stable-bot: Bugfixes waiting for a release 2.1 (4)

2020-06-30 Thread stable-bot
Hi,

This is a friendly bot that watches fixes pending for the next haproxy-stable 
release!  One such e-mail is sent periodically once patches are waiting in the 
last maintenance branch, and an ideal release date is computed based on the 
severity of these fixes and their merge date.  Responses to this mail must be 
sent to the mailing list.


Last release 2.1.7 was issued on 2020-06-09.  There are currently 4 patches in 
the queue cut down this way:
- 3 MEDIUM, first one merged on 2020-06-12
- 1 MINOR, first one merged on 2020-06-12

Thus the computed ideal release date for 2.1.8 would be 2020-07-10, which is in 
two weeks or less.

The current list of patches in the queue is:
 - 2.1   - MEDIUM  : log: don't hold the log lock during 
writev() on a file descriptor
 - 2.1   - MEDIUM  : ssl: crt-list must continue parsing on 
ERR_WARN
 - 2.1   - MEDIUM  : pattern: fix thread safety of pattern 
matching
 - 2.1   - MINOR   : ssl: fix ssl-{min,max}-ver with 
openssl < 1.1.0

-- 
The haproxy stable-bot is freely provided by HAProxy Technologies to help 
improve the quality of each HAProxy release.  If you have any issue with these 
emails or if you want to suggest some improvements, please post them on the 
list so that the solutions suiting the most users can be found.



Re: Monitoring the total request time in haproxy 1.7.5 HTTP logs

2020-06-30 Thread Paul Belloc
There is no overhead on the client side, only on the server time logged

Sent from ProtonMail mobile

 Original Message 
On Jun 30, 2020, 20:14, Илья Шипицин wrote:

> is that https publicly available? can you say it's url ?
>
> otherwise, https might add some overhead. can you compare http <-- > https 
> performance ?
>
> вт, 30 июн. 2020 г. в 21:32, Paul Belloc :
>
>> it is https, I am not sure if ocsp stapling is enabled, how can I know ?
>>
>> ‐‐‐ Original Message ‐‐‐
>> Le mardi 30 juin 2020 17:26, Илья Шипицин  a écrit :
>>
>>> is it https ? is ocsp stapling enabled ?
>>>
>>> вт, 30 июн. 2020 г. в 20:24, Paul Belloc :
>>>
 Hello, I have been struggling on this issue for some time.

 I am trying to monitor the total request time in haproxy 1.7.5 HTTP logs.
 My usecase is customers want to know the exact overhead of calling our 
 service. Sometime we have complaints that we are adding overhead, and we 
 know that our backend is fast, but we don't have the data to show the 
 total overhead from the last end user point of view.

 So I started saving all haproxy HTTP logs in an ELK cluster.

 At this point I must say: we use http-server-close and option httplog.

 What I see is the Tr and Tt seem to depend on the TCP opening timer. The 
 consequence is the logged time is good only for the first http request of 
 a tcp connection, i.e the request that has a NI cookie-status.

 To show that, I can show the difference between querying the backend 
 through haproxy using

 1) CURL (no keep alive)

 Jun 30 17:18:23 19/0/0/3/22 200 1993 - - --NI 567/567/0/1/0 0/0 "GET 
 /website/5be174f9a9403/tag.js HTTP/1.1"
 Jun 30 17:18:25 18/0/0/2/20 200 1993 - - --NI 449/449/0/1/0 0/0 "GET 
 /website/5be174f9a9403/tag.js HTTP/1.1"
 Jun 30 17:18:28 19/0/0/2/21 200 1993 - - --NI 605/605/0/1/0 0/0 "GET 
 /website/5be174f9a9403/tag.js HTTP/1.1"

 We see that there is 1 seconds between my two first curls, and that the Tr 
 and Tt are similar. We see both are NI. Then there is 3 seconds between 
 the 2 last curls, but the Tr and Tt is still similar.

