone git://github.com/session-replay-tools/tcpcopy.git
  2. cd tcpcopy
  3. git clone git://github.com/session-replay-tools/mysql-replay-module.git
  4. ./configure --set-protocol-module=mysql-replay-module
  5. make
  6. make install

Usage guide

1) On the target server which runs MySQL applications:

  Set route commands to route response packets to the assistant server

    For example:

       Assume 10.110.12.18 is the IP address of the assistant server and 
    10.110.12.15 is the MySQL client IP address. We set the following route 
    command to route all responses to the 10.110.12.15 to the assistant server.

       route add -host 10.110.12.15 gw 10.110.12.18

2) On the assistant server which runs intercept(root privilege or the CAP_NET_RAW capability is required):

   ./intercept -F <filter> -i <device,> 
  
   Note that the filter format is the same as the pcap filter.
    
   For example:

      ./intercept -i eth0 -F 'tcp and src port 3306' -d

      intercept will capture response packets of the TCP based application which 
  listens on port 3306 from device eth0 

3) On the online source server (root privilege or the CAP_NET_RAW capability is required):

  a) set user password pair in conf/plugin.conf in the installion directory

    Format:
       user user1@password1,user2@password2,...,userN@passwordN;

    For example:
       user root@123456;    
    
  b) start tcpcopy
    ./tcpcopy -x localServerPort-targetServerIP:targetServerPort -s <intercept server,> 
  
    For example(assume 10.110.12.17 is the IP address of the target server):

      ./tcpcopy -x 3306-10.110.12.17:3306 -s 10.110.12.18 

      tcpcopy would capture MySQL packets(assume MySQL listens on 3306 port) on current 
  server, do the necessary modifications and send these packets to the target port 
  '3306' on '10.110.12.17'(the target MySQL), and connect 10.110.12.18 for asking 
  intercept to pass response packets to it.

Note

  1. Both MySQL instances on the target server and online server must have the same user accounts and their privileges although passwords could be different
  2. Only the complete sesssion could be replayed
  3. OpenSSL 1.1.0+ is currently unsupported.
  4. Currently, it does not support MySQL 8.0's caching_sha2_password yet. If you want to use MySQL 5.7 production flows to test MySQL 8.0, you should use mysql_native_password instead and assure that each user used in the test should also use the mysql_native_password plugin in user table.

Release History

  • 2017.03 v1.0 mysql-replay-module released

Bugs and feature requests

Have a bug or a feature request? Please open a new issue. Before opening any issue, please search for existing issues.

Copyright 2022 under the BSD license.

Open Source Agenda is not affiliated with "Mysql Replay Module" Project. README Source: session-replay-tools/mysql-replay-module
Stars
49
Open Issues
5
Last Commit
1 year ago

Open Source Agenda Badge

Open Source Agenda Rating