[ceph-users] Re: Public RGW access without any LB in front?

2022-09-19 Thread Casey Bodley
hi Boris, it looks like your other questions have been covered but i'll snipe this one: On Fri, Sep 16, 2022 at 7:55 AM Boris Behrens wrote: > > How good is it handling bad HTTP request, sent by an attacker?) rgw relies on the boost.beast library to parse these http requests. that library has

[ceph-users] Re: Public RGW access without any LB in front?

2022-09-19 Thread Tobias Urdin
I was assuming it had to do with scaling, ofcourse there is multiple ways to do it. Personally I don’t find scaling that way is reasonable but that’s design decision, that way you would still have some control to do traffic engineering On 19 Sept 2022, at 10:23, Konstantin Shalygin

[ceph-users] Re: Public RGW access without any LB in front?

2022-09-19 Thread Konstantin Shalygin
Hi, > On 19 Sep 2022, at 10:38, Tobias Urdin wrote: > > Why not scaleout HAproxy by adding multiple ones and use a TCP load balancer > in front of multiple HAproxy instances or use BGP ECMP routing directly to > split > load between multiple HAproxy? Because you can do this without "TCP load

[ceph-users] Re: Public RGW access without any LB in front?

2022-09-19 Thread Konstantin Shalygin
Hi, Actually rgw can handle SSL traffic, and updates of certs is just a restarting of service. For client it will be reset of connection, client will make a new one We use keeaplived DR method for RGW's for a years The only bottleneck in this setup is input traffic limited by LB. This also can