 2) Web browser (keep-alive)

 Jun 30 17:14:49 190305/0/0/4/190309 304 205 - - --VN 963/963/0/0/0 0/0 
 "GET /website/5be174f9a9403/tag.js HTTP/1.1"
 Jun 30 17:14:51 1940/0/0/1/1941 304 205 - - --VN 966/966/0/1/0 0/0 "GET 
 /website/5be174f9a9403/tag.js HTTP/1.1"

 We see the first request has crazy Tt and Tr even if it was really fast on 
 the client side. This is, I guess because of the idle time on the TCP 
 connection.
 We see the second request has 2000 ms Tt / Tr, this is the time elapsed 
 since the first request, plus the 'real' http response time.

 Now I wonder if this is normal behaviour and what are my options.

 I see:

 - Disable all form of keepalive, with a big performance cost
 - Monitor only the NI requests, with a risk of inconsistencies

 Is there another way ? Do I understand correctly what is going on ?

 Thank you

Re: Monitoring the total request time in haproxy 1.7.5 HTTP logs

2020-06-30 Thread Илья Шипицин
is that https publicly available? can you say it's url ?


otherwise, https might add some overhead. can you compare http <-- > https
performance ?

вт, 30 июн. 2020 г. в 21:32, Paul Belloc :

> it is https, I am not sure if ocsp stapling is enabled, how can I know ?
>
>
>
> ‐‐‐ Original Message ‐‐‐
> Le mardi 30 juin 2020 17:26, Илья Шипицин  a écrit :
>
> is it https ? is ocsp stapling enabled ?
>
> вт, 30 июн. 2020 г. в 20:24, Paul Belloc :
>
>> Hello, I have been struggling on this issue for some time.
>>
>> I am trying to monitor the total request time in haproxy 1.7.5 HTTP logs.
>> My usecase is customers want to know the exact overhead of calling our
>> service. Sometime we have complaints that we are adding overhead, and we
>> know that our backend is fast, but we don't have the data to show the total
>> overhead from the last end user point of view.
>>
>> So I started saving all haproxy HTTP logs in an ELK cluster.
>>
>> At this point I must say: we use http-server-close and option httplog.
>>
>> What I see is the Tr and Tt seem to depend on the TCP opening timer. The
>> consequence is the logged time is good only for the first http request of a
>> tcp connection, i.e the request that has a NI cookie-status.
>>
>> To show that, I can show the difference between querying the backend
>> through haproxy using
>>
>> 1) CURL (no keep alive)
>>
>> Jun 30 17:18:23 19/0/0/3/22 200 1993 - - --NI 567/567/0/1/0 0/0 "GET
>> /website/5be174f9a9403/tag.js HTTP/1.1"
>> Jun 30 17:18:25 18/0/0/2/20 200 1993 - - --NI 449/449/0/1/0 0/0 "GET
>> /website/5be174f9a9403/tag.js HTTP/1.1"
>> Jun 30 17:18:28 19/0/0/2/21 200 1993 - - --NI 605/605/0/1/0 0/0 "GET
>> /website/5be174f9a9403/tag.js HTTP/1.1"
>>
>> We see that there is 1 seconds between my two first curls, and that the
>> Tr and Tt are similar. We see both are NI. Then there is 3 seconds between
>> the 2 last curls, but the Tr and Tt is still similar.
>>
>> 2) Web browser (keep-alive)
>>
>> Jun 30 17:14:49 190305/0/0/4/190309 304 205 - - --VN 963/963/0/0/0 0/0
>> "GET /website/5be174f9a9403/tag.js HTTP/1.1"
>> Jun 30 17:14:51 1940/0/0/1/1941 304 205 - - --VN 966/966/0/1/0 0/0 "GET
>> /website/5be174f9a9403/tag.js HTTP/1.1"
>>
>> We see the first request has crazy Tt and Tr even if it was really fast
>> on the client side. This is, I guess because of the idle time on the TCP
>> connection.
>> We see the second request has 2000 ms Tt / Tr, this is the time elapsed
>> since the first request, plus the 'real' http response time.
>>
>>
>>
>> Now I wonder if this is normal behaviour and what are my options.
>>
>> I see:
>>
>> - Disable all form of keepalive, with a big performance cost
>> - Monitor only the NI requests, with a risk of inconsistencies
>>
>> Is there another way ? Do I understand correctly what is going on ?
>>
>> Thank you
>>
>
>


Re: Monitoring the total request time in haproxy 1.7.5 HTTP logs

2020-06-30 Thread Paul Belloc
it is https, I am not sure if ocsp stapling is enabled, how can I know ?

