Ultimate Software Customer DB

2016-04-05 Thread Tracy Marino
Hi,

Would you be interested in Ultimate Software users email list for your email 
campaigns? We provide the Database across North America, EMEA, APAC and Latin 
America.


We also have other technology users like workday, ceridian, Hadoop, Logstash, 
Cisco, HP Networking, IBM, Brocade, Fortinet, Aruba Networks, EMC, Avaya, 
Hitachi, Netgear, Netapp ADP, paylocit and many more...

IT contacts: IT Security Head, Network and Systems Administrator, Information 
Technology & Network Consultant, Security Specialist, Data Center Support 
Specialist, Chief Technology Officer, Chief Information Officer, Computer and 
Information Systems Manager, Director of IT, Network Engineer, Senior 
Applications Engineer, Database Administrator, Network Architect, 
Infrastructure Architect, Director of IT Infrastructure etc.

Information Fields - Name, Title, Email, Phone Numbers, Company Name, and 
Company Details like, Physical Address, Web Address, Revenue Size, Employee 
Size and industry.

Please review and let me know what technology users you are interested in and I 
will get back to you with more information for the same.

Thanks,
Tracy
Specialist

To Opt Out, please respond "Leave Out" in the Subject line.






Re: Q: about HTTP/2

2016-04-05 Thread Shawn Heisey
On 4/2/2016 6:23 AM, Dennis Jacobfeuerborn wrote:
> What about the multiplexing of connections? If you use http 1.x to
> communicate with the servers you effectively nullify that 2.0 feature.
> At least in theory in order to actually get all the benefits from http/2
> you need support for the client side and unencrypted support on the
> server side to prevent having to re-encrypt data (or some form of
> persistent connection pooling to minimize the new establishment of
> connections to the server).

Although having multiplexing support for the backend would certainly
help performance, normally a LAN is fast enough that the only
significant cost to establishing many connections is the number of
simultaneous open sockets.  This *is* a worry for extremely high traffic
sites, but many sites (including mine) do not receive enough traffic for
that to be a problem.

Latency for a LAN is probably one millisecond or less, while on the
Internet side latencies up to several hundred milliseconds are
possible.  If everything from the client to haproxy is using one HTTP/2
connection, performance on my LAN backend should be very good even if
it's running HTTP/1.1 without keepalive.  Eventually, I'd upgrade the
backend to HTTP/2 as well.  If I were to upgrade both at the same time,
and there was a problem, I would not know which change *caused* the problem.

I think that HTTP/2 server support (facing the Internet) is *slightly*
more important in haproxy than HTTP/2 client support (facing the
servers), but only slightly.  High-traffic sites need both.

Thanks,
Shawn




Re: [CLEANUP]: proto_http

2016-04-05 Thread Willy TARREAU
Hi David,

On Mon, Apr 04, 2016 at 11:52:06AM +0100, David CARLIER wrote:
> HI all,
> 
> After the important cleanup of this week end, here a much more modest one.
> Basically some gcc warnings suppressions.
> 
> Hope it is useful.

Applied, thank you!
Willy




Re: rewrite URL

2016-04-05 Thread Vincent Gallissot
Hi Marius,

I don't know if it's possible to do it in one time, but I would do a mapping 
for the host 
(http://blog.haproxy.com/2015/01/26/web-application-name-to-backend-mapping-in-haproxy/)

Then rewriting the URL in the right backend section with something like :
reqrep ^([^\ ]*)\ /(.*).html\ (.*)  \1\ \2.new.html\ \3

I didn't tested the previous line but it should be somethink like that.

Vincent

On 04/05/2016 03:16 PM, marius matei wrote:
> Hello,
>
> I'd like to know if there is a method and how to redirect the requests
> coming to a static URL from  frontend to backend like this:
>
> http://example.com/url.html -> http://example/url.new.html
>
> the rest of the links should stay untouched.
>
> thanks in advance,
> Marius
>

-- 
Vincent Gallissot
System & network administrator
M6 Web - Groupe M6 
49 quai Rambaud 69002 LYON - FRANCE
Tel : +33(0)4 26 83 70 87




ARAID5000 ECODE 2807

2016-04-05 Thread sales
Title: ARAID500







	
		 
		
		is this email properly 
		displayed ?   
		View on the 
		browser
	
	
		
		
		
	
	
		
		
			

Dear Premier Partner,   

The latest ARAID Version is 
now available: 
			
			
 
			
			

Hamburg , 05.04.2016
			
		
		
			



ARAID 5000 für 2x 3,5"HDDs

RAID 0, 1   


  


ARAID 3500 für 2x 3,5"HDDs

RAID 0, 1   

  



ARAID M300 für 2x2,5" HDDs
RAID 0, 1 



			
			



Download Datasheet ARAID 5000


Download Datasheet ARAID 
3500


Download Datasheet ARAID M300
 
			
			
 
 
 
 
			
		
		
			


	
	
	The RAID 5000 supports in addition the fast 
	SATA 3 standard. 
	
