Lots of spam on this list

2014-09-18 Thread Hoggins!
Hello,

Am I the only one to be amazed by the impressive amount of spam going
through this mailing-list ?
I know it's very difficult to fight against it, but I'm surprised to
receive so many unsolicited mails on this one.

Maybe moving to a google groups list ?



signature.asc
Description: OpenPGP digital signature


Re: Lots of spam on this list

2014-09-18 Thread Olivier
Hello,

2014-09-18 10:18 GMT+02:00 Hoggins! fucks...@wheres5.com:

 I know it's very difficult to fight against it, but I'm surprised to
 receive so many unsolicited mails on this one.
 Maybe moving to a google groups list ?


This has been already discussed a few days ago :
http://marc.info/?l=haproxym=140979555128144w=2

Olivier


Re: Lots of spam on this list

2014-09-18 Thread Hoggins!
Hello,

Le 18/09/2014 10:28, Olivier a écrit :
 Hello,

 2014-09-18 10:18 GMT+02:00 Hoggins! fucks...@wheres5.com
 mailto:fucks...@wheres5.com:

 I know it's very difficult to fight against it, but I'm surprised to
 receive so many unsolicited mails on this one.
 Maybe moving to a google groups list ?


 This has been already discussed a few days ago : 
 http://marc.info/?l=haproxym=140979555128144w=2

 Olivier
Thank you Olivier, I joined a couple of days ago, so I couldn't be part
of this discussion.

I'll let you guys handle this.



signature.asc
Description: OpenPGP digital signature


haproxy sending RSTs to backend-servers

2014-09-18 Thread Rainer Duffner
Hi,

I’ve configured nginx+haproxy in front of a couple of IIS servers.
NGINX terminates SSL.

configuration is as following:

global
  log /var/run/log   local5
  log /var/run/log   local1 notice
  #log loghostlocal0 info
  maxconn 4096
  #debug
  #quiet
  user www
  group www
  daemon

defaults
  log global
  modehttp
  retries 2
  timeout client 50s
  timeout connect 5s
  timeout server 50s
  option dontlognull
  option forwardfor
  option httplog
  option redispatch
  balance  leastconn
  http-check expect string server_up
  http-check disable-on-404
  default-server minconn 50 maxconn 100 

# Set up application listeners here.

frontend app-main-prod
  mode http
  bind 0.0.0.0:8000
  maxconn 2000
  default_backend app-main-prod-back

frontend app-import
  mode http
  bind 0.0.0.0:8001
  maxconn 2000
  default_backend app-import-back

frontend app-images
  mode http
  bind 0.0.0.0:8002
  maxconn 2000
  default_backend app-images-back


backend app-main-prod-back
  balance leastconn
  fullconn 2000
  mode http
  option httpchk GET /healthcheck.aspx HTTP/1.1\r\nHost:\
www.app.ch\r\nConnection:\ close cookie SERVERID insert indirect nocache
  server appsrv-one  192.168.69.17:80 weight 1 maxconn 1000 check
cookie s1 server appsrv-two  192.168.69.18:80 weight 1 maxconn 1000
check cookie s2

backend app-import-back
  balance leastconn
  fullconn 2000
  mode http
  #option httpchk GET /healthcheck.aspx HTTP/1.1\r\nHost:\
import.app.ch\r\nConnection:\ close server appsrv-import-one
192.168.69.32:80 weight 1 maxconn 1000 check #server appsrv-import-two
192.168.69.33:80 weight 1 maxconn 1000 check

backend app-images-back
  balance leastconn
  fullconn 2000
  mode http
  option httpchk GET /healthcheck.aspx HTTP/1.1\r\nHost:\
images.app.ch\r\nConnection:\ close server appsrv-images-one
192.168.69.41:80 weight 1 maxconn 1000 check #server appsrv-images-two
192.168.69.42:80 weight 1 maxconn 1000 check


listen admin 0.0.0.0:22002
  mode http
  stats uri /



What happens is that it will mostly work, but in wireshark, I see a lot
of RST being sent from the haproxy-server to the backend IIS-servers.
This doesn’t make sense and is probably the reason I see so many 50x in
the logs and why occasionally gateway-errors are being shown to users
because nginx can’t find any live servers…

Can anyone see any obvious error in the config?