‐‐‐ Original Message ‐‐‐
Le mardi 30 juin 2020 17:26, Илья Шипицин  a écrit :

> is it https ? is ocsp stapling enabled ?
>
> вт, 30 июн. 2020 г. в 20:24, Paul Belloc :
>
>> Hello, I have been struggling on this issue for some time.
>>
>> I am trying to monitor the total request time in haproxy 1.7.5 HTTP logs.
>> My usecase is customers want to know the exact overhead of calling our 
>> service. Sometime we have complaints that we are adding overhead, and we 
>> know that our backend is fast, but we don't have the data to show the total 
>> overhead from the last end user point of view.
>>
>> So I started saving all haproxy HTTP logs in an ELK cluster.
>>
>> At this point I must say: we use http-server-close and option httplog.
>>
>> What I see is the Tr and Tt seem to depend on the TCP opening timer. The 
>> consequence is the logged time is good only for the first http request of a 
>> tcp connection, i.e the request that has a NI cookie-status.
>>
>> To show that, I can show the difference between querying the backend through 
>> haproxy using
>>
>> 1) CURL (no keep alive)
>>
>> Jun 30 17:18:23 19/0/0/3/22 200 1993 - - --NI 567/567/0/1/0 0/0 "GET 
>> /website/5be174f9a9403/tag.js HTTP/1.1"
>> Jun 30 17:18:25 18/0/0/2/20 200 1993 - - --NI 449/449/0/1/0 0/0 "GET 
>> /website/5be174f9a9403/tag.js HTTP/1.1"
>> Jun 30 17:18:28 19/0/0/2/21 200 1993 - - --NI 605/605/0/1/0 0/0 "GET 
>> /website/5be174f9a9403/tag.js HTTP/1.1"
>>
>> We see that there is 1 seconds between my two first curls, and that the Tr 
>> and Tt are similar. We see both are NI. Then there is 3 seconds between the 
>> 2 last curls, but the Tr and Tt is still similar.
>>
>> 2) Web browser (keep-alive)
>>
>> Jun 30 17:14:49 190305/0/0/4/190309 304 205 - - --VN 963/963/0/0/0 0/0 "GET 
>> /website/5be174f9a9403/tag.js HTTP/1.1"
>> Jun 30 17:14:51 1940/0/0/1/1941 304 205 - - --VN 966/966/0/1/0 0/0 "GET 
>> /website/5be174f9a9403/tag.js HTTP/1.1"
>>
>> We see the first request has crazy Tt and Tr even if it was really fast on 
>> the client side. This is, I guess because of the idle time on the TCP 
>> connection.
>> We see the second request has 2000 ms Tt / Tr, this is the time elapsed 
>> since the first request, plus the 'real' http response time.
>>
>> Now I wonder if this is normal behaviour and what are my options.
>>
>> I see:
>>
>> - Disable all form of keepalive, with a big performance cost
>> - Monitor only the NI requests, with a risk of inconsistencies
>>
>> Is there another way ? Do I understand correctly what is going on ?
>>
>> Thank you

Re: Monitoring the total request time in haproxy 1.7.5 HTTP logs

2020-06-30 Thread Илья Шипицин
is it https ? is ocsp stapling enabled ?