	
	ARAID is a completely OS independent RAID 
	system. It doesn?t require a driver and doesn?t need 
	processing power of the system CPU.
	 
	
		
		
		It backs up your data reliably 
		automatically and protects 24x7 against data loss of 
		disk errors. For ARAID systems are used  only high 
		quality components for the 24x7 mode for instance Sanyo 
		Denki fan for years of reliable cooling.


 

 

         Metal 
Chassis and Sanyo Denki Cooler 
 
			
		
		
			


 


Optional available additional trays offer the 
opportunity to generate detailed Back-ups "Hot Swap" during 
operation


 
 
  
  

    
additional Tray for ARAID 

			
		
		
			

 
 


The RAID system is developed especially for 
system-critical applications with high system stability (oder 
zum 3x reliability)


Thousands of applications, especially in active 
production systems in industrial environments, prove the high 
reliability of these systems since many years
 

	
		
		
		Greetings from Hamburg (Germany)

 
 
Ihr Premier 
Team

			
		
		
	

 
 
 

	
		
		Visit our website : 
		www.premiercomputer.de 
	
	
		
		
			


Premier Computer Handels GmbH

Billwerder Ring 3
21035 Hamburg / Germany


http://www.premiercomputer.de



off...@premiercomputer.de
Tel:    +49 (0) 40 736161-0
Fax:   +49 (0) 40 736161-33


All prices quoted are , unless 
otherwise indicated from stock Hamburg / Germany , excl . VAT .

If you no longer wish mailing information then please let us 
know
< hier >
			
		
		
	









Re: Increased CPU usage after upgrading 1.5.15 to 1.5.16

2016-04-05 Thread Nenad Merdanovic
Hello Lukas,

On 4/4/2016 8:56 PM, Lukas Tribus wrote:
> Hi Nenad,
> 
> 
>> I suggest you try reverting commit 7610073a. I have exhibited very
>> similar issues and everything points to this commit (which was Willy's
>> first suspect).
> 
> So I assume this affects 1.6 and 1.7-dev as well, the bug is not
> specific to the
> 1.5 backport, right?

I am not sure, as I haven't even be able to reliably reproduce it on 1.5
(though we are running with some backports from 1.6) as it seems to be
traffic-pattern related. On one workload I exhibit instant and constant
jump in CPU usage (from 40% to 80-100%, about 50:50 sys:usr), but on
other, there are just some very short spikes to 100%.

That being said, I haven't been able to devote any time to debugging
this. There are specific workloads where this commit improves
performance, so I don't think simply reverting that is an option
(although the gain on those is 15-20%, while the loss here is much more).

Regards,
Nenad



Re: Haproxy running on 100% CPU and slow downloads

2016-04-05 Thread Sachin Shetty
Hi Lukas, Pavlos,

Thanks for your response, more info as requested.

1. Attached conf with some obfuscation
2. Haproxy -vv
HA-Proxy version 1.5.4 2014/09/02
Copyright 2000-2014 Willy Tarreau 


Build options :
  TARGET  = linux2628
  CPU = generic
  CC  = gcc
  CFLAGS  = -O2 -g -fno-strict-aliasing -DTCP_USER_TIMEOUT=18
  OPTIONS = USE_LINUX_TPROXY=1 USE_ZLIB=1 USE_REGPARM=1 USE_OPENSSL=1
USE_PCRE=1


Default settings :
  maxconn = 2000, bufsize = 16384, maxrewrite = 8192, maxpollevents = 200


Encrypted password support via crypt(3): yes
Built with zlib version : 1.2.7
Compression algorithms supported : identity, deflate, gzip
Built with OpenSSL version : OpenSSL 1.0.1e-fips 11 Feb 2013
Running on OpenSSL version : OpenSSL 1.0.1e-fips 11 Feb 2013
OpenSSL library supports TLS extensions : yes
OpenSSL library supports SNI : yes
OpenSSL library supports prefer-server-ciphers : yes
Built with PCRE version : 8.32 2012-11-30
PCRE library supports JIT : no (USE_PCRE_JIT not set)
Built with transparent proxy support using: IP_TRANSPARENT
IPV6_TRANSPARENT IP_FREEBIND


Available polling systems :
  epoll : pref=300,  test result OK
   poll : pref=200,  test result OK
 select : pref=150,  test result OK
Total: 3 (3 usable), will use epoll.

