This readme provides a basic set of information about CacheSplain. CacheSplain is MIT licensed. Please see LICENSE.txt for details.
It helps if you have .NET already installed (Mono, MS CLR), libpcap installed (via WireShark or otherwise) and have some familiarity with the Memcached binary protocol.
CacheSplain is a utility, written in C#, that helps you make sense of what your Memcache clients/servers are doing at a network level. CacheSplain takes either a live network interface or a prior capture via tcpdump, WireShark, or other such utility and analyzes it for Memcached binary protocol traffic. Each TCP packet is inspected and broken down into its individual operations, then reconstituted into lightweight data structures that make the traffic easier to understand. Once the traffic is broken down, it can be stored in something like MongoDB (TBD) or piped into something like LogStash (TBD).
While it's true there are a number of Memcached-related utilities, they all seemed to fall short of what I was looking for:
- WireShark - Has a Memcached protocol analyzer, but is somewhat cumbersome, has trouble with pipelined operations (multiple operations in a single TCP packet). Can be rather slow with larger captures, can be somewhat painful on a Mac (though getting better).
- Etsy's McTop - Doesn't support the binary protocol, extremely limited, tends to drop packets under load. Incredibly limited in terms of what it tracks.
- Memcache Top - does what it says on the tin... it's Top, which doesn't really provide details as to why you're doing what you're doing.
- MemKeys - didn't quite do what I needed, and since it's written in C++ I thought I'd avoid hacking on it...
- The official links - A lot of these were different types of monitoring or incomplete, or had significant caveats - many are just plain abandoned.
McTop was actually the most useful project (for my needs) I'd found before I started writing CacheSplain, and I'd originally hacked it to support the binary protocol using a combination of the pull requests on the project. This still dropped a lot of packets, so it seemed that it was time to do what all good novices do and write something from scratch...
So why choose C#? The short answer is that I wasn't particularly happy with the PCAP library support in Java: both of the major contenders I tried had different issues. Ruby was out due to performance (not... that I'm great with it anyway), and I didn't really want to deal with either C or C++.
That's when I remembered that ShapPcap was supposed to be a pretty decent, fairly well performing library. It's cross platform and works quite well on Mono. SharpPcap supports filtering, it supports PCAP files for both reading and writing, and it's got some great documentation on CodeProject.
I have yet to try this on incredibly large dumps, so it's possible that it has issues scaling to gigs and terabytes of data. So far it's handled my ~500mb dumps just fine. I would highly recommend using tcpdump in your production environment and replaying the files in CacheSplain.
Before you try and build or run CacheSplain you should install WireShark for your platform. This should ensure that you have the appropriate libraries (namely libpcap). This may be addressed at a later time, hopefully working out of the box.
Once you have WireShark installed, you should be able to build the project using an IDE such as Visual Studio or MonoDevelop, or by using something like XBuild on Mono. The build should work out of the box (check the build status top of the page), and you should be able to run the resulting executable. Please note that the App.config is only used for configuring NLog, and all arguments are passed on the command line.
If you are planning on running this on anything but Windows, make sure that you have Mono installed. If you can't find a package for your OS/distro, you can always compile your own from source easily enough from their GitHub repo.
nuget restore cachesplain.sln
xbuild cachesplain.sln /target:Rebuild /p:Configuration=release /p:PlatformTarget=x86
Don't have NuGet for some reason? Grab the Command-Line Utility from NuGet.org. You'll have to prefix it with "mono" (which should hopefully be on your path...).
So far I've tested on both Windows 7 and OSX. I've previously installed WireShark on both machines.
The issues found so far are:
- Localhost snooping (lo0) doesn't seem to work on OSX due to PacketDotNet not implementing null link layer encapsulation. Use a PCAP file or sniff a remote machine to get around this.
- The device names on Windows can be incredibly cumbersome to copy/paste.
- Haven't tested on Linux.
As mentioned above, you will need to obtain Mono if you wish to run this on an operating system other than Windows. If you are running this on Windows, please make sure you have .NET 4.5 installed.
Please note that these examples were written from my Mac, which is why you see the commands prefixed with "mono" - you can omit this if you're not using Mono (IE: Windows).
$ mono cachesplain.exe --help
Usage: cachesplain [OPTIONS]
Start listening for packets on a specific port for a given interface.
Options:
-d enumerate the network devices available for
listening.
-i[=NAME] the NAME of the interface to listen on. Will be
ignored if an input PCAP file is specified.
-p[=PORT] the PORT to listen on.
this must be an integer or a range as specified
by port1...portN (inclusive). Defaults to 11211
if not otherwise specified. To specify multiple
ports or ranges, separate them via commas.
-h, --help show this message and exit
-f[=VALUE] a PCAP file to use instead of a device. If
specified, will be used as the input device
instead of specified interface.
-x[=VALUE] An optional app-level filter expression to filter
out packets (IE: opcode, magic, flags etc).
