9/1/2023 0 Comments Tshark command line examplesThe examples you’ll see are snippets from capturing real network traffic, with sensitive data changed or redacted, to remain GDPR-compliant ). The app leverages a PostgreSQL database and the connections to it are managed by PgBouncer, which also resides in the container, listening on it’s default port 6432. Have the Rails app running in a bare-bones Debian-based Docker container (no X Window System). The idea was to build the command using tshark until we had our data filtered out. ![]() Our task was to look at the traffic between the Rails app and PgBouncer on a remote machine without a graphical environment. We weren’t sure where this data was being stripped, but there were only a couple of options: In the Rails app, PgBouncer, or it was being stripped by PostgreSQL itself before logging. Our PostgreSQL logs were being stripped of trailing C-style comments containing a GDPR-relevant ID. ![]() This short article/how-to will show you how to solve a real issue.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |