Приветствую всех.

У меня возникла проблема - периодически падает OOPS, причем без всяких
сообщений об ошибке :-(
Менял версию на более раннюю - тот же эффект. При этом он нормально
проработал 8 месяцев
Причем замечено, что частота падений увеличивается к коцу рабочего дня
16:00 - 18:00, когда нагрузка возрастает.

Имеется FreeBSD 4.3, oops version 1.5.22f1, storage - DB4

oops.cfg :


 nameserver 127.0.0.1
 http_port   3128
icp_port    3130
userid      oops
logfile           /var/log/oops/oops.log { 3 1m } unbuffered
accesslog   /var/log/oops/access.log { 90 1000m } unbuffered
# accesslog /var/log/oops/ALL_access.log unbuffered
pidfile           /var/run/oops/oops.pid
statistics  /var/log/oops/oops_statfile
mem_max           16m
lo_mark           1k
default-expire-value    7
ftp-expire-value  7
max-expire-value        30
last-modified-factor    5
default-expire-interval 24
icp_timeout 7000
disk-low-free     1
disk-ok-free      3
## force_http11
always_check_freshness
force_completion 75
maxresident 1m
minresident 1k
insert_via        yes
fetch_with_client_speed yes
insert_x_forwarded_for  yes
insert_via        yes
##
#     ACLs - currently: urlregex, urlpath, usercharset
#           port, dstdom, dstdom_regex, src_ip, time
#           each acl can be loaded from file.
##
#acl  CACHEABLECGI      urlregex
http://www\.topping\.com\.ua/cgi-bin/pingstat\.cgi\?072199131826
#acl  WWWPACO           urlregex    www\.paco\.net
#acl  NO_RLH            urlregex    zipper
#acl  REWRITEPORTS      urlregex    (www.job.ru|www.sale.ru)
#acl  REWRITEHOSTS      urlregex    (www.asm.ru|zipper\.paco)
#acl  WINUSER           usercharset windows-1251
#acl  DOSUSER           usercharset ibm866
#acl  UNIXUSER    usercharset koi8-r
#acl  RUS         dstdom            ru su
#acl  UKR         dstdom            ua
#acl  BADPORTS    port        [0:79],110,138,139,513,[6000:6010]
#acl  BADDOMAIN   dstdom            baddomain1.com baddomain2.com
#acl  BADDOMREGEX dstdom_regex      baddomain\.((com)|(org))
acl   LOCAL_NETWORKS    src_ip
include:/usr/local/etc/oops/acl_local_networks
#acl  BADNETWORKS src_ip            192.168.10/24
#acl  WORKTIME    time        Mon,Tue:Fri 0900:1800
#acl  HTMLS       content_type      text/html
#acl  USERS       username    joe
acl   WWWPACO           urlregex    www\.torba\.com
acl   MSIE        header_substr     user-agent MSIE
acl   ADMINS            src_ip            127.0.0.1
acl   PURGE       method            PURGE
acl   CONNECT           method            CONNECT
acl   SSLPORT           port        443
acl   GATOR       urlregex    http://ts\.gator\.com

##
#     acl_deny [!]ACL [!]ACL ...
#     deny access for combined acl
##
acl_deny PURGE !ADMINS
acl_deny CONNECT !SSLPORT
acl_deny USERS
acl_deny GATOR

refresh_pattern        WWWPACO         2 2% 5

stop_cache  ?
stop_cache  cgi-bin

connect-from   proxy

peer         proxy.parent.net 3128 3130 {
            parent;
            allow dstdomain * ;
      }

local-networks    192.168/16

group   directors   {

        networks        192.168.2.18/32 192.168.2.19/32 192.168.2.26/32
192.168.2.32/32 192.168.2.45/32 192.168.2.47/32 192.168.2.52/32
192.168.2.69/32 ;
        badports        [0:79],110,138,139,513,[6000:6010] ;
        miss            allow;
        auth_mods       passwd_file;
        http    {
        allow   dstdomain * ;
                }
        }

group admins      {

      networks    192.168.2.1/32 192.168.2.8/32 192.168.2.12/32
192.168.2.16/32 192.168.2.27/32 192.168.2.100/32;
      badports    [0:79],110,138,139,513,[6000:6010] ;
      miss        allow;
      auth_mods   passwd_file;
      http  {
      allow dstdomain * ;
            }
      icp   {
            allow   dstdomain * ;
            }
      }


