mirror of
https://github.com/LCTT/TranslateProject.git
synced 2025-02-03 23:40:14 +08:00
Merge pull request #2740 from wwy-hust/master
[Translated] 20150112 What are useful command-line network monitors on Linux.md
This commit is contained in:
commit
c6d2b3d527
@ -1,137 +0,0 @@
|
|||||||
translating by wwy-hust
|
|
||||||
|
|
||||||
What are useful command-line network monitors on Linux
|
|
||||||
================================================================================
|
|
||||||
Network monitoring is a critical IT function for businesses of all sizes. The goal of network monitoring can vary. For example, the monitoring activity can be part of long-term network provisioning, security protection, performance troubleshooting, network usage accounting, and so on. Depending on its goal, network monitoring is done in many different ways, such as performing packet-level sniffing, collecting flow-level statistics, actively injecting probes into the network, parsing server logs, etc.
|
|
||||||
|
|
||||||
While there are many dedicated network monitoring systems capable of 24/7/365 monitoring, you can also leverage command-line network monitors in certain situations, where a dedicated monitor is an overkill. If you are a system admin, you are expected to have hands-on experience with some of well known CLI network monitors. Here is a list of **popular and useful command-line network monitors on Linux**.
|
|
||||||
|
|
||||||
### Packet-Level Sniffing ###
|
|
||||||
|
|
||||||
In this category, monitoring tools capture individual packets on the wire, dissect their content, and display decoded packet content or packet-level statistics. These tools conduct network monitoring from the lowest level, and as such, can possibly do the most fine-grained monitoring at the cost of network I/O and analysis efforts.
|
|
||||||
|
|
||||||
1. **dhcpdump**: a comman-line DHCP traffic sniffer capturing DHCP request/response traffic, and displays dissected DHCP protocol messages in a human-friendly format. It is useful when you are troubleshooting DHCP related issues.
|
|
||||||
|
|
||||||
2. **[dsniff][1]**: a collection of command-line based sniffing, spoofing and hijacking tools designed for network auditing and penetration testing. They can sniff various information such as passwords, NSF traffic, email messages, website URLs, and so on.
|
|
||||||
|
|
||||||
3. **[httpry][2]**: an HTTP packet sniffer which captures and decode HTTP requests and response packets, and display them in a human-readable format.
|
|
||||||
|
|
||||||
4. **IPTraf**: a console-based network statistics viewer. It displays packet-level, connection-level, interface-level, protocol-level packet/byte counters in real-time. Packet capturing can be controlled by protocol filters, and its operation is full menu-driven.
|
|
||||||
|
|
||||||
![](https://farm8.staticflickr.com/7519/16055246118_8ea182b413_c.jpg)
|
|
||||||
|
|
||||||
5. **[mysql-sniffer][3]**: a packet sniffer which captures and decodes packets associated with MySQL queries. It displays the most frequent or all queries in a human-readable format.
|
|
||||||
|
|
||||||
6. **[ngrep][4]**: grep over network packets. It can capture live packets, and match (filtered) packets against regular expressions or hexadecimal expressions. It is useful for detecting and storing any anomalous traffic, or for sniffing particular patterns of information from live traffic.
|
|
||||||
|
|
||||||
7. **[p0f][5]**: a passive fingerprinting tool which, based on packet sniffing, reliably identifies operating systems, NAT or proxy settings, network link types and various other properites associated with an active TCP connection.
|
|
||||||
|
|
||||||
8. **pktstat**: a command-line tool which analyzes live packets to display connection-level bandwidth usages as well as descriptive information of protocols involved (e.g., HTTP GET/POST, FTP, X11).
|
|
||||||
|
|
||||||
![](https://farm8.staticflickr.com/7477/16048970999_be60f74952_b.jpg)
|
|
||||||
|
|
||||||
9. **Snort**: an intrusion detection and prevention tool which can detect/prevent a variety of backdoor, botnets, phishing, spyware attacks from live traffic based on rule-driven protocol analysis and content matching.
