Unsolved

This post is more than 5 years old

222 Posts

2959

January 20th, 2011 11:00

Trace HTTP Headers

Occassionally, you may want to examine the HTTP headers being sent to Atmos.  Examing all of the network packets is not particularly useful though.  This can also be challenging depending on the OS and HTTP client that's making the requests.

Here's a small snippet that uses tshark (part of Wireshark) to continuously display all the HTTP headers:

tshark -i eth1 -f 'host 1.2.3.4' -R 'http' -S -V -l | awk '/^[HL]/ {p=30} /^[^ HL]/ {p=0} /^ / {--p} {if (p>0) print}'

Replace eth1 with the proper interface and 1.2.3.4 with the Atmos host with which you're communicating.  This works well on Linux --- YMMV on Windows.

via Andy

18 Posts

March 21st, 2011 18:00

bump

Top