{"id":9374,"date":"2020-10-22T10:00:18","date_gmt":"2020-10-22T17:00:18","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=9374"},"modified":"2020-10-25T01:01:30","modified_gmt":"2020-10-25T08:01:30","slug":"cbl-sync-protocol-examination-via-wireshark","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/es\/cbl-sync-protocol-examination-via-wireshark\/","title":{"rendered":"Examen del protocolo de sincronizaci\u00f3n de Couchbase Lite mediante Wireshark"},"content":{"rendered":"<p>Durante el desarrollo, a menudo resulta \u00fatil examinar qu\u00e9 se env\u00eda exactamente por la red entre las m\u00e1quinas.  Esto ayuda a realizar tareas como encontrar el origen de un problema o simplemente entender la conversaci\u00f3n.  A menudo la conversaci\u00f3n usa un protocolo bien conocido como HTTP.  Sin embargo, para Couchbase Mobile 2.0 y superior, la conversaci\u00f3n tiene lugar usando un protocolo de sincronizaci\u00f3n llamado <a href=\"https:\/\/github.com\/couchbase\/couchbase-lite-core\/blob\/7bb2cff39f79168340dfde02a16ec7d9394d7e56\/Networking\/BLIP\/docs\/BLIP%20Protocol.md\">BLIP<\/a>transportado a trav\u00e9s de un socket web.  Se podr\u00eda pensar que esto hace que la conversaci\u00f3n sea totalmente opaca, pero en realidad <a href=\"https:\/\/www.wireshark.org\/#download\">wireshark<\/a> es capaz de analizar los mensajes BLIP.  Veamos r\u00e1pidamente c\u00f3mo hacerlo.<\/p>\n<p>Sin embargo, antes de entrar en materia, debo advertirle de algo.  Esta informaci\u00f3n se presenta con fines puramente educativos.  No debes confiar en que este formato sea siempre el mismo.  En Couchbase no tenemos ning\u00fan contrato con los consumidores al respecto, y est\u00e1 sujeto a cambios.  Sin embargo, a veces es bueno ser capaz de ver lo que est\u00e1 pasando.<\/p>\n<p><!--more--><\/p>\n<h4>Filtrado en BLIP<\/h4>\n<p>Este post asumir\u00e1 que usted sabe lo b\u00e1sico de c\u00f3mo utilizar wireshark.  Se puede utilizar cualquier versi\u00f3n 3.0.0 o superior, pero las versiones anteriores tienen un error que puede causar un fallo en los mensajes comprimidos de gran tama\u00f1o por lo que se recomienda 3.2.7+ \/ 3.0.14+.  Usted debe estar familiarizado con la forma de iniciar una captura de red.  Este post comienza asumiendo que ya has hecho una.  Cuando abrimos tu captura para examinarla, puedes ver algo como la siguiente imagen.<\/p>\n<div id=\"attachment_9376\" style=\"width: 910px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2020\/09\/Wireshark_Unfiltered.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-9376\" class=\"size-large wp-image-9376\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2020\/09\/Wireshark_Unfiltered-1024x205.png\" alt=\"A wireshark trace without a filter\" width=\"900\" height=\"180\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_Unfiltered-1024x205.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_Unfiltered-300x60.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_Unfiltered-768x154.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_Unfiltered-1536x308.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_Unfiltered-2048x410.png 2048w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_Unfiltered-20x4.png 20w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_Unfiltered-1320x264.png 1320w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><p id=\"caption-attachment-9376\" class=\"wp-caption-text\">Esta es la vista que probablemente ver\u00e1 cuando abra una nueva traza<\/p><\/div>\n<p>Esto se debe a que a\u00fan no hemos establecido ning\u00fan filtro.  Todos los paquetes de todos los tipos est\u00e1n visibles. Si te fijas, cerca de la parte superior hay un cuadro de texto con la sugerencia \"Aplicar un filtro de visualizaci\u00f3n\".  BLIP es un formato de paquete soportado, y puedes establecer un filtro para mostrar s\u00f3lo mensajes BLIP.<\/p>\n<div id=\"attachment_9377\" style=\"width: 910px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2020\/09\/Wireshark_BLIP_Filtered.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-9377\" class=\"size-large wp-image-9377\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2020\/09\/Wireshark_BLIP_Filtered-1024x202.png\" alt=\"A wireshark trace filtered to BLIP\" width=\"900\" height=\"178\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_BLIP_Filtered-1024x202.