|
|
||||||
|
|
||||||
10. **tcpdump**: a command-line packet sniffer which is capable of capturing nework packets on the wire based on filter expressions, dissect the packets, and dump the packet content for packet-level analysis. It is widely used for any kinds of networking related troubleshooting, network application debugging, or [security][6] monitoring.
|
|
||||||
|
|
||||||
11. **tshark**: a command-line packet sniffing tool that comes with Wireshark GUI program. It can capture and decode live packets on the wire, and show decoded packet content in a human-friendly fashion.
|
|
||||||
|
|
||||||
### Flow-/Process-/Interface-Level Monitoring ###
|
|
||||||
|
|
||||||
In this category, network monitoring is done by classifying network traffic into flows, associated processes or interfaces, and collecting per-flow, per-process or per-interface statistics. Source of information can be libpcap packet capture library or sysfs kernel virtual filesystem. Monitoring overhead of these tools is low, but packet-level inspection capabilities are missing.
|
|
||||||
|
|
||||||
12. **bmon**: a console-based bandwidth monitoring tool which shows various per-interface information, including not-only aggregate/average RX/TX statistics, but also a historical view of bandwidth usage.
|
|
||||||
|
|
||||||
![](https://farm9.staticflickr.com/8580/16234265932_87f20c5d17_b.jpg)
|
|
||||||
|
|
||||||
13. **[iftop][7]**: a bandwidth usage monitoring tool that can shows bandwidth usage for individual network connections in real time. It comes with ncurses-based interface to visualize bandwidth usage of all connections in a sorted order. It is useful for monitoring which connections are consuming the most bandwidth.
|
|
||||||
|
|
||||||
14. **nethogs**: a process monitoring tool which offers a real-time view of upload/download bandwidth usage of individual processes or programs in an ncurses-based interface. This is useful for detecting bandwidth hogging processes.
|
|
||||||
|
|
||||||
15. **netstat**: a command-line tool that shows various statistics and properties of the networking stack, such as open TCP/UDP connections, network interface RX/TX statistics, routing tables, protocol/socket statistics. It is useful when you diagnose performance and resource usage related problems of the networking stack.
|
|
||||||
|
|
||||||
16. **[speedometer][8]**: a console-based traffic monitor which visualizes the historical trend of an interface's RX/TX bandwidth usage with ncurses-drawn bar charts.
|
|
||||||
|
|
||||||
![](https://farm8.staticflickr.com/7485/16048971069_31dd573a4f_c.jpg)
|
|
||||||
|
|
||||||
17. **[sysdig][9]**: a comprehensive system-level debugging tool with a unified interface for investigating different Linux subsystems. Its network monitoring module is capable of monitoring, either online or offline, various per-process/per-host networking statistics such as bandwidth usage, number of connections/requests, etc.
|
|
||||||
|
|
||||||
18. **tcptrack**: a TCP connection monitoring tool which displays information of active TCP connections, including source/destination IP addresses/ports, TCP state, and bandwidth usage.
|
|
||||||
|
|
||||||
![](https://farm8.staticflickr.com/7507/16047703080_5fdda2e811_b.jpg)
|
|
||||||
|
|
||||||
19. **vnStat**: a command-line traffic monitor which maintains a historical view of RX/TX bandwidh usage (e.g., current, daily, monthly) on a per-interface basis. Running as a background daemon, it collects and stores interface statistics on bandwidth rate and total bytes transferred.
|
|
||||||
|
|
||||||
### Active Network Monitoring ###
|
|
||||||
|
|
||||||
Unlike passive monitoring tools presented so far, tools in this category perform network monitoring by actively "injecting" probes into the network and collecting corresponding responses. Monitoring targets include routing path, available bandwidth, loss rates, delay, jitter, system settings or vulnerabilities, and so on.
|
|
||||||
|
|
||||||
20. **[dnsyo][10]**: a DNS monitoring tool which can conduct DNS lookup from open resolvers scattered across more than 1,500 different networks. It is useful when you check DNS propagation or troubleshoot DNS configuration.
|
|
||||||
|
|
||||||
21. **[iperf][11]**: a TCP/UDP bandwidth measurement utility which can measure maximum available bandwidth between two end points. It measures available bandwidth by having two hosts pump out TCP/UDP probe traffic between them either unidirectionally or bi-directionally. It is useful when you test the network capacity, or tune the parameters of network stack. A variant called [netperf][12] exists with more features and better statistics.
