Tools » History » Version 1
Version 1/19
-
Next ยป -
Current version
J. Moringen, 07/03/2011 12:57 PM
initial version
Tools¶
Introspection¶
Logger¶
The RSB logger participates in a channel using one or more transports and displays all events published on the channel using a configurable style.
Implementation Language | Project | Repository Link |
---|---|---|
C++ | rsb-cpp-tools | source:trunk/cpp/tools |
Common Lisp | cl-rsb-tools | source:trunk/cl-rsb-tools |
Example:
In the following example, the C++ version of the logger is instructed to participate in the channel designated by the root scope /
. This means that the logger will display all events which are receivable using its configured transports. In this example, the configured transports depend on the RSB configuration file and environment variables.
[jmoringe@azurit logger]$ ./rsblogger --format detailed / Event Scope / Id ac5f449c-4aa1-4b03-a9e2-3fac7d38e651 Type bytearray Origin ab6e3a17-e11f-4c89-8c07-606a009e8439 Timestamps Create 2011-Jul-03 12:51:11.802849+??:?? Send 2011-Jul-03 12:51:11.802950+??:?? Receive 2011-Jul-03 12:51:11.810332+??:?? Deliver 2011-Jul-03 12:51:11.810572+??:?? Payload (bytearray, length 100000) 0x0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0017 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x002e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0045 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... ------------------------------------------------------------------------------- Event Scope / Id 3fd721ef-6e7c-4e81-bd5f-ff215b2b965f Type std::string Origin 8e07e02a-0dee-44a2-8926-cc65c0285410 Timestamps Create 2011-Jul-03 12:51:20.102403+??:?? Send 2011-Jul-03 12:51:20.102482+??:?? Receive 2011-Jul-03 12:51:20.105319+??:?? Deliver 2011-Jul-03 12:51:20.105404+??:?? Payload (std::string, length 3) foo -------------------------------------------------------------------------------
System-level and Debugging Tools¶
Spread Sniffer¶
The Spread sniffer tool allows debugging low-level communication when the Spread transport is used. It displays raw payloads of Spread messages and, if possible, the corresponding decoded Notification
objects.
Example:
[jmoringe@azurit build]$ ./spread-sniffer 0000 12 10 73 F4 31 91 9D C2 48 C4 9C A9 92 33 03 ED 2A AB 32 05 2F 66 6F 6F 2F 0019 3A 0C 75 74 66 2D 38 2D 73 74 72 69 6E 67 4A 03 62 61 72 58 01 60 00 7A 24 0032 0A 10 62 AB 33 5F 9A F7 4A FE B2 D1 86 7B 81 3D 60 26 10 95 99 B0 85 FF E4 004B A9 02 18 CB 99 B0 85 FF E4 A9 02 #<NOTIFICATION {10046DFF41}> Version : 31 2E 30 ("1.0") Id : 73 F4 31 91 9D C2 48 C4 9C A9 92 33 03 ED 2A AB Scope : 2F 66 6F 6F 2F ("/foo/") Wire-Schema : 75 74 66 2D 38 2D 73 74 72 69 6E 67 ("utf-8-string") Data : 62 61 72 ("bar") Meta-Data : #<META-DATA {10047D8681}> Sender-Id : 62 AB 33 5F 9A F7 4A FE B2 D1 86 7B 81 3D 60 26 Create-Time : 1309689890213013 Send-Time : 1309689890213067 Receive-Time: 0 Deliver-Time: 0 User-Times : <empty sequence> User-Infos : <empty sequence> Num-Data-Parts: 1 Data-Part : 0 Method : <empty sequence>