Re: haproxy sending RSTs to backend-servers

2014-09-18 Thread Baptiste
On Thu, Sep 18, 2014 at 10:50 AM, Rainer Duffner rai...@ultra-secure.de wrote:
 Hi,

 I've configured nginx+haproxy in front of a couple of IIS servers.
 NGINX terminates SSL.

 configuration is as following:

 global
   log /var/run/log   local5
   log /var/run/log   local1 notice
   #log loghostlocal0 info
   maxconn 4096
   #debug
   #quiet
   user www
   group www
   daemon

 defaults
   log global
   modehttp
   retries 2
   timeout client 50s
   timeout connect 5s
   timeout server 50s
   option dontlognull
   option forwardfor
   option httplog
   option redispatch
   balance  leastconn
   http-check expect string server_up
   http-check disable-on-404
   default-server minconn 50 maxconn 100

 # Set up application listeners here.

 frontend app-main-prod
   mode http
   bind 0.0.0.0:8000
   maxconn 2000
   default_backend app-main-prod-back

 frontend app-import
   mode http
   bind 0.0.0.0:8001
   maxconn 2000
   default_backend app-import-back

 frontend app-images
   mode http
   bind 0.0.0.0:8002
   maxconn 2000
   default_backend app-images-back


 backend app-main-prod-back
   balance leastconn
   fullconn 2000
   mode http
   option httpchk GET /healthcheck.aspx HTTP/1.1\r\nHost:\
 www.app.ch\r\nConnection:\ close cookie SERVERID insert indirect nocache
   server appsrv-one  192.168.69.17:80 weight 1 maxconn 1000 check
 cookie s1 server appsrv-two  192.168.69.18:80 weight 1 maxconn 1000
 check cookie s2

 backend app-import-back
   balance leastconn
   fullconn 2000
   mode http
   #option httpchk GET /healthcheck.aspx HTTP/1.1\r\nHost:\
 import.app.ch\r\nConnection:\ close server appsrv-import-one
 192.168.69.32:80 weight 1 maxconn 1000 check #server appsrv-import-two
 192.168.69.33:80 weight 1 maxconn 1000 check

 backend app-images-back
   balance leastconn
   fullconn 2000
   mode http
   option httpchk GET /healthcheck.aspx HTTP/1.1\r\nHost:\
 images.app.ch\r\nConnection:\ close server appsrv-images-one
 192.168.69.41:80 weight 1 maxconn 1000 check #server appsrv-images-two
 192.168.69.42:80 weight 1 maxconn 1000 check


 listen admin 0.0.0.0:22002
   mode http
   stats uri /



 What happens is that it will mostly work, but in wireshark, I see a lot
 of RST being sent from the haproxy-server to the backend IIS-servers.
 This doesn't make sense and is probably the reason I see so many 50x in
 the logs and why occasionally gateway-errors are being shown to users
 because nginx can't find any live servers...

 Can anyone see any obvious error in the config?



Hi Rainer,

HAProxy uses RST to close connections on the server side to allow fast
reuse of the source port.
So this behavior is expected and normal.

That said, 50x errors are not normal...
Can you tell us who is generating thoses errors?
Can you share your HAProxy logs showing these errors?

Baptiste



Re: Lots of spam on this list

2014-09-18 Thread Kobus Bensch
You are seeing the amount of spam because some person has maliciously 
added the haproxy email address to these sites. There is not much that 
can be done about that as it is seen as legitimate email. Well mostly 
anyway.



On 18/09/2014 09:18, Hoggins! wrote:

Hello,

Am I the only one to be amazed by the impressive amount of spam going
through this mailing-list ?
I know it's very difficult to fight against it, but I'm surprised to
receive so many unsolicited mails on this one.

Maybe moving to a google groups list ?



--
Kobus Bensch Trustpay Global LTD email signature Kobus Bensch
Senior Systems Administrator
Address:  22  24 | Frederick Sanger Road | Guildford | Surrey | GU2 7YD
DDI:  0207 871 3958
Tel:  0207 871 3890
Email: kobus.ben...@trustpayglobal.com 
mailto:kobus.ben...@trustpayglobal.com


--


Trustpay Global Limited is an authorised Electronic Money Institution 
regulated by the Financial Conduct Authority registration number 900043. 
Company No 07427913 Registered in England and Wales with registered address 
130 Wood Street, London, EC2V 6DL, United Kingdom.


For further details please visit our website at www.trustpayglobal.com.

The information in this email and any attachments are confidential and 
remain the property of Trustpay Global Ltd unless agreed by contract. It is 
intended solely for the person to whom or the entity to which it is 
addressed. If you are not the intended recipient you may not use, disclose, 
copy, distribute, print or rely on the content of this email or its 
attachments. If this email has been received by you in error please advise 
the sender and delete the email from your system. Trustpay Global Ltd does 
not accept any liability for any personal view expressed in this message.