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_BLIP_Filtered-300x59.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_BLIP_Filtered-768x152.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_BLIP_Filtered-1536x303.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_BLIP_Filtered-2048x405.png 2048w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_BLIP_Filtered-20x4.png 20w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_BLIP_Filtered-1320x261.png 1320w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><p id=\"caption-attachment-9377\" class=\"wp-caption-text\">Ahora las cosas parecen m\u00e1s manejables, mostrando s\u00f3lo la conversaci\u00f3n BLIP.<\/p><\/div>\n<p>Una advertencia a esto es que como BLIP usa web sockets, no puede ser decodificado si la conversaci\u00f3n completa no est\u00e1 presente.  En otras palabras, la petici\u00f3n HTTP inicial para el socket web debe estar presente.  Por ejemplo, si cambias el filtro a <code>blip || http<\/code> entonces podr\u00e1s ver el primer mensaje HTTP de esta conversaci\u00f3n.<\/p>\n<div id=\"attachment_9378\" style=\"width: 910px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2020\/09\/Wireshark_BLIP_HTTP_Filtered.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-9378\" class=\"size-large wp-image-9378\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2020\/09\/Wireshark_BLIP_HTTP_Filtered-1024x201.png\" alt=\"A wireshark trace filtered to BLIP and HTTP\" width=\"900\" height=\"177\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_BLIP_HTTP_Filtered-1024x201.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_BLIP_HTTP_Filtered-300x59.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_BLIP_HTTP_Filtered-768x151.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_BLIP_HTTP_Filtered-1536x302.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_BLIP_HTTP_Filtered-2048x403.png 2048w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_BLIP_HTTP_Filtered-20x4.png 20w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/09\/Wireshark_BLIP_HTTP_Filtered-1320x260.png 1320w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><p id=\"caption-attachment-9378\" class=\"wp-caption-text\">F\u00edjate en las dos entradas verdes de la parte superior, que muestran un mensaje HTTP de solicitud\/respuesta para un socket web.<\/p><\/div>\n<h4>Detalles del mensaje<\/h4>\n<p>Ahora que ya existe una conversaci\u00f3n BLIP, \u00bfqu\u00e9 contiene un mensaje BLIP?  Para responder a esta pregunta, examinemos el contenido de un mensaje BLIP t\u00edpico:<\/p>\n<div id=\"attachment_9413\" style=\"width: 910px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2020\/10\/Wireshark_BLIP_Details.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-9413\" class=\"size-large wp-image-9413\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2020\/10\/Wireshark_BLIP_Details-1024x158.png\" alt=\"Details of a BLIP message\" width=\"900\" height=\"139\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Wireshark_BLIP_Details-1024x158.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Wireshark_BLIP_Details-300x46.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Wireshark_BLIP_Details-768x118.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Wireshark_BLIP_Details-1536x237.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Wireshark_BLIP_Details-2048x315.png 2048w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Wireshark_BLIP_Details-20x3.png 20w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Wireshark_BLIP_Details-1320x203.png 1320w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><p id=\"caption-attachment-9413\" class=\"wp-caption-text\">Contenido de un mensaje BLIP t\u00edpico.<\/p><\/div>\n<p>De arriba a abajo tenemos los siguientes art\u00edculos:<\/p>\n<ul>\n<li>N\u00famero de mensaje - B\u00e1sicamente el ID del mensaje al que se hace referencia.  Esto es importante para la siguiente secci\u00f3n.<\/li>\n<li>Frame Flags - Alguna informaci\u00f3n de metadatos sobre el mensaje (En este ejemplo, el cuerpo est\u00e1 comprimido y es urgente.  Esto significa que se tratar\u00e1 fuera de orden).