|
|
||||||
|
|
||||||
22. **[netcat][13]/socat**: versatile network debugging tools capable of reading from, writing to, or listen on TCP/UDP sockets. They are often used alongside with other programs or scripts for backend network transfer or port listening.
|
|
||||||
|
|
||||||
23. **nmap**: a command-line port scanning and network discovery utility. It relies on a number of TCP/UDP based scanning techniques to detect open ports, live hosts, or existing operating systems on the local network. It is useful when you audit local hosts for vulnerabilities or build a host map for maintenance purpose. [zmap][14] is an alernative scanning tool with Internet-wide scanning capability.
|
|
||||||
|
|
||||||
24. ping: a network testing tool which works by exchaning ICMP echo and reply packets with a remote host. It is useful when you measure round-trip-time (RTT) delay and loss rate of a routing path, as well as test the status or firewall rules of a remote system. Variations of ping exist with fancier interface (e.g., [noping][15]), multi-protocol support (e.g., [hping][16]) or parallel probing capability (e.g., [fping][17]).
|
|
||||||
|
|
||||||
![](https://farm8.staticflickr.com/7466/15612665344_a4bb665a5b_c.jpg)
|
|
||||||
|
|
||||||
25. **[sprobe][18]**: a command-line tool that heuristically infers the bottleneck bandwidth between a local host and any arbitrary remote IP address. It uses TCP three-way handshake tricks to estimate the bottleneck bandwidth. It is useful when troubleshooting wide-area network performance and routing related problems.
|
|
||||||
|
|
||||||
26. **traceroute**: a network discovery tool which reveals a layer-3 routing/forwarding path from a local host to a remote host. It works by sending TTL-limited probe packets and collecting ICMP responses from intermediate routers. It is useful when troubleshooting slow network connections or routing related problems. Variations of traceroute exist with better RTT statistics (e.g., [mtr][19]).
|
|
||||||
|
|
||||||
### Application Log Parsing ###
|
|
||||||
|
|
||||||
In this category, network monitoring is targeted at a specific server application (e.g., web server or database server). Network traffic generated or consumed by a server application is monitored by analyzing its log file. Unlike network-level monitors presented in earlier categories, tools in this category can analyze and monitor network traffic from application-level.
|
|
||||||
|
|
||||||
27. **[GoAccess][20]**: a console-based interactive viewer for Apache and Nginx web server traffic. Based on access log analysis, it presents a real-time statistics of a number of metrics including daily visits, top requests, client operating systems, client locations, client browsers, in a scrollable view.
|
|
||||||
|
|
||||||
![](https://farm8.staticflickr.com/7518/16209185266_da6c5c56eb_c.jpg)
|
|
||||||
|
|
||||||
28. **[mtop][21]**: a command-line MySQL/MariaDB server moniter which visualizes the most expensive queries and current database server load. It is useful when you optimize MySQL server performance and tune server configurations.
|
|
||||||
|
|
||||||
![](https://farm8.staticflickr.com/7472/16047570248_bc996795f2_c.jpg)
|
|
||||||
|
|
||||||
29. **[ngxtop][22]**: a traffic monitoring tool for Nginx and Apache web server, which visualizes web server traffic in a top-like interface. It works by parsing a web server's access log file and collecting traffic statistics for individual destinations or requests.
|
|
||||||
|
|
||||||
### Conclusion ###
|
|
||||||
|
|
||||||
In this article, I presented a wide variety of command-line network monitoring tools, ranging from the lowest packet-level monitors to the highest application-level network monitors. Knowing which tool does what is one thing, and choosing which tool to use is another, as any single tool cannot be a universal solution for your every need. A good system admin should be able to decide which tool is right for the circumstance at hand. Hopefully the list helps with that.
|
|
||||||
|
|
||||||
You are always welcome to improve the list with your comment!