3. uname -a

Linux avl-www10.dc.egnyte.lan 3.10.0-327.10.1.el7.x86_64 #1 SMP Tue Feb 16
17:03:50 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux
[sshetty@avl-www10 haproxy_l1_sync]$

4. rfc5077-client seems ok

[✔] Prepare tests.
[✔] Run tests without use of tickets.
[✔] Display result set:
│  IP address│ Try │ Cipher│ Reuse
│SSL Session ID   │  Master key │ Ticket │ Answer
│ 
───┼─┼───┼───┼─
┼─┼┼───
│ 208.83.105.14  │   0 │ ECDHE-RSA-AES256-SHA  │   ✘
│ 40A2D3E903C2457551… │ B4A08BB73457356AA2… │   ✘│ HTTP/1.1 200 OK
│ 208.83.105.14  │   1 │ ECDHE-RSA-AES256-SHA  │   ✔
│ 40A2D3E903C2457551… │ B4A08BB73457356AA2… │   ✘│ HTTP/1.1 200 OK
│ 208.83.105.14  │   2 │ ECDHE-RSA-AES256-SHA  │   ✔
│ 40A2D3E903C2457551… │ B4A08BB73457356AA2… │   ✘│ HTTP/1.1 200 OK
│ 208.83.105.14  │   3 │ ECDHE-RSA-AES256-SHA  │   ✔
│ 40A2D3E903C2457551… │ B4A08BB73457356AA2… │   ✘│ HTTP/1.1 200 OK
│ 208.83.105.14  │   4 │ ECDHE-RSA-AES256-SHA  │   ✔
│ 40A2D3E903C2457551… │ B4A08BB73457356AA2… │   ✘│ HTTP/1.1 200 OK
[✔] Dump results to file.
[✔] Run tests with use of tickets.
[✔] Display result set:
│  IP address│ Try │ Cipher│ Reuse
│SSL Session ID   │  Master key │ Ticket │ Answer
│ 
───┼─┼───┼───┼─
┼─┼┼───
│ 208.83.105.14  │   0 │ ECDHE-RSA-AES256-SHA  │   ✘
│ E4559330FD100E69F5… │ 05F768F5574FD27E88… │   ✔│ HTTP/1.1 200 OK
│ 208.83.105.14  │   1 │ ECDHE-RSA-AES256-SHA  │   ✔
│ E4559330FD100E69F5… │ 05F768F5574FD27E88… │   ✔│ HTTP/1.1 200 OK
│ 208.83.105.14  │   2 │ ECDHE-RSA-AES256-SHA  │   ✔
│ E4559330FD100E69F5… │ 05F768F5574FD27E88… │   ✔│ HTTP/1.1 200 OK
│ 208.83.105.14  │   3 │ ECDHE-RSA-AES256-SHA  │   ✔
│ E4559330FD100E69F5… │ 05F768F5574FD27E88… │   ✔│ HTTP/1.1 200 OK
│ 208.83.105.14  │   4 │ ECDHE-RSA-AES256-SHA  │   ✔
│ E4559330FD100E69F5… │ 05F768F5574FD27E88… │   ✔│ HTTP/1.1 200 OK
[✔] Dump results to file.







On 4/5/16, 12:14 AM, "Lukas Tribus"  wrote:

>Hi Sachin,
>
>
>(due to email troubles on my side this may look like a new thread, sorry
>about that)
>
>
> > We have quite a few regex and acls in our config, is there a way to
>profile
> > haproxy and see what could be slowing it down?
>
>You can use strace for syscalls or ltrace for library calls to see if
>something
>in particular shows up, but perf may be the better tool for this job (I
>never
>used it though).
>
>
>Like Pavlos said, lets collect some basic informations first:
>
>- haproxy -vv output
>- uname -a
>- configuration (replace proprietary informations but leave everything
>else intact)
>- does TLS resumption correctly work? Check with rfc5077-client:
>
>git clone https://github.com/vincentbernat/rfc5077.git
>cd rfc5077
>make rfc5077-client
>
>
>./rfc5077-client 
>
>
>
>There's a chance that it is SSL/TLS related.
>
>
>
>Regards,
>
>Lukas
>



haproxy.sync.conf
Description: Binary data