<\/li>\n<li>Longitud de las propiedades - Longitud de las propiedades del mensaje (Las propiedades se codifican como una entrada de longitud, seguida de los datos de la longitud dada)<\/li>\n<li>Propiedades - Las propiedades del mensaje (Una colecci\u00f3n de pares clave-valor)<\/li>\n<li>Cuerpo del mensaje - Es el contenido real del mensaje.  Ocupa todo el resto del mensaje, excepto los 4 \u00faltimos bytes.<\/li>\n<li>Suma de comprobaci\u00f3n: se escribe un valor de suma de comprobaci\u00f3n para garantizar que el mensaje se recibe en el orden en que se envi\u00f3 y que el contenido del paquete no ha sido malformado.<\/li>\n<\/ul>\n<p>Hay 6 tipos de mensajes que se pueden enviar, indicados por la forma en que est\u00e1n marcados en la lista de paquetes:<\/p>\n<ul>\n<li>MSG - Un nuevo mensaje<\/li>\n<li>RPY - Respuesta [normal] a un mensaje recibido<\/li>\n<li>ERR - Respuesta de error a un mensaje recibido<\/li>\n<li>ACKMSG - Acuse de recibo de un mensaje multipaquete largo<\/li>\n<li>ACKRPY - Acuse de recibo de progreso para recibir una respuesta multipaquete larga<\/li>\n<\/ul>\n<h4>Tras una conversaci\u00f3n<\/h4>\n<p>A efectos de seguir una conversaci\u00f3n determinada, algo importante a tener en cuenta es que ambas partes pueden iniciar un mensaje.  Esto aparecer\u00e1 en la lista de mensajes en wireshark como <code>MSG#{NUM}<\/code>.  La forma de saber qu\u00e9 lado envi\u00f3 el mensaje es mirar las direcciones IP de origen y destino.  Por ejemplo, dos diagramas m\u00e1s arriba se puede ver <code>MSG#2<\/code> como tercer mensaje de la lista.  Tambi\u00e9n puede ver <code>MSG#2<\/code> como el pen\u00faltimo mensaje de la lista.  La diferencia es que la primera entrada tiene la IP de origen como 192.168.33.1 y la IP de destino como 192.168.33.11, y esta \u00faltima est\u00e1 invertida.  Esto indica que el primer mensaje es un mensaje que Couchbase Lite envi\u00f3 a Sync Gateway porque en mi configuraci\u00f3n la instancia de Sync Gateway est\u00e1 corriendo en 192.168.33.11.  El segundo es lo contrario, un mensaje que Sync Gateway envi\u00f3 a Couchbase Lite.<\/p>\n<p>Tras recibir un mensaje ocurrir\u00e1 una de estas tres cosas:<\/p>\n<ol>\n<li>El mensaje se recibe, se ejecuta y finaliza normalmente.  En este caso, se enviar\u00e1 un mensaje de respuesta con el mismo n\u00famero de mensaje que el recibido.  As\u00ed, por ejemplo <code>MSG#2<\/code> obtendr\u00e1 un <code>RPY#2<\/code> (con las IP de origen y destino invertidas).<\/li>\n<li>El mensaje se recibe, pero no puede completarse normalmente.  En este caso, se enviar\u00e1 un mensaje de error con las mismas condiciones que #1.<\/li>\n<li>El mensaje tiene un <code>NoReply<\/code> en sus banderas.  En este caso, no se env\u00eda ninguna respuesta.<\/li>\n<\/ol>\n<p>Utilizando lo anterior, podemos ver que en la lista de mensajes, el mensaje que sigue inmediatamente al primero <code>MSG#2<\/code> es <code>RPY#2<\/code> y, por tanto, es la respuesta al mensaje.  Del mismo modo, el primer <code>MSG#1<\/code> tiene un <code>ERR#1<\/code> respuesta, indicando que finaliz\u00f3 con un error.  Este m\u00e9todo es aplicable a ambos lados de la conversaci\u00f3n, por lo que deber\u00eda ser f\u00e1cil rastrear los mensajes de ida y vuelta en una determinada conversaci\u00f3n BLIP.<\/p>","protected":false},"excerpt":{"rendered":"<p>During the course of development it is often useful to examine what exactly is sent over the network between machines.\u00a0 This helps to perform tasks like finding the source of an issue or just simply understanding the conversation.\u00a0 Often times [&hellip;]<\/p>","protected":false},"author":67726,"featured_media":9525,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1810],"tags":[2034,1331,1562],"ppma_author":[9118],"class_list":["post-9374","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-couchbase-mobile","tag-blip","tag-network","tag-replication"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.1 (Yoast SEO v26.1.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Couchbase Lite Sync Protocol Examination via Wireshark - The Couchbase Blog<\/title>\n<meta name=\"description\" content=\"Wireshark has the ability to analyze sync protocol messages that occur during Couchbase Lite and Sync Gateway Replication. Find out how to make use of that!