PTC Users List

2014-09-18 Thread Michelle Peters
Hi,
Would you be interested in PTC users list for your email and marketing campaign?
We can provide you with Dassault systems, Siemens, Autodesk, Ansys and Bentley.

We can also provide you with titles like,


* Engineers,

* Research and development

* Project managers

* Purchasing decision makers

* CEO, CIO, CTO, CMO, CFO

* Marketing Decision makers

* Facility Managers

* Fleet managers

* Logistic Professionals

Please let me know your thoughts on it

Regards
Michelle


Requests not expiring, exp=NEVER in Version: 1.5.3

2014-09-18 Thread Clark Peters
Hi all, long time reader (less than a year), first time poster.

We decided to update from Haproxy Version: 1.5-dev18 to Version: 1.5.3 
and with the new machine with the new version we noticed many more 
current conns in the stats page.  Typically with ~400 requests/s we 
would see ~800 current connections on the old version, but with the new 
version we saw upwards of 9000 current connections before we put traffic 
back to the old machine.

Looking at stats show sess I noticed that many connections had age 
much larger than the timeout settings.  The session details show 
connections with age= larger than the timeouts had show exp=NEVER .  
How does a connection get set to never expire?

0x12b9b20: proto=tcpv4 src=50.173.50.59:53192 fe=DefaultFrontEnd be=
NONE srv=none ts=08 age=4m20s calls=2 
rq[f=20h,i=0,an=1eh,rx=,wx=,ax=] 
rp[f=00h,i=0,an=00h,rx=,wx=,ax=] s0=[7,8h,fd=13,ex=] s1=
[0,0h,fd=-1,ex=] exp=

0x12b9b20: [18/Sep/2014:15:11:33.591516] id=8 proto=tcpv4 
source=50.173.50.59:53192
  flags=0x80, conn_retries=0, srv_conn=(nil), pend_pos=(nil)
  frontend=DefaultFrontEnd (id=2 mode=http), listener=? (id=1) 
addr=10.162.174.207:80
  backend=NONE (id=-1 mode=-)
  server=NONE (id=-1)
  task=0x12b9e90 (state=0x08 nice=0 calls=2 exp=NEVER age=56s)
  txn=0x12b9b68 flags=0x0 meth=0 status=-1 req.st=MSG_RQBEFORE 
rsp.st=MSG_RPBEFORE
  si[0]=0x12b9d70 (state=EST flags=0x08 endp0=CONN:0x12b99d0 exp=
NEVER, et=0x000)
  si[1]=0x12b9da8 (state=INI flags=0x00 endp1=NONE:(nil) exp=NEVER, 
et=0x000)
  co0=0x12b99d0 ctrl=tcpv4 xprt=RAW data=STRM target=LISTENER:0x660

We had slightly different configs on each machine, but the issue still 
happened with the exact same config.  Some of the config settings were 
depreciated like contimeout, clitimeout, srvtimeout and option httpclose 
so I replaced them with current timeout calls and option forceclose.  I 
also tried using milliseconds and seconds for the timeouts which made no 
difference.  I also tried turning http-server-close off and on but 
nothing resolved the long connections.

I will post a washed version of the config that was working well on 
rev18 but having the issue on 1.5.3.

#START CONFIG
global
maxconn 10
user haproxy
group haproxy
pidfile /var/run/haproxy.pid
stats socket /tmp/haproxy level admin
tune.maxrewrite  1024

defaults
mode http
maxconn 15000
balance roundrobin
contimeout 4000
clitimeout 42000
srvtimeout 43000
stats enable
stats refresh 30s
stats auth XX:XX
stats uri  /haproxy?stats

frontend DefaultFrontEnd
bind :80
mode http
option httpclose
option forwardfor except 127.0.0.1
stick-table type string size 200k expire 10s store gpc0
log global
log127.0.0.1   local0
log127.0.0.1   local7 debug
option httplog
option log-separate-errors

acl whitelist src XXX.XXX.XXX.XXX
tcp-request content reject if ! WAIT_END
#   tcp-request content reject if ! HTTP
acl source_is_abuser sc1_get_gpc0 gt 0

acl API_dead nbsrv(API) lt 1
acl WWW-WithServerTimeout_dead nbsrv(WWW-
WithServerTimeout) lt 1
acl WWW_dead nbsrv(WWW) lt 1
acl API-SANDBOX_dead nbsrv(API-SANDBOX) lt 1
acl BEAM_dead nbsrv(BEAM) lt 1
acl BEACON_dead nbsrv(BEACON) lt 1

