Return-Path: Delivered-To: apmail-httpd-users-archive@www.apache.org Received: (qmail 98309 invoked from network); 8 Mar 2009 17:03:31 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 8 Mar 2009 17:03:31 -0000 Received: (qmail 29690 invoked by uid 500); 8 Mar 2009 17:03:20 -0000 Delivered-To: apmail-httpd-users-archive@httpd.apache.org Received: (qmail 29679 invoked by uid 500); 8 Mar 2009 17:03:20 -0000 Mailing-List: contact users-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: users@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list users@httpd.apache.org Received: (qmail 29670 invoked by uid 99); 8 Mar 2009 17:03:20 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Sun, 08 Mar 2009 10:03:20 -0700 X-ASF-Spam-Status: No, hits=2.2 required=10.0 tests=HTML_MESSAGE,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of floweringweeds@hotmail.com designates 65.55.34.88 as permitted sender) Received: from [65.55.34.88] (HELO col0-omc2-s14.col0.hotmail.com) (65.55.34.88) by apache.org (qpsmtpd/0.29) with ESMTP; Sun, 08 Mar 2009 17:03:09 +0000 Received: from COL114-W70 ([65.55.34.72]) by col0-omc2-s14.col0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Sun, 8 Mar 2009 10:02:48 -0700 Message-ID: Content-Type: multipart/alternative; boundary="_9ec95c87-ce1b-4edb-9d36-cbded0f069ac_" X-Originating-IP: [66.169.164.190] From: Flowering Weeds To: Date: Sun, 8 Mar 2009 12:02:48 -0500 Importance: Normal MIME-Version: 1.0 X-OriginalArrivalTime: 08 Mar 2009 17:02:48.0612 (UTC) FILETIME=[B575CE40:01C9A00F] X-Virus-Checked: Checked by ClamAV on apache.org Subject: [users@httpd] Debugging Apache With PowerShell --_9ec95c87-ce1b-4edb-9d36-cbded0f069ac_ Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable =20 =20 In the thread Real time thread tracking http://mail-archives.apache.org/mod_mbox/httpd-users/200903.mbox/%3c4df3a13= 30903071903o5b67ec90m1adba40182ff5900@mail.gmail.com%3e =20 Under the words =20 > As for debugging with PowerShell look at these classes =20 Brian Mearns said =20 No one asked or even mentioned debugging with PowerShell. =20 Mmm in the thread Real time thread tracking http://mail-archives.apache.org/mod_mbox/httpd-users/200903.mbox/%3c1404e59= 10903071316n4d2758d8y91cd372f7ef10be2@mail.gmail.com%3e =20 Eric Covener asked =20 > Can PowerShell give us backtraces of a running httpd? =20 >From Backtraces - The GNU C Library http://www.gnu.org/software/libc/manual/html_node/Backtraces.html =20 "A backtrace is a list of the function calls that are currently active in a thread. The usual way to inspect a backtrace of a program is to use an external debugger such as gdb." =20 Mmm an external debugger =20 WinDbg - Wikipedia=2C the free encyclopedia http://en.wikipedia.org/wiki/WinDbg =20 "WinDbg is a multipurpose debugger for Microsoft Windows=2C=20 distributed on the web by Microsoft." =20 Now under > Can PowerShell give us backtraces of a running httpd? =20 Flowering Weeds replied =20 Windows PowerShell is a .NET admin's automation tool =20 Automate what ever one does more than once! =20 Combine PowerShell with dump process programs=2C or .NET tracking class information=2C then perhaps data parse=2C perhaps by Log Parser=2C and then bingo! =20 All within .NET PowerShell. =20 And now examples that Apache users can follow: =20 PowerDbg - Automated Debugging using WinDbg and PowerShell - Home http://www.codeplex.com/powerdbg =20 For some examples concerning debugging read the below blog (PowerShell starts near) =20 Debugging Toolbox : [PowerShell Script] PowerDbg =96 Using PowerShell to Co= ntrol WinDbg http://blogs.msdn.com/debuggingtoolbox/archive/2007/09/05/powershell-script= -powerdbg-using-powershell-to-control-windbg.aspx =20 Once again thanks to all for helping to explain how to use PowerShell for debugging any process - even Apache based processes! =20 =20 _________________________________________________________________ Hotmail=AE is up to 70% faster. Now good news travels really fast.=20 http://windowslive.com/online/hotmail?ocid=3DTXT_TAGLM_WL_HM_70faster_03200= 9= --_9ec95c87-ce1b-4edb-9d36-cbded0f069ac_ Content-Type: text/html; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable  =3B
 =3B
In the thread Real time thread tracking
http://mail-archives.apache.org/mod_mbo= x/httpd-users/200903.mbox/%3c4df3a1330903071903o5b67ec90m1adba40182ff5900@m= ail.gmail.com%3e
 =3B
Under the words
 =3B
>=3B As for debugging with PowerShell look at these classes
 =3B
Brian Mearns said
 =3B
No one asked or even mentioned debugging with PowerShell.
 =3B
Mmm in the thread Real time thread tracking
http://mail-archives.apache.org/mod= _mbox/httpd-users/200903.mbox/%3c1404e5910903071316n4d2758d8y91cd372f7ef10b= e2@mail.gmail.com%3e
 =3B
Eric Covener asked
 =3B
>=3B Can PowerShell give us backtraces of a running httpd?
 =3B
>From Backtraces - The GNU C Library
http://www.gnu.org/software/libc/= manual/html_node/Backtraces.html
 =3B
"A backtrace is a list of the function calls that are currently
active i= n a thread. The usual way to inspect a backtrace of a
program is to use = an external debugger such as gdb."
 =3B
Mmm an external debugger
 =3B
WinDbg - Wikipedia=2C the free encyclopedia
http://en.wikipedia.org/wiki/WinDbg
 =3B
"WinDbg is a multipurpose debugger for Microsoft Windows=2C
distributed= on the web by Microsoft."
 =3B
Now under

>=3B Can PowerShell give us backtraces of a running httpd?
 =3B
Flowering Weeds replied
 =3B
Windows PowerShell is a .NET admin's automation tool
 =3B
Automate what ever one does more than once!
 =3B
Combine PowerShell with dump process programs=2C
or .NET tracking class = information=2C then perhaps
data parse=2C perhaps by Log Parser=2C and t= hen bingo!
 =3B
All within .NET PowerShell.
 =3B
And now examples that Apache users can follow:
 =3B
PowerDbg - Automated Debugging using WinDbg and PowerShell - Home
http://www.codeplex.com/powerdbg=
 =3B
For some examples concerning debugging read the below blog
(PowerShell s= tarts near)
 =3B
Debugging Toolbox : [PowerShell Script] PowerDbg =96 Using PowerShell to Co= ntrol WinDbg
http://blogs.msdn.com/debuggingtoolbox/archive/2007/09/05/powershell-scr= ipt-powerdbg-using-powershell-to-control-windbg.aspx
 =3B
Once again thanks to all for helping to
explain how to use PowerShell fo= r debugging
any process - even Apache based processes!
 =3B
 =3B


Hotmail=AE is up to 70% faster. Now good news trave= ls really fast. Find out more. = --_9ec95c87-ce1b-4edb-9d36-cbded0f069ac_--