On 5/1/2013 8:39 AM, Bryan Talbot wrote:
Looks like you've listed the same IP address twice.
-Bryan
Typo, Thanks.
How have I missed that??
Eliezer
On Tue, Apr 30, 2013 at 6:52 PM, Eliezer Croitoru wrote:
> server smtp1 192.168.25.1:25 maxconn 10
> server smtp2 192.168.25.1:25 maxconn 10
> ##conf end
>
> when I run the connection from other machine I get all the load on one
> machine..
>
>
Looks like you've listed the same IP
hey I have tried to build a small load balancer to a smtp service.
my haproxy.conf is:
##conf start
global
log 127.0.0.1 local0
log 127.0.0.1 local1 notice
#log loghost local0 info
maxconn 4096
#chroot /usr/share/haproxy
uid 99
gid 99
Hello All,
I had a go at adding standard sFlow instrumentation to haproxy:
https://github.com/sflow/haproxy
This implements the exact same binary-logging-over-UDP export that you get from
mod-sflow for apache, nginx-sflow-module, tomcat-sflow-valve, and more. It
supports random 1-in-N sampling
That's AWESOME! Can't believe I didn't think of that, thanks a lot
guys :)
Chris
On 30/04/2013 13:53, PiBa-NL wrote:
Hi Chriss,
That seams possible already.?.
If you have the configuration for SSL offloading configured already
all you need to add is the "ssl" option to your backend serv
Haproxy 1.5-Dev can do this already
Sent from my iPhone
On Apr 30, 2013, at 8:47 AM, Chris Sarginson wrote:
> Hi,
>
> Are there any plans to allow HAProxy to take the traffic that it can now SSL
> offload, perform header analysis, and then use an SSL encrypted connection to
> the backend ser
Hi Chriss,
That seams possible already.?.
If you have the configuration for SSL offloading configured already all
you need to add is the "ssl" option to your backend servers.
--
http://cbonte.github.io/haproxy-dconv/configuration-1.5.html#5.2
--
*ssl
Hi,
Are there any plans to allow HAProxy to take the traffic that it can now
SSL offload, perform header analysis, and then use an SSL encrypted
connection to the backend server?
I have a situation where I need to be able to use ACLs against SSL
encrypted traffic, but then continue passing t
Thanks for the feedback.
I've got it working by spliting the cert & key from the root and
intermediate CA's like this :
bind <>:443 ssl crt /etc/pki/tls/certs/<>.pem ca-file
/etc/pki/tls/certs/<>.ca.pem
Now HAProxy is working nicely with SSL :D
Thanks,
Tim
On Tue, Apr 23, 2013 at 7:19 PM, Ia
Hi, anksoWX.
HAProxy now supports SSL termination as well.
I cannot say anything about your topology, but the same can be achieved in a
better way by installing HAProxy on pfSense inside a FreeBSD jail. You can
check out the link below If you are strugging with pfSense packages for
HAProxy. I h
Benjamin Polidore writes:
>
>
> sorry, this is 1.5 dev 14.
>
> thanks.On Wed, Dec 5, 2012 at 9:17 AM, Benjamin Polidore
wrote:
> src/proxy.c:46: error: initializer element is not constant
>
>
>
>
>
>
Hi Willy,
It seems that this issue has crept into the latest haproxy-1.5-dev18 relea
11 matches
Mail list logo