acl validApiKey urlp(apiKey) -i -f 
/etc/haproxy/apikeys.lst
acl beamMatch hdr_dom(host) -i XX.XX.com
acl beaconMatch hdr_dom(host) -i XX.XX.com
acl sandboxRateTooHigh be_sess_rate(API-SANDBOX) gt 25
acl sandboxConnTooHigh be_conn(API-SANDBOX) 10
acl sandboxMatch hdr_dom(host) -i XX.XX.com
acl apiMatch hdr_dom(host) -i XX.XX.com
acl apiMatch url_sub -i delivery/api
acl uatMatch hdr_dom(host) -i XX.XX.com
acl wwwMatch hdr_dom(host) -i XX.XX.com
acl wwwMatch hdr_dom(host) -i XX.XX.com
acl wwwMatch hdr_dom(host) -i XX.XX.com
acl wwwMatch hdr_dom(host) -i XX.XX.com
acl wwwMatch hdr_dom(host) -i XX.XX.com
acl wwwMatch hdr_dom(host) -i XX.XX.com
acl wwwMatch hdr_dom(host) -i XX.XX.com
acl clickMatch url_sub -i _Click

tcp-request content track-sc1 urlp(apiKey) if 
!source_is_abuser

use_backend API-ABUSE if source_is_abuser apiMatch 
validApiKey
use_backend YESMAN 

change the size of a stick-table at run time

2014-09-18 Thread Tobias Gunkel
Hello,

I want to change the size of a stick-table at run time, but I found no
suitable management command in the docs.
If I change the size in the config file, the stick-table gets flushed at
reload, but I need to preserve its content.

The only way I can think of at the moment is to dump the content manually
before reload (show table) and refill it immediately afterwards (set table).
But maybe there is a more elegant way...?


Best regards,
Tobi


Re: change the size of a stick-table at run time

2014-09-18 Thread Baptiste
Le 18 sept. 2014 21:43, Tobias Gunkel tobias.gun...@gmail.com a écrit :

 Hello,

 I want to change the size of a stick-table at run time, but I found no
suitable management command in the docs.
 If I change the size in the config file, the stick-table gets flushed at
reload, but I need to preserve its content.

 The only way I can think of at the moment is to dump the content manually
before reload (show table) and refill it immediately afterwards (set table).
 But maybe there is a more elegant way...?


 Best regards,
 Tobi

Hi tobi,

Do you have a 'peer' section in haproxy's configuration file?
Also, why don't you simply set up a stick table size big enough for your
needs?

Baptiste


Is Yacon Syrup for diabetics? 12.30 p m 12.9.2014]

2014-09-18 Thread Melbert Witter
haproxy@formilux.org
Yacon syrup is a sugar substitute native to the Andean region of South America. 
The syrup is derived from the roots of the yacon plant, and according to some 
studies is a good source of antioxidants.Some studies have suggested that yacon 
syrup may be beneficial to the body in moderate amounts.The health benefits of 
yacon syrup have not been extensively tested, but information from the 
published studies suggests a mildly beneficial effect on the body.
For diabetics, vegans and those cutting down on their sugar intake, yacon syrup 
makes a healthy alternative to synthesized sweeteners
You can learn more about this product by visiting: 
http://yaconmolassesoffer.com/  
To your health
Bert
healthy lifestyle applications 
 
click here To stop getting mails 
 
 

Re: change the size of a stick-table at run time

2014-09-18 Thread Baptiste
On Thu, Sep 18, 2014 at 11:23 PM, Tobias Gunkel tobias.gun...@gmail.com wrote:


 Hi Baptiste,

 Do you have a 'peer' section in haproxy's configuration file?

 No. I thought this is for replicating stick-tables between remote servers,
 but I have only one server.
 But I'll have a look at the docs anyways, maybe this will fit my needs.

 Also, why don't you simply set up a stick table size big enough for your
 needs?

 I use stick-tables to limit access to a site based on the client ip address,
 independently from connection rate etc.
 So the size of the stick-table represents the pool of available slots to the
 site, which I eventually want to increase later at run time (if the server
 load allows it).

 -Tobi


Hi Tobias,

Please don't forget to Cc the ML, unless there are private information
in your email.
'peer' section is also used to synchronize data between HAProxy
processes, when HAProxy is reloaded.
You should use it. create a 'peer' section and don't forget to use the
'peers' directive on the stick-table definition.

concerning the stick-table size, you have acls which allows you to
retrieve the number of entries in a table and so you can take allow or
deny decision based on this.
That said, you may have to reload HAProxy to update the number of
entries the ACL should allow.
Not sure there is a simple solution there.

Baptiste