|
|
||||||
|
|
||||||
--------------------------------------------------------------------------------
|
|
||||||
|
|
||||||
via: http://xmodulo.com/useful-command-line-network-monitors-linux.html
|
|
||||||
|
|
||||||
作者:[Dan Nanni][a]
|
|
||||||
译者:[译者ID](https://github.com/译者ID)
|
|
||||||
校对:[校对者ID](https://github.com/校对者ID)
|
|
||||||
|
|
||||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
|
||||||
|
|
||||||
[a]:http://xmodulo.com/author/nanni
|
|
||||||
[1]:http://www.monkey.org/~dugsong/dsniff/
|
|
||||||
[2]:http://xmodulo.com/monitor-http-traffic-command-line-linux.html
|
|
||||||
[3]:https://github.com/zorkian/mysql-sniffer
|
|
||||||
[4]:http://ngrep.sourceforge.net/
|
|
||||||
[5]:http://lcamtuf.coredump.cx/p0f3/
|
|
||||||
[6]:http://xmodulo.com/recommend/firewallbook
|
|
||||||
[7]:http://xmodulo.com/how-to-install-iftop-on-linux.html
|
|
||||||
[8]:https://excess.org/speedometer/
|
|
||||||
[9]:http://xmodulo.com/monitor-troubleshoot-linux-server-sysdig.html
|
|
||||||
[10]:http://xmodulo.com/check-dns-propagation-linux.html
|
|
||||||
[11]:https://iperf.fr/
|
|
||||||
[12]:http://www.netperf.org/netperf/
|
|
||||||
[13]:http://xmodulo.com/useful-netcat-examples-linux.html
|
|
||||||
[14]:https://zmap.io/
|
|
||||||
[15]:http://noping.cc/
|
|
||||||
[16]:http://www.hping.org/
|
|
||||||
[17]:http://fping.org/
|
|
||||||
[18]:http://sprobe.cs.washington.edu/
|
|
||||||
[19]:http://xmodulo.com/better-alternatives-basic-command-line-utilities.html#mtr_link
|
|
||||||
[20]:http://goaccess.io/
|
|
||||||
[21]:http://mtop.sourceforge.net/
|
|
||||||
[22]:http://xmodulo.com/monitor-nginx-web-server-command-line-real-time.html
|
|
@ -0,0 +1,135 @@
|
|||||||
|
什么是Linux上实用的命令行式网络监视工具
|
||||||
|
===============================================================================
|
||||||
|
对任何规模的业务来说,网络监视器都是一个重要的功能。网络监视的目标可能千差万别。比如,监视活动的目标可以是保证长期的网络供应、安全保护、对性能进行排查、网络使用统计等。由于它的目标不同,网络监视器使用很多不同的方式来完成任务。比如使用包层面的嗅探,使用流层面的统计数据,向网络中注入探测的流量,分析服务器日志等。
|
||||||
|
|
||||||
|
尽管有许多专用的网络监视系统可以365天24小时监视,但您依旧可以在特定的情况下使用命令行式的网络监视器,某些命令行式的网络监视器在某方面很有用。如果您是系统管理员,那您就应该有亲身使用一些知名的命令行式网络监视器的经历。这里有一份**Linux上流行且实用的网络监视器**列表。
|
||||||
|
|
||||||
|
### 包层面的嗅探器 ###
|
||||||
|
|
||||||
|
