Hi!

Trying to configure haproxy to act as a connection broker and load
balancer for RDP (aka Microsoft Terminal Services).

While configuring the backend, I found haproxy choke on

tcp-check connect port 3389 ssl

with message:

[ALERT] 242/124152 (6066) : parsing [/etc/haproxy/haproxy.cfg:33] :
'tcp-check connect' expects 'comment', 'port', 'send-proxy' or but got
'ssl' as argument.

Within the handbook I find (section "tcp-check connect"):

tcp-check connect port 443 ssl

If it chokes on this -- is it a bug? Or anything else?

# haproxy -v
HA-Proxy version 1.7.9 2017/08/18
Copyright 2000-2017 Willy Tarreau <wi...@haproxy.org>

backend bk_rdp
  mode tcp
  balance leastconn
  timeout server 1h
  timeout connect 4s
  log global
  option tcplog
  stick-table type string len 32 size 10k expire 8h peers nxmux
  stick on rdp_cookie(mstshash)
  option tcp-check
  tcp-check connect port 3389 ssl
  default-server inter 3s rise 2 fall 3
  #server nxnode01 10.169.16.105:3389 weight 10 check
  #server nxnode02 10.169.16.106:3389 weight 10 check
  server nxnode03 10.169.16.107:3389 weight 10 check
  server nxnode04 10.169.16.108:3389 weight 10 check

-- 
Thomas

Reply via email to