Hello, I am pleased to announce an alpha version of the Ceph Wireshark Dissector. As some you you may know I am working on this dissector as a GSOC project this summer. I have gotten some initial work completed and wanted to share in case someone finds it useful. So far the dissector can parse the protocol and display the messages, however there are currently very few messages that are dissected themselves. This means that you can see who is sending what messages but the contents of those messages will just be binary data. I imagine that this basic level of dissection will still be useful to some people, especially those working on the network protocol as they can see exactly what is being sent, and sysadmins who can gain useful information from just the message types. You can find the current code on my github account[0] in the "ceph" branch. You can also download a tarball[1] if you prefer. The code should build using CMake although you may need to add the -DDISABLE_WERROR=1 flag. [0] https://github.com/kevincox/wireshark/tree/ceph [1] https://github.com/kevincox/wireshark/archive/ceph.tar.gz Any feedback would be appreciated, especially things that are not being dissected properly or that can be improved. Also, I am looking for captures of ceph network traffic. If you could provide captures it would allow be to focus on the messages that are being used the most and implement those first. Please be careful however, and ensure there is no sensitive information in your capture. Captures can be uploaded here[2] or mailed to me directly. [2] https://seafile.kevincox.ca/u/d/2dd934002d/ Cheers, Kevin
Attachment:
signature.asc
Description: OpenPGP digital signature