On Wed, Aug 21, 2013 at 10:25:58AM +0200, Willy Tarreau wrote:
Hi Malcolm,
On Thu, Aug 15, 2013 at 06:34:16PM +0100, Malcolm Turnbull wrote:
I've put up a quick blog entry here:
On Thu, Aug 22, 2013 at 03:55:23PM +0900, Simon Horman wrote:
On Wed, Aug 21, 2013 at 10:25:58AM +0200, Willy Tarreau wrote:
Hi Malcolm,
On Thu, Aug 15, 2013 at 06:34:16PM +0100, Malcolm Turnbull wrote:
I've put up a quick blog entry here:
Hi Sam!
It appears that the syslog packets generated by 1.5dev19 do not always
end in a newline. They appear to end in a newline, followed by two bytes
of the last syslog buffer.
Is this happen randomly or can you pin point this to specifc requests, maybe
errors/timeouts? How can we
On Tue, Aug 13, 2013 at 04:56:57PM +0200, Willy Tarreau wrote:
On Tue, Aug 13, 2013 at 03:36:09PM +0100, Scott McKeown wrote:
Hi Guys,
I've not applied any patches to the download as this was a direct 'wget'
from the Git repository.
As follows is the OpenSSL v1.0.0 Centos 6.4 x64 build
Let us know there, so I can test it as soon as released :)
Baptiste
On Thu, Aug 22, 2013 at 9:01 AM, Willy Tarreau w...@1wt.eu wrote:
On Thu, Aug 22, 2013 at 03:55:23PM +0900, Simon Horman wrote:
On Wed, Aug 21, 2013 at 10:25:58AM +0200, Willy Tarreau wrote:
Hi Malcolm,
On Thu, Aug 15,
The parameters of srv_downtime and srv_getinter are not modified
and thus may be const.
Signed-off-by: Simon Horman ho...@verge.net.au
---
include/proto/server.h | 4 ++--
src/server.c | 4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/include/proto/server.h
This is in preparation for associating a agent check
with a server which runs as well as the server's existing check.
Signed-off-by: Simon Horman horms+rene...@verge.net.au
---
v5
* Rebase
---
include/types/server.h | 1 +
src/cfgparse.c | 1 +
src/checks.c | 2 +-
3 files
In the case where an agent check returns fail, stopped or down,
log this as info when logging the server status along with any
trailing message returned by the agent after fail, stopped or down.
Previously only the trailing message was logged as info and
if omitted no info was logged.
Replace the current header parser, which simply skips the headers,
with a version that allows matching of a key in a header.
This is in preparation for supporting agent check results
returned in an HTTP header.
Signed-off-by: Simon Horman ho...@verge.net.au
---
src/checks.c | 94
Move result element from struct server to struct check
This allows check results to be independent of the check's server.
This is in preparation for associating a agent check
with a server which runs as well as the server's existing check.
Signed-off-by: Simon Horman ho...@verge.net.au
---
This is in preparation for struct server having two elements
of type struct check.
Signed-off-by: Simon Horman ho...@verge.net.au
---
v5
* Remove server argument from init_check. It is not used.
* Set type in init_check
This allows a zero type to be used to indicate that
a task for a
Add state to struct check. This is currently used to store one bit,
CHK_RUNNING, which is set if a check is running and clear otherwise.
This bit was previously SRV_CHK_RUNNING of the state element of struct
server.
This is in preparation for associating a agent check
with a server which runs as
!)
which is 55 commits after v1.5-dev19.
Availability
To aid review I have made this series available in git at:
https://github.com/horms/haproxy.git agent-check-20130822
Overall Diffstat:
doc/configuration.txt | 140 -
include/common/defaults.h |2 +
include/proto/checks.h|4
Add an external check which makes use of an external process to
check the status of a server.
---
v6
* Correct implementation and documentation of arguments to external-check
command so that they are consistent with both each other and ldirectord's
external check. The motivation being to
This is in preparation for associating a agent check
with a server which runs as well as the server's existing check.
The split has been made by:
* Moving elements of struct server's check element that will
be shared by both checks into a new check_common element
of struct server.
* Moving
Allow an agent check to be run in conjunction with one other server
health check.
If the backend for a server check is not lb-agent-chk then an agent
check may also be run using the agent-check parameter to a server,
which sets the TCP port to be used for the agent check.
e.g.
server web1_1
Break agent check handling out of event_srv_chk_r().
