This package provides device specific bindings for interacting with Riverbed Wireshark devices as part of the Riverbed SteelScript for Python.
The following example shows how to use pcap_query.py
to gain insights on how your HTTP traffic is flowing.
pcap_query.py
can be found inside the steelscript-workspace/wireshark-examples/
directory.
$ python pcap_query.py my_http_pcap_file.pcap \
-c "http.request.uri,http.request.method,http.response.code,http.server,http.prev_request_in,http.time"
returns:
http.request.uri | http.request.method | http.response.code | http.server | http.prev_request_in | http.time |
---|---|---|---|---|---|
/ | GET | None | None | None | None |
None | None | 200 | Apache/2.2.14 | None | 0.080266 |
/favicon.ico | GET | None | None | 5 | None |
None | None | 404 | Apache/2.2.14 | 5 | 0.041042 |
/bhratach | GET | None | None | 9 | None |
None | None | 301 | Apache/2.2.14 | 9 | 0.000346 |
/bhratach/ | GET | None | None | 13 | None |
None | None | 200 | Apache/2.2.14 | 13 | 0.066848 |
Copyright (c) 2019-2024 Riverbed Technology, Inc.
SteelScript-Wireshark is licensed under the terms and conditions of the MIT License accompanying the software ("License"). SteelScript-Wireshark is distributed "AS IS" as set forth in the License.