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/es\/cbl-sync-protocol-examination-via-wireshark\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Couchbase Lite Sync Protocol Examination via Wireshark\" \/>\n<meta property=\"og:description\" content=\"Wireshark has the ability to analyze BLIP messages that occur during Couchbase Lite and Sync Gateway Replication. Find out how to make use of that!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/es\/cbl-sync-protocol-examination-via-wireshark\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-22T17:00:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-25T08:01:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2020\/10\/Couchbase-Lite-Sync-Protocol-Examination-via-Wireshark.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jim Borden, Principal Software Engineer, Couchbase\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Wireshark has the ability to analyze BLIP messages that occur during Couchbase Lite and Sync Gateway Replication. Find out how to make use of that!\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Couchbase-Lite-Sync-Protocol-Examination-via-Wireshark-1.png\" \/>\n<meta name=\"twitter:creator\" content=\"@borrrden\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Borden, Principal Software Engineer, Couchbase\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/\"},\"author\":{\"name\":\"Jim Borden, Senior Software Engineer, Couchbase\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/403326eb3d3a8dfbdce18e17ba917f5b\"},\"headline\":\"Couchbase Lite Sync Protocol Examination via Wireshark\",\"datePublished\":\"2020-10-22T17:00:18+00:00\",\"dateModified\":\"2020-10-25T08:01:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/\"},\"wordCount\":982,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Wireshark_BLIP_Featured.png\",\"keywords\":[\"BLIP\",\"network\",\"replication\"],\"articleSection\":[\"Couchbase Mobile\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/\",\"name\":\"Couchbase Lite Sync Protocol Examination via Wireshark - The Couchbase Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Wireshark_BLIP_Featured.png\",\"datePublished\":\"2020-10-22T17:00:18+00:00\",\"dateModified\":\"2020-10-25T08:01:30+00:00\",\"description\":\"Wireshark has the ability to analyze sync protocol messages that occur during Couchbase Lite and Sync Gateway Replication. Find out how to make use of that!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Wireshark_BLIP_Featured.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Wireshark_BLIP_Featured.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Couchbase Lite Sync Protocol Examination via Wireshark\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/403326eb3d3a8dfbdce18e17ba917f5b\",\"name\":\"Jim Borden, Senior Software Engineer, Couchbase\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/f60249485b16e1dc6d0219a0c47e54d7\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1c1fb225bfe3fe6743ca2bd8091dcead38558b2d4164003772042f8e12cdfccb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1c1fb225bfe3fe6743ca2bd8091dcead38558b2d4164003772042f8e12cdfccb?s=96&d=mm&r=g\",\"caption\":\"Jim Borden, Senior Software Engineer, Couchbase\"},\"description\":\"Senior Software Engineer @ Couchbase working on Couchbase Lite.\",\"sameAs\":[\"https:\/\/x.com\/borrrden\"],\"url\":\"https:\/\/www.couchbase.com\/blog\/es\/author\/jim-borden\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Couchbase Lite Sync Protocol Examination via Wireshark - The Couchbase Blog","description":"Wireshark tiene la capacidad de analizar mensajes de protocolo de sincronizaci\u00f3n que ocurren durante Couchbase Lite y Sync Gateway Replication. \u00a1Descubre c\u00f3mo hacer uso de ello!