This is in preparation for supporting agent check results
returned in an HTTP header.
Signed-off-by: Simon Horman ho...@verge.net.au
---
src/checks.c | 97
1 file changed, 52
Move {,fast,down}inter elements from struct server to struct check.
This allows those elements of a check to be independent of the check's server.
This is in preparation for associating a agent check
with a server which runs as well as the server's existing check.
Signed-off-by: Simon Horman
Paramatise the following functions over the check of a server
* set_server_down
* set_server_up
* srv_getinter
* server_status_printf
* set_server_check_status
* set_server_disabled
Generally the server parameter of these functions has been removed.
Where it is still needed it is obtained using
Add a DRAIN sub-state for a server which
will be shown on the stats page instead of UP if
an agent check is in use and the agent has most recently returned drain.
Signed-off-by: Simon Horman ho...@verge.net.au
---
include/types/server.h | 3 ++-
src/checks.c | 7 +++
This is in preparation for associating a agent check
with a server which runs as well as the server's existing check.
Signed-off-by: Simon Horman ho...@verge.net.au
---
include/types/server.h | 3 ++-
src/cfgparse.c | 10 +-
src/checks.c | 50
In the case where agent-port is used and the agent
check is a secondary check to not mark a server as down
if the agent becomes unavailable.
In this configuration the agent should only cause a server to be marked
as down if the agent returns fail, stopped or down.
Signed-off-by: Simon Horman
This is in preparation for adding a new type of check that
uses a process rather than a socket.
Signed-off-by: Simon Horman ho...@verge.net.au
---
v4
* Use check-type in establish_conn_chk()
Use check-type instead of s-proxy-options2 PR_O2_CHK_ANY
as the former is specific to the check
This is achieved by moving rise and fall from struct server to struct check.
After this move the behaviour of the primary check, server-check is
unchanged. However, the secondary agent check, server-agent now has
independent rise and fall values each of which are set to 1.
The result is that
The syntax of this new command is:
set agent backend/server pause|unpause
This command changes the behaviour of agent checks as follows:
In the case where an agent check is being run as a secondary check,
due to the agent-port parameter of a server directive, new checks
are only initialised
Allow agent checks to obtain information in
an HTTP header of the response to an http check.
Signed-off-by: Simon Horman ho...@verge.net.au
---
v4
* Do not duplicate code that is in process_result()
v2 - v3
* No change
---
doc/configuration.txt | 24 +--
include/types/proxy.h | 2
-check-20130822
Is this happen randomly or can you pin point this to specifc requests, maybe
errors/timeouts? How can we reproduce this?
Nevermind, its easily reproducible (just generate some syslog messages).
The whole thing seems random: most of the times, the syslog msg ends
with \n\0\0, other times with
Hi Mason,
There is no API for HAProxy opensource.
HAProxy owns a socket which can be used to inject some commands to modify
the running configuration, but unfortunately, you won't be able to insert a
new server through this socket.
2 choices for you now:
1. if new servers have a random and
.
It can be found in git at
https://github.com/horms/haproxy.git agent-check-20130822
Thank you Simon, I'll do my best to start reviewing it today.
Willy
Sorry I must have forgot/overlooked replying to this.
However, I did manage to get the OpenSSL Support working with the current
v1.5-dev19 downloaded directly from the the HAProxy website using the tar
image.
Saying that though I'm glad I can still manage to break things ;)
~Scott
On 22
On Thu, Aug 22, 2013 at 09:36:34AM +0100, Scott McKeown wrote:
Sorry I must have forgot/overlooked replying to this.
However, I did manage to get the OpenSSL Support working with the current
v1.5-dev19 downloaded directly from the the HAProxy website using the tar
image.
Saying that though
Hello,
I have been testing the connection tracking in the frontend based on headers,
but it only work if the if HTTP option is set:
tcp-request inspect-delay 10s
tcp-request content track-sc0 hdr(x-forwarded-for,-1) if HTTP
Without this option, the table doesn't fill, the connections aren't
Hi Baptiste;
Thanks for your prompt response.
If I restart HAProxy, what will happen to existing sessions.
I’m afraid if all existing sessions might be failed.
Mason.
From: Baptiste [mailto:bed...@gmail.com]
Sent: Thursday, August 22, 2013 5:21 PM
To: Mason(MyungSik) Jang
Cc: HAProxy
34 matches
Mail list logo