Please note this is run across a parsed
MemcachedBinaryOperation.
It should go without saying that this documentation (README.md) may be out of date, and that you should always refer to the built in help option. If there are any conflicts, please trust whatever asking for help (-h, or --help) tells you.
$ mono cachesplain.exe -i=en1 -p=11212
Starting capture... SIGTERM to quit.
At this point you'd start reading your out.log. This mode will read until SIGTERM is caught by the process (ex: control+c).
$ mono cachesplain.exe -i=en1 -p=11211,11212,11213...11216
Starting capture... SIGTERM to quit.
Instead of a single port, passing in a comma-separated set of ports will cause CacheSplain to listen to multiple ports simultaneously. Optionally, a port range can be specified startValue...endValue. In the example above, the range given is expanded to 11213, 11214, 11215, 11216 - that is to say, it's inclusive.
For listening to multiple devices it is recommended to do so from multiple instances of CacheSplain: one for each device.
$ mono cachesplain.exe -f=/Users/kog/dump.pcap
Starting capture... SIGTERM to quit.
At this point CacheSplain will read through all the packets in your PCAP dump and attempt to pick out the relevant Memcached traffic on the specified port. The port is incredibly vital here because you may have a really dirty cap file, including any amount of random traffic (DNS, HTTP etc.).
This is the recommended use case in a live, functional, production environment.
$ cachesplain.exe -d
interface: Name: rpcap://\Device\NPF_{GUID-HERE}
FriendlyName: Local Area Connection
GatewayAddress: 192.168.1.1
Description: Network adapter 'Some sort of device name' on local host
Addresses:
Addr: 192.168.1.2
Netmask: 255.255.255.0
Broadaddr: 255.255.255.255
Addresses:
Addr: HW addr: <MAC ADDRESS>
Flags: 0
...
This is mainly useful on Windows since you'll need the interface name - all of it including the "rpcap" portion of "rpcap://\Device\NPF_{GUID-HERE}", where the GUID is whatever you get back from your actual device. This is why the example is being shown from a Windows host. On OSX or Linux you can generally use whatever device name you pick up from ifconfig
.
CacheSplain incorporates Solenoid-Expressions, a fork of Spring.NET's implementation of SPEL (Spring Expression Language) in order to allow users to do fine grained, post parsing filtering of operations.
This means that if you know what the MemcachedBinaryOperation (class diagram) and associated object model look like, you can filter out the noise that you don't care about analyzing. Say you've got a keep-alive at your app level that constantly sends "version" calls you don't care about, you can pass in an expression to ignore these - with something like "Opcode == OpCode.Version"
.
The filter works by evaluating the expression as a boolean condition, and only allowing operations through that are true. This means that if you have an expression that can't be parsed (IE: it's random typing), it'll be ignored. Likewise, if you write an expression that can't be parsed to a boolean, it won't filter anyting either. The object input to the expression evaluation is the MemcachedBinaryOperation itself.
When writing filters it's helpful to remember that you're mainly doing property accesses as if you're looking at the MemcachedBinaryOperation as your root object. As in the example above, the "this" is implied on the left-hand side when you say "Opcode" - it means more or less this.OpCode
.
$ mono cachesplain.exe -i=en1 -p=11211 -x="Key=='SOMEKEY'"
Starting capture... SIGTERM to quit.
This will filter out requests that do not match the given key. Unfortunately it may not be as useful as you'd think: the binary protocol requires most operations that take a key for the request not to return the key as part of the response. The exceptions to this rule are the GetK and GetKQ - get key, get key/quiet - operations, which a given client may or may not use.
If you can't trigger your client to send GetK/GetKQ requests, you may be able to track the opaque/IP/port of the get request to the corresponding response. This may get a little tricky in a high volume, clustered situation.
$ mono cachesplain.exe -i=en1 -p=11211 -x="Opcode == Opcode.get"
Starting capture... SIGTERM to quit.
This will filter out any traffic that is not a get operation (request or response). The end result is that your out.log will contain only get operations - or nothing if there are no get operations.
Read the Opcode.cs source for other things you can filter on.
$ mono cachesplain.exe -i=en1 -p=11211 -x="Magic == Magic.received"
Starting capture... SIGTERM to quit.
By investigating the "magic" from the header, we can tell what direction the traffic is going in. Requested is from the client to the server, received is the inverse (server -> client). This can be incredibly handy if you're looking at something like traffic on a server or some sort of proxy/network appliance.
Check out the MemcachedBinaryOperation.cs source for other things you can filter on.
$ mono cachesplain.exe -i=en1 -p=11211 -x="Magic == Magic.requested"
Starting capture... SIGTERM to quit.
As you can tell, this is pretty much the inverse of what you see in the previous example...
$ mono cachesplain.exe -i=en1 -p=11211 -x="Header.totalBodyLength > 300"
Starting capture... SIGTERM to quit.
