Slowly upgrading some load balancers with the latest snapshots, and we get
a lot of CL entries in our logs, this caused some people to get a bit
scared.

Typical tcp dump:

13:58:55.161381 IP x.x.x.x.39812 > y.y.y.y.80: Flags [S], seq 1448645292,
win 5840, options [mss 1380,sackOK,TS val 231360268 ecr 0,nop,wscale
3,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,eol], length 0
13:58:55.161388 IP y.y.y.y.80 > x.x.x.x.39812: Flags [S.], seq 1513888944,
ack 1448645293, win 14480, options [mss 1460,sackOK,TS val 356930492 ecr
231360268,nop,wscale 8], length 0
13:58:55.304307 IP x.x.x.x.39812 > y.y.y.y.80: Flags [.], ack 1, win 730,
options [nop,nop,TS val 231360282 ecr 356930492], length 0
13:58:55.312272 IP y.y.y.y.80 > x.x.x.x.39812: Flags [F.], seq 1:161, ack
897, win 64, options [nop,nop,TS val 356930530 ecr 231360282], length 160
13:58:55.456120 IP x.x.x.x.39812 > y.y.y.y.80: Flags [.], ack 162, win 804,
options [nop,nop,TS val 231360297 ecr 356930530], length 0
13:58:55.456903 IP x.x.x.x.39812 > y.y.y.y.80: Flags [R.], seq 897, ack
162, win 804, options [nop,nop,TS val 231360297 ecr 356930530], length 0

Causes a log entry like this:

2014-02-25T13:58:55+00:00 xxx haproxy[1723059]: x.x.x.x:39812
[25/Feb/2014:13:58:55.311] http_proxy fe/be 0/0/0/1/145 301 160 - - CL--
40322/40322/0/0/0 0/0 {|} "GET /... HTTP/1.1"

- Finn Arne

Reply via email to