| From: | Richard Combs <rncombs(at)covad(dot)net> |
|---|---|
| To: | Philippe Lang <philippe(dot)lang(at)attiksystem(dot)ch> |
| Cc: | "Pgsql-Odbc (E-Mail)" <pgsql-odbc(at)postgresql(dot)org> |
| Subject: | Re: Sniffer to trace ODBC calls? |
| Date: | 2003-12-11 17:58:32 |
| Message-ID: | 3FD8B048.3090204@covad.net |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-odbc |
If my memory serves me, you were asking if there was a specific SQL
"sniffer". None that I know of per se. However my solution - use
ethereal (www.ethereal.com - just download it, it's free), then set the
filter to the tcp port for postgresql. If you don't mind reading and
interpreting traces, you'll see what is going to and from your server.
HTH
Philippe Lang wrote:
>... server-side, but I just wanted to make sure with an SQL Sniffer. I don't know exactly how access exactly filters data.
>
>
>
>
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Greg Campbell | 2003-12-12 20:47:43 | Port blocked by iptables firewall |
| Previous Message | Giovanni Zito | 2003-12-11 13:31:44 | Unexpected result for SQLGetTypeInfo for SQL_TYPE_TIMESTAMP |