在这个类别下,监视工具在链路上捕捉独立的包,分析它们的内容,展示解码后的内容或者包层面的统计数据。这些工具在最底层对网络进行监视、管理,同样的也能进行最细粒度的监视,其代价是部分网络I/O和分析的过程。
|
||||||
|
|
||||||
|
1. **dhcpdump**:一个命令行式的DHCP流量嗅探工具,捕捉DHCP的请求/回复流量,并以用户友好的方式显示解码的DHCP协议消息。这是一款排查DHCP相关故障的实用工具。
|
||||||
|
|
||||||
|
2. **[dsniff][1]**:一个基于命令行的嗅探工具集合,拥有欺骗和劫持功能,被设计用于网络审查和渗透测试。它可以嗅探多种信息,比如密码、NSF流量、email消息、网络地址等。
|
||||||
|
|
||||||
|
3. **[httpry][2]**:一个HTTP报文嗅探器,用于捕获、解码HTTP请求和回复报文,并以用户友好的方式显示这些信息。
|
||||||
|
|
||||||
|
4. **IPTraf**:基于命令行的网络统计数据查看器。它实时显示包层面、连接层面、接口层面、协议层面的报文/字节数。抓包过程由协议过滤器控制,且操作过程全部是菜单驱动的。
|
||||||
|
|
||||||
|
![](https://farm8.staticflickr.com/7519/16055246118_8ea182b413_c.jpg)
|
||||||
|
|
||||||
|
5. **[mysql-sniffer][3]**:一个用于抓取、解码MySQL请求相关的数据包的工具。它以可读的方式显示最频繁或全部的请求。
|
||||||
|
|
||||||
|
6. **[ngrep][4]**:在网络报文中执行grep。它能实时抓取报文,并用正则表达式或十六进制表达式的方式匹配报文。它是一个可以对异常流量进行检测、存储或者对实时流中特定模式报文进行抓取的实用工具。
|
||||||
|
|
||||||
|
7. **[p0f][5]**:一个被动的基于包嗅探的指纹采集工具,可以可靠地识别操作系统、NAT或者代理设置、网络链路类型以及许多其他与活动的TCP连接相关的属性。
|
||||||
|
|
||||||
|
8. **pktstat**:一个命令行式的工具,通过实时分析报文,显示连接带宽使用情况以及相关的协议(例如,HTTP GET/POST、FTP、X11)等描述信息。
|
||||||
|
|
||||||
|
![](https://farm8.staticflickr.com/7477/16048970999_be60f74952_b.jpg
|
||||||
|
|
||||||
|
9. **Snort**:一个入侵检测和预防工具,通过规则驱动的协议分析和内容匹配,来检测/预防活跃流量中各种各样的后门、僵尸网络、网络钓鱼、间谍软件攻击。
|
||||||
|
|
||||||
|
10. **tcpdump**:一个命令行的嗅探工具,可以基于过滤表达式抓取网络中的报文,分析报文,并且在包层面输出报文内容以便于包层面的分析。他在许多网络相关的错误排查、网络程序debug、或[安全][6]监测方面应用广泛。
|
||||||
|
|
||||||
|
11. **tshark**:一个与Wireshark窗口程序一起使用的命令行式的嗅探工具。他能捕捉、解码网络上的实时报文,并能以用户友好的方式显示其内容。
|
||||||
|
|
||||||
|
### 流/进程/接口层面的监视 ###
|
||||||
|
|
||||||
|
在这个分类中,网络监视器通过把流量分为流、进程或接口来收集每个流、每个进程、每个接口的统计数据。其信息的来源可以是libpcap抓包库或者sysfs内核虚拟文件系统。这些工具的监视成本很低,但是缺乏包层面的检视能力。
|
||||||
|
|
||||||
|
12. **bmon**:一个基于命令行的带宽监测工具,可以显示各种接口相关的信息,不但包括接收/发送的总值/平均值统计数据,而且拥有历史带宽使用视图。
|
||||||
|
|
||||||
|
![](https://farm9.staticflickr.com/8580/16234265932_87f20c5d17_b.jpg)
|
||||||
|
|
||||||
|
13. **[iftop][7]**:一个带宽使用监测工具,可以实时显示某个网络连接的带宽使用情况。它对所有带宽使用情况排序并通过ncurses的接口来进行可视化。他可以方便的监视哪个连接消耗了最多的带宽。
|
||||||
|
|
||||||
|
14. **nethogs**:一个进程监视工具,提供进程相关的实时的上行/下行带宽使用信息,并基于ncurses显示。它对检测占用大量带宽的进程很有用。
|
||||||
|
|
||||||
|
15. **netstat**:一个显示许多TCP/UDP的网络堆栈统计信息的工具。诸如网络接口发送/接收、路由表、协议/套接字的统计信息和属性。当您诊断与网络堆栈相关的性能、资源使用时它很有用。
|
||||||
|
|
||||||
|
16. **[speedometer][8]**:一个可视化某个接口发送/接收的带宽使用的历史趋势,并且基于ncurses的条状图进行显示的工具。
|
