|
用LR录制(协议是winsock+ms sql server)录制的application,我找到recording log和 recorded evented log文件,请帮忙侃侃是什么原因造成的?谢谢。
recording log:
[Op#: 1]------------------------------------------------------------------------------
Record Section : Action
[Op#: 2]------------------------------------------------------------------------------
Start Record : 1
[Op#: 3]------------------------------------------------------------------------------
Api Event (0) : Id=WPLUS Proc=0cd8:0954 Start=33160390 End=33160390 Duration=0 msec
Operation Name : wplus_gethostbyname
Argument# 1 IN : [name] = "PITY"
Argument# 2 IN : [ipaddress] = 192.168.0.61 (3d00a8c0)
Return Value : (void)
[Op#: 4]------------------------------------------------------------------------------
Api Event (1) : Id=WPLUS Proc=0cd8:0394 Start=33160421 End=33160421 Duration=0 msec
Operation Name : wplus_gethostbyname
Argument# 1 IN : [name] = "fdg-5mt3nrsnt02"
Argument# 2 IN : [ipaddress] = 192.168.0.72 (4800a8c0)
Return Value : (void)
record event log:
[Network Analyzer ( 2a4: d54)] Address lookup for PITY = 192.168.0.61
[Network Analyzer ( 2a4: d54)] ------------------------------------------------------------------------------------------
[Network Analyzer ( 2a4: d54)] Load Network Traffic Analyzers:
[Network Analyzer ( 2a4: d54)] Analyzer Module: DbLib (value=)
[Network Analyzer ( 2a4: d54)] + Exclude Interception for DLLs: NTWDBLIB.dll
[Network Analyzer ( 2a4: d54)] Analyzer Module: WPLUS (value=)
[Network Analyzer ( 2a4: d54)] Analyzer Module: WinSock (value=GetRawProtocolAnalyzer:api_sock_proxy.dll)
[Network Analyzer ( 2a4: d54)] + Network Analyzer: api_sock_proxy.dll @ GetRawProtocolAnalyzer Loaded!
[Network Analyzer ( 2a4: d54)] Analyzer Module: local_server (value=)
[Network Analyzer ( 2a4: d54)] ------------------------------------------------------------------------------------------
[Network Analyzer ( 2a4: 5f0)] Address lookup for fdg-5mt3nrsnt02 = 192.168.0.72
[Network Analyzer ( 2a4: d54)] Address lookup for fdg-5mt3nrsnt02 = 192.168.0.72
[Network Analyzer ( 2a4: d54)] Request Connection: Remote Server @ 192.168.0.61:1433 (Service=) (Sid= 1) PROXIED!
[Network Analyzer ( 2a4: 5f0)] (Sid: 1) Client -> Server : 52 bytes
[Network Analyzer ( 2a4: 5f0)] (Sid: 1) Server -> Client : 37 bytes
[Network Analyzer ( 2a4: 5f0)] (Sid: 1) Client -> Server : 208 bytes
[Network Analyzer ( 2a4: 5f0)] (Sid: 1) Server -> Client : 397 bytes (Service=SOCKET)
[Network Analyzer ( 2a4: 5f0)] (Sid: 1) Client -> Server : 50 bytes (Service=SOCKET)
[Network Analyzer ( 2a4: 5f0)] (Sid: 1) Server -> Client : 17 bytes (Service=SOCKET)
[Network Analyzer ( 2a4: d54)] Address lookup for PITY = 192.168.0.61
[Network Analyzer ( 2a4: d54)] Address lookup for fdg-5mt3nrsnt02 = 192.168.0.72
[Network Analyzer ( 2a4: d54)] Request Connection: Remote Server @ 192.168.0.61:1433 |
|