group   managers    {

        networks        192.168.2.15/32 192.168.2.28/32 192.168.2.30/32
192.168.2.34/32 192.168.2.35/32 192.168.2.40/32 192.168.2.44/32
192.168.2.55/32 192.168.2.65/32 ;
        badports        [0:79],110,138,139,513,[6000:6010] ;
        miss            allow;
#       denytime        Sun:Sat 1400:1430
        auth_mods       passwd_file;
        bandwidth       2000;
        per_ip_conn     20;
        http    {
        allow   dstdomain * ;
                }
        }

group   grow        {

        networks        192.168.2.21/32 192.168.2.54/32 ;
        badports        [0:79],110,138,139,513,[6000:6010] ;
        miss            allow;
        auth_mods       passwd_file;
        bandwidth       2000;
        per_ip_conn     10;
        http    {
        allow   dstdomain * ;
                }
        }

group   staff       {

        networks        192.168.2.2/32 192.168.2.5/32 192.168.2.9/32
192.168.2.13/32 192.168.2.14/32 192.168.2.20/32 192.168.2.23/32
192.168.2.24/32 192.168.2.25/32 192.168.2.36/32 192.168.2.41/32
192.168.2.56/32 192.168.2.61/32 192.168.2.66/32 192.168.2.6/32
192.168.2.7/32 192.168.2.67/32 192.168.2.68/32 ;
        badports        [0:79],110,138,139,513,[6000:6010] ;
        miss            allow;
#       denytime        Sun:Sat 1400:1430
        auth_mods       passwd_file;
        bandwidth       2000;
        per_ip_conn     50;
        http    {
        allow   dstdomain * ;
                }
        }

group   in {

        networks        192.168.2.29/32 192.168.2.37/32 192.168.2.42/32
192.168.2.43/32 192.168.2.46/32 192.168.2.59/32 192.168.2.60/32 ;
        badports        [0:79],110,138,139,513,[6000:6010] ;
        miss            allow;
#       denytime        Sun:Sat 1400:1430
        auth_mods       passwd_file;
        bandwidth       2000;
        per_ip_conn     10;
        http    {
        allow   dstdomain * ;
                }
        }

group   shop_N1        {

        networks        192.168.1.7/32 192.168.1.8/32 192.168.1.10/32
192.168.1.11/32 192.168.1.12/32 192.168.1.13/32 192.168.1.14/32 ;
        badports        [0:79],110,138,139,513,[6000:6010] ;
        miss            allow;
###       denytime        Sun:Sat 1400:1430
        auth_mods       passwd_file;
        bandwidth       2000;
        per_ip_conn     10;
        http    {
        allow   dstdomain * ;
                }
        }

group shop_N2     {

        networks        192.168.10.0/28 192.168.10.30/32 ;
        badports        [0:79],110,138,139,513,[6000:6010] ;
        miss            allow;
#       denytime        Sun:Sat 1400:1430
       bandwidth       2000;
        per_ip_conn     10;
        auth_mods       passwd_file;
        http    {
        allow   dstdomain * ;
                }
        }

group   shop_N3      {

        networks        192.168.11.2/32 ;
        badports        [0:79],110,138,139,513,[6000:6010] ;
        miss            allow;
        auth_mods       passwd_file;
        bandwidth       2000;
        per_ip_conn     3;
        http    {
        allow   dstdomain * ;
                }
        }

group   N3        {

        networks        192.168.2.48/32 192.168.2.49/32 192.168.2.53/32
192.168.2.58/32 192.168.2.62/32 192.168.2.63/32 192.168.2.64/32 ;
        badports        [0:79],110,138,139,513,[6000:6010] ;
        miss            allow;
#       denytime        Sun:Sat 1400:1430
        auth_mods       passwd_file;
#       bandwidth       1000;
#       per_ip_conn     10;
        http    {
        allow   dstdomain * ;
                }
        }