||||||
|
|
||||||
|
![](https://farm8.staticflickr.com/7485/16048971069_31dd573a4f_c.jpg)
|
||||||
|
|
||||||
|
17. **[sysdig][9]**:一个对Linux子系统拥有统一调试接口的系统级综合性debug工具。它的网络监视模块可以监视在线或离线、许多进程/主机相关的网络统计数据,例如带宽、连接/请求数等。
|
||||||
|
|
||||||
|
18. **tcptrack**:一个TCP连接监视工具,可以显示活动的TCP连接,包括源/目的IP地址/端口、TCP状态、带宽使用等。
|
||||||
|
|
||||||
|
![](https://farm8.staticflickr.com/7507/16047703080_5fdda2e811_b.jpg)
|
||||||
|
|
||||||
|
19. **vnStat**:一个维护了基于接口的历史接收/发送带宽视图(例如,当前、每日、每月)的流量监视器。作为一个后台守护进程,它收集并存储统计数据,包括接口带宽使用率和传输字节总数。
|
||||||
|
|
||||||
|
### 主动网络监视器 ###
|
||||||
|
|
||||||
|
不同于前面提到的被动的监听工具,这个类别的工具们在监听时会主动的“注入”探测内容到网络中,并且会收集相应的反应。监听目标包括路由路径、可供使用的带宽、丢包率、延时、抖动、系统设置或者缺陷等。
|
||||||
|
|
||||||
|
20. **[dnsyo][10]**:一个DNS检测工具,能够管理多达1500个不同网络的开放解析器集群的DNS查询。它在您检查DNS传播或排查DNS设置的时候很有用。
|
||||||
|
|
||||||
|
21. **[iperf][11]**:一个TCP/UDP带宽测量工具,能够测量两个结点间最大可用带宽。它通过在两个主机间单向或双向的输出TCP/UDP探测流量来测量可用的带宽。它在监测网络容量、调谐网络协议栈参数时很有用。一个叫做[netperf][12]的变种拥有更多的功能及更好的统计数据。
|
||||||
|
|
||||||
|
22. **[netcat][13]/socat**:通用的网络debug工具,可以对TCP/UDP套接字进行读、写或监听。它通常和其他的程序或脚本结合起来在后端对网络传输或端口进行监听。
|
||||||
|
|
||||||
|
23. **nmap**:一个命令行端口扫描和网络发现工具。它依赖于若干基于TCP/UDP的扫描技术来查找开放的端口、活动的主机或者在本地网络存在的操作系统。它在你审查本地主机漏洞或者建立主机映射时很有用。[zmap][14]是一个类似的替代品,是一个用于互联网范围的扫描工具。
|
||||||
|
|
||||||
|
24. ping:一个常用的网络测试工具。通过对ICMP的echo和reply报文进行增强来实现其功能。它在测量路由的RTT、丢包率以及检测远端系统防火墙规则时很有用。ping的变种有更漂亮的界面(例如,[noping][15])、多协议支持(例如,[hping][16])或者并行探测能力(例如,[fping][17])。
|
||||||
|
|
||||||
|
![](https://farm8.staticflickr.com/7466/15612665344_a4bb665a5b_c.jpg)
|
||||||
|
|
||||||
|
25. **[sprobe][18]**:一个启发式推断本地主机和任意远端IP地址的网络带宽瓶颈的命令行工具。它使用TCP三次握手机制来评估带宽的瓶颈。它在检测大范围网络性能和路由相关的问题时很有用。
|
||||||
|
|
||||||
|
26. **traceroute**:一个能发现从本地到远端主机的第三层路由/转发路径的网络发现工具。它发送有限TTL的探测报文,收集中间路由的ICMP反馈信息。它在排查低速网络连接或者路由相关的问题时很有用。traceroute的变种有更好的RTT统计功能(例如,[mtr][19])。
|
||||||
|
|
||||||
|
### 应用日志解析器 ###
|
||||||
|
|
||||||
|
在这个类别下,网络监测器把特定的服务器应用程序作为目标(例如,web服务器或者数据库服务器)。由服务器程序产生或消耗的网络流量通过它的日志被分析和监测。不像前面提到的网络层的监视器,这个类别的工具能够在应用层面分析和监控网络流量。
|
||||||
|
|
||||||
|
27. **[GoAccess][20]**:一个针对Apache和Nginx服务器流量的交互式查看器。基于对获取到的日志的分析,它能展示包括日访问量、最多请求、客户端操作系统、客户端位置、客户端浏览器等在内的多个实时的统计信息,并以滚动方式显示。
|
||||||
|
|
||||||
|
![](https://farm8.staticflickr.com/7518/16209185266_da6c5c56eb_c.jpg)
|
||||||
|
|
||||||
|