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/es\/cbl-sync-protocol-examination-via-wireshark\/","og_locale":"es_MX","og_type":"article","og_title":"Couchbase Lite Sync Protocol Examination via Wireshark","og_description":"Wireshark has the ability to analyze BLIP messages that occur during Couchbase Lite and Sync Gateway Replication. Find out how to make use of that!","og_url":"https:\/\/www.couchbase.com\/blog\/es\/cbl-sync-protocol-examination-via-wireshark\/","og_site_name":"The Couchbase Blog","article_published_time":"2020-10-22T17:00:18+00:00","article_modified_time":"2020-10-25T08:01:30+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2020\/10\/Couchbase-Lite-Sync-Protocol-Examination-via-Wireshark.png","type":"image\/png"}],"author":"Jim Borden, Principal Software Engineer, Couchbase","twitter_card":"summary_large_image","twitter_description":"Wireshark has the ability to analyze BLIP messages that occur during Couchbase Lite and Sync Gateway Replication. Find out how to make use of that!","twitter_image":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Couchbase-Lite-Sync-Protocol-Examination-via-Wireshark-1.png","twitter_creator":"@borrrden","twitter_misc":{"Written by":"Jim Borden, Principal Software Engineer, Couchbase","Est. reading time":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/"},"author":{"name":"Jim Borden, Senior Software Engineer, Couchbase","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/403326eb3d3a8dfbdce18e17ba917f5b"},"headline":"Couchbase Lite Sync Protocol Examination via Wireshark","datePublished":"2020-10-22T17:00:18+00:00","dateModified":"2020-10-25T08:01:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/"},"wordCount":982,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Wireshark_BLIP_Featured.png","keywords":["BLIP","network","replication"],"articleSection":["Couchbase Mobile"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/","url":"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/","name":"Couchbase Lite Sync Protocol Examination via Wireshark - The Couchbase Blog","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Wireshark_BLIP_Featured.png","datePublished":"2020-10-22T17:00:18+00:00","dateModified":"2020-10-25T08:01:30+00:00","description":"Wireshark tiene la capacidad de analizar mensajes de protocolo de sincronizaci\u00f3n que ocurren durante Couchbase Lite y Sync Gateway Replication. \u00a1Descubre c\u00f3mo hacer uso de ello!","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Wireshark_BLIP_Featured.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/10\/Wireshark_BLIP_Featured.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/cbl-sync-protocol-examination-via-wireshark\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Couchbase Lite Sync Protocol Examination via Wireshark"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"El blog de Couchbase","description":"Couchbase, la base de datos NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"El blog de Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/403326eb3d3a8dfbdce18e17ba917f5b","name":"Jim Borden, Ingeniero Superior de Software, Couchbase","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/f60249485b16e1dc6d0219a0c47e54d7","url":"https:\/\/secure.gravatar.com\/avatar\/1c1fb225bfe3fe6743ca2bd8091dcead38558b2d4164003772042f8e12cdfccb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1c1fb225bfe3fe6743ca2bd8091dcead38558b2d4164003772042f8e12cdfccb?s=96&d=mm&r=g","caption":"Jim Borden, Senior Software Engineer, Couchbase"},"description":"Senior Software Engineer @ Couchbase working on Couchbase Lite.","sameAs":["https:\/\/x.com\/borrrden"],"url":"https:\/\/www.couchbase.com\/blog\/es\/author\/jim-borden\/"}]}},"authors":[{"term_id":9118,"user_id":67726,"is_guest":0,"slug":"jim-borden","display_name":"Jim Borden, Principal Software Engineer, Couchbase","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/1c1fb225bfe3fe6743ca2bd8091dcead38558b2d4164003772042f8e12cdfccb?s=96&d=mm&r=g","author_category":"","last_name":"Borden, Principal Software Engineer, Couchbase","first_name":"Jim","job_title":"","user_url":"","description":"Ingeniero de Software Principal @ Couchbase trabajando en Couchbase Lite."}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/9374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/users\/67726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/comments?post=9374"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/9374\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media\/9525"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media?parent=9374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/categories?post=9374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/tags?post=9374"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/ppma_author?post=9374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}