group   commercial_1    {

        networks        192.168.2.31/32 192.168.2.39/32 192.168.2.71/32
192.168.2.130/32 ;
        badports        [0:79],110,138,139,513,[6000:6010] ;
        miss            allow;
        auth_mods       passwd_file;
        http    {
        allow   dstdomain * ;
                }
        }

group   commercial_2    {

        networks        172.16.16.11/32 172.16.16.14/32 10.10.10.6/32
10.10.10.7/32 ;
        badports        [0:79],110,138,139,513,[6000:6010] ;
        redir_mods      transparent;
        miss            allow;
        http    {
        allow   dstdomain * ;
                }
        }

group   dialup_day      {

        networks        192.168.5.1/32 192.168.5.101/32 ;
        badports        [0:79],110,138,139,513,[6000:6010] ;
        miss            allow;
        auth_mods       passwd_file;
        bandwidth       2000;
        per_ip_conn     5;
        http    {
        allow   dstdomain * ;
                }
        }


group world {
      networks    0/0;
      badports    [0:79],110,138,139,513,[6000:6010];
      http {
            deny  dstdomain * ;
      }
      icp {
            deny  dstdomain * ;
      }
}

# storage {
#     path /var/news/oops/storages/oops_storage ;
#     size 1g ;
# }

storage {
      path /var/proxy/oops/storages/oops_storage ;
      size 4350m ;
 }

module lang {

      default_charset   koi8-r

      # Recode tables and other charset stuff
      CharsetRecodeTable windows-1251 /usr/local/etc/oops/tables/koi-win.tab
      CharsetRecodeTable ISO-8859-5 /usr/local/etc/oops/tables/koi-iso.tab
      CharsetRecodeTable ibm866 /usr/local/etc/oops/tables/koi-alt.tab
      CharsetAgent windows-1251 AIR_Mosaic IWENG/1 MSIE WinMosaic (Windows
(WinNT;
      CharsetAgent windows-1251 (Win16; (Win95; (Win98; (16-bit) Opera/3.0
      CharsetAgent ibm866 DosLynx Lynx2/OS/2
}

module err {
      # error reporting module

      # template
      template /usr/local/etc/oops/err_template.html

      # Language to use when generate Error messages
      lang ru
}

module passwd_file {
      # password proxy-authentication module
      #
      # default realm, scheme and passwd file
      # the only thing you really want to change is 'file' and 'template'
      # you don't have to reconfigure oops if you only
      # change content passwd file or template: oops authomatically
      # reload file

#     realm       oops
      realm       Sergey V.Bondar < [EMAIL PROTECTED] >
      scheme            Basic
#     scheme            Digest
      file        /usr/local/etc/oops/passwd
      template    /usr/local/etc/oops/auth_template.html
}

module passwd_mysql {
      # proxy authentication usin mysql
      # "Ivan B. Yelnikov" <[EMAIL PROTECTED]>
      #
      # look passwd_pgsql description
      #
        scheme          Basic
        realm           oops
        host            <host address/name>
        user            <database_user>
        password        <user_password>
        database        <database_name>
        select          /usr/local/etc/oops/select.sql
        template        /usr/local/etc/oops/auth_template.html
}

module redir {
      file        /usr/local/etc/oops/redir_rules
      template    /usr/local/etc/oops/redir_template.html
}

module oopsctl {
      # path to oopsctl unix socket
      # socket_path     /tmp/oopsctl
      socket_path /var/run/oops/oopsctl
      # time to auto-refresh page (seconds)
        html_refresh    300
}

module      vary {
      user-agent  by_charset
      accept-charset    ignore
}

module      berkeley_db {
      dbhome      /var/proxy/oops/DB
      dbname      index.db
      db_cache_mem      4m
}

module customlog {
      path    /var/log/oops/month
#     squid httpd mode log emulation
#     buffered
#     format  "%h %A %t %b \"%r\" %u %s %m:%k"
#     format  "%h %u %l %t \"%r\" %s %b %m:%k"
      format  "%t %b %A %t %b \"%r\" %s %u %b"
}

module transparent {
      myport            3128
#     broken_browsers   MSIE
}

=====================================================================
If you would like to unsubscribe from this list send message to
[EMAIL PROTECTED] with "unsubscribe oops" in message body.
Archive is accessible on http://lists.paco.net/oops-rus/

Дати відповідь електронним листом