In this case I've decided that any operation larger than 300 bytes is "large." Please note that this is at the individual operation level, and not at the packet level - packets can have lots of individual, smaller operations (this is called pipelining).
It's also worth noting that many Memcached clients will have a compression threshold that tells the client to compress objects over a given threshold, so this value may be especially relevant if you think your client is broken. Remember that compression is a time/size trade off: smaller objects, more CPU time on the clients.
Every operation is given a number that is known as the opaque - this value is generated by the client and attached to a given outgoing operation. You can consider this something like a correlation ID. This is called the opaque because it is completely opaque to Memcached: it reads the value from the input event and copies it back into the response event.
An interesting side effect is that you can do something like this:
$ mono cachesplain.exe -i=en1 -p=11211 -x="Header.opaque == 80159050"
Starting capture... SIGTERM to quit.
You'd probably never need to do this, unless you were doing something like writing your own client.
$ mono cachesplain.exe -i=en1 -p=11211 -x="Extras != null and Extras.expiration >= 3600"
Starting capture... SIGTERM to quit.
Note that because the .NET implementation of SPEL does not support the null-safe operator, we need to do all kinds of annoying null checks (Solenoid issue #1).
Looking at expiration values can be handy for a variety of reasons:
- Memcached uses an expiration of 0xffffffff to cause increments/decrements to return not found if the key is unknown (as opposed to setting it to a default value).
- You may not want your objects to live quite so long. You may not intend for them to do so either.
- Values over 2,592,000 (30 days in seconds) are a Unix timestamp literal to expire at.
- 0 never expires (though, can still be evicted).
If you want more information on constructing expressions, please see the Solenoid documentation at Solenoid-Expressions.
There are a few aggregate bits of information on the MemcachedBinaryPacket container, which contains the various operations for the logical TCP packet. This includes things like the source/destination address, the time, the size and the number of operations.
The syntax for accessing the packet is a little different as its bound to a variable (rather than the object). You'll have to access anything on the container packet via the literal string #packet
.
$ mono cachesplain.exe -i=en1 -p=11211 -x="#packet.operationCount > 5"
Starting capture... SIGTERM to quit.
this would help you find requests that are pipelined. This can useful for looking for bulk gets and other optimizations.
$ mono cachesplain.exe -i=en1 -p=11211 -x="#packet.packetSize > 92"
Starting capture... SIGTERM to quit.
The expression above would filter out any packets smaller than 92 bytes. The value is calculated based on the remaineder of the packet after all the other headers, that is, up until the end of the TCP boundary - where parsing for our protocol starts.
The difference between the size of the packet and the size of the operation are mainly important when pipelining occurs.
If you want to based on the source of the TCP packet, you'll do something like this:
$ mono cachesplain.exe -i=en1 -p=11211 -x="#packet.sourceAddress =='192.168.1.1'"
Starting capture... SIGTERM to quit.
It's important to remember that Memcached is a request/response protocol, and that the source address is the TCP source address. The source on a request will be the client, the source on a response will be the server (or proxy, or networking appliance).
Pretty much the opposite of the above example:
$ mono cachesplain.exe -i=en1 -p=11211 -x="#packet.destinationAddress == '192.168.1.1'"
Starting capture... SIGTERM to quit.
In this case, the "relevant" port means the port that you asked CacheSplain to listen to traffic on. We only record this port, since the other side that gets bound to isn't particularly useful - and in the few cases it is, can be found via other methods.
You'd filter on port like so:
$ mono cachesplain.exe -i=en1 -p=11211 -x="#packet.port == 11211"
Starting capture... SIGTERM to quit.
This won't be immediately useful as CacheSplain only looks for traffic on a single port. This is issue #8.
If you want to filter based on the time of the packet in the stream - say you're looking at a surge in traffic that started at X time - you'd wind up doing something like:
$ mono cachesplain.exe -i=en1 -p=11211 -x="#packet.packetTime > date('2015-01-10 11:47:00', 'yyyy-MM-dd HH:mm:ss')"
Starting capture... SIGTERM to quit.
The time formatting is also explained a bit in the Solenoid docs. Note that the time is UTC, not local.
First and foremost, Dormando - the guy who maintains Memcached - has been incredibly helpful in terms of answering questions and helping troubleshoot issues. Maintaining Memcached is not his day job, and people do tend to be quite impolite, yet he still found time to respond. Much appreciated.
It's also worth noting that the BinaryHelper class is more or less lifted wholesale from the Apache2 licensed .NET Memcached client EnyimMemcached. I use the code to do some bit twiddling on multi-byte header fields. I have no idea if EnyimMemcached is any good as I've never used it, but the bit twiddling is mighty fine. No sense in reinventing the wheel if someone's already done it better than you will.
Thanks to JakeSays for paring down Spring.NET's expression support into Solenoid-Expressions. It really cuts down on the size of dependencies... Here's hoping he'll succeed with his next-gen re-write.