28. **[mtop][21]**:一个面向MySQL/MariaDB服务器的命令行监视器,它可以将当前数据库服务器负载中代价最大的查询以可视化的方式进行显示。它在您优化MySQL服务器性能、调谐服务器参数时很有用。
|
||||||
|
|
||||||
|
![](https://farm8.staticflickr.com/7472/16047570248_bc996795f2_c.jpg)
|
||||||
|
|
||||||
|
29. **[ngxtop][22]**:一个面向Nginx和Apache服务器的流量监测工具,能够以类似top指令的方式可视化的显示Web服务器的流量。它解析web服务器的查询日志文件并收集某个目的地或请求的流量统计信息。
|
||||||
|
|
||||||
|
### Conclusion ###
|
||||||
|
|
||||||
|
在这篇文章中,我展示了许多的命令行式监测工具,从最底层的包层面的监视器到最高层应用程序层面的网络监视器。知道那个工具的作用是一回事,选择哪个工具使用又是另外一回事。单一的一个工具不能作为您每天使用的通用的解决方案。一个好的系统管理员应该能决定哪个工具更适合当前的环境。希望这个列表对此有所帮助。
|
||||||
|
|
||||||
|
欢迎您通过回复来改进这个列表的内容!
|
||||||
|
|
||||||
|
--------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
via: http://xmodulo.com/useful-command-line-network-monitors-linux.html
|
||||||
|
|
||||||
|
作者:[Dan Nanni][a]
|
||||||
|
译者:[wwy-hust](https://github.com/wwy-hust)
|
||||||
|
校对:[校对者ID](https://github.com/校对者ID)
|
||||||
|
|
||||||
|
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||||
|
|
||||||
|
[a]:http://xmodulo.com/author/nanni
|
||||||
|
[1]:http://www.monkey.org/~dugsong/dsniff/
|
||||||
|
[2]:http://xmodulo.com/monitor-http-traffic-command-line-linux.html
|
||||||
|
[3]:https://github.com/zorkian/mysql-sniffer
|
||||||
|
[4]:http://ngrep.sourceforge.net/
|
||||||
|
[5]:http://lcamtuf.coredump.cx/p0f3/
|
||||||
|
[6]:http://xmodulo.com/recommend/firewallbook
|
||||||
|
[7]:http://xmodulo.com/how-to-install-iftop-on-linux.html
|
||||||
|
[8]:https://excess.org/speedometer/
|
||||||
|
[9]:http://xmodulo.com/monitor-troubleshoot-linux-server-sysdig.html
|
||||||
|
[10]:http://xmodulo.com/check-dns-propagation-linux.html
|
||||||
|
[11]:https://iperf.fr/
|
||||||
|
[12]:http://www.netperf.org/netperf/
|
||||||
|
[13]:http://xmodulo.com/useful-netcat-examples-linux.html
|
||||||
|
[14]:https://zmap.io/
|
||||||
|
[15]:http://noping.cc/
|
||||||
|
[16]:http://www.hping.org/
|
||||||
|
[17]:http://fping.org/
|
||||||
|
[18]:http://sprobe.cs.washington.edu/
|
||||||
|
[19]:http://xmodulo.com/better-alternatives-basic-command-line-utilities.html#mtr_link
|
||||||
|
[20]:http://goaccess.io/
|
||||||
|
[21]:http://mtop.sourceforge.net/
|
||||||
|
[22]:http://xmodulo.com/monitor-nginx-web-server-command-line-real-time.html
|
Loading…
Reference in New Issue
Block a user