вт, 30 июн. 2020 г. в 20:24, Paul Belloc :

> Hello, I have been struggling on this issue for some time.
>
> I am trying to monitor the total request time in haproxy 1.7.5 HTTP logs.
> My usecase is customers want to know the exact overhead of calling our
> service. Sometime we have complaints that we are adding overhead, and we
> know that our backend is fast, but we don't have the data to show the total
> overhead from the last end user point of view.
>
> So I started saving all haproxy HTTP logs in an ELK cluster.
>
> At this point I must say: we use http-server-close and option httplog.
>
> What I see is the Tr and Tt seem to depend on the TCP opening timer. The
> consequence is the logged time is good only for the first http request of a
> tcp connection, i.e the request that has a NI cookie-status.
>
> To show that, I can show the difference between querying the backend
> through haproxy using
>
> 1) CURL (no keep alive)
>
> Jun 30 17:18:23 19/0/0/3/22 200 1993 - - --NI 567/567/0/1/0 0/0 "GET
> /website/5be174f9a9403/tag.js HTTP/1.1"
> Jun 30 17:18:25 18/0/0/2/20 200 1993 - - --NI 449/449/0/1/0 0/0 "GET
> /website/5be174f9a9403/tag.js HTTP/1.1"
> Jun 30 17:18:28 19/0/0/2/21 200 1993 - - --NI 605/605/0/1/0 0/0 "GET
> /website/5be174f9a9403/tag.js HTTP/1.1"
>
> We see that there is 1 seconds between my two first curls, and that the Tr
> and Tt are similar. We see both are NI. Then there is 3 seconds between the
> 2 last curls, but the Tr and Tt is still similar.
>
> 2) Web browser (keep-alive)
>
> Jun 30 17:14:49 190305/0/0/4/190309 304 205 - - --VN 963/963/0/0/0 0/0
> "GET /website/5be174f9a9403/tag.js HTTP/1.1"
> Jun 30 17:14:51 1940/0/0/1/1941 304 205 - - --VN 966/966/0/1/0 0/0 "GET
> /website/5be174f9a9403/tag.js HTTP/1.1"
>
> We see the first request has crazy Tt and Tr even if it was really fast on
> the client side. This is, I guess because of the idle time on the TCP
> connection.
> We see the second request has 2000 ms Tt / Tr, this is the time elapsed
> since the first request, plus the 'real' http response time.
>
>
>
> Now I wonder if this is normal behaviour and what are my options.
>
> I see:
>
> - Disable all form of keepalive, with a big performance cost
> - Monitor only the NI requests, with a risk of inconsistencies
>
> Is there another way ? Do I understand correctly what is going on ?
>
> Thank you
>


Monitoring the total request time in haproxy 1.7.5 HTTP logs

2020-06-30 Thread Paul Belloc
Hello, I have been struggling on this issue for some time.

I am trying to monitor the total request time in haproxy 1.7.5 HTTP logs.
My usecase is customers want to know the exact overhead of calling our service. 
Sometime we have complaints that we are adding overhead, and we know that our 
backend is fast, but we don't have the data to show the total overhead from the 
last end user point of view.

So I started saving all haproxy HTTP logs in an ELK cluster.

At this point I must say: we use http-server-close and option httplog.

What I see is the Tr and Tt seem to depend on the TCP opening timer. The 
consequence is the logged time is good only for the first http request of a tcp 
connection, i.e the request that has a NI cookie-status.

To show that, I can show the difference between querying the backend through 
haproxy using

1) CURL (no keep alive)

Jun 30 17:18:23 19/0/0/3/22 200 1993 - - --NI 567/567/0/1/0 0/0 "GET 
/website/5be174f9a9403/tag.js HTTP/1.1"
Jun 30 17:18:25 18/0/0/2/20 200 1993 - - --NI 449/449/0/1/0 0/0 "GET 
/website/5be174f9a9403/tag.js HTTP/1.1"
Jun 30 17:18:28 19/0/0/2/21 200 1993 - - --NI 605/605/0/1/0 0/0 "GET 
/website/5be174f9a9403/tag.js HTTP/1.1"

We see that there is 1 seconds between my two first curls, and that the Tr and 
Tt are similar. We see both are NI. Then there is 3 seconds between the 2 last 
curls, but the Tr and Tt is still similar.

2) Web browser (keep-alive)

Jun 30 17:14:49 190305/0/0/4/190309 304 205 - - --VN 963/963/0/0/0 0/0 "GET 
/website/5be174f9a9403/tag.js HTTP/1.1"
Jun 30 17:14:51 1940/0/0/1/1941 304 205 - - --VN 966/966/0/1/0 0/0 "GET 
/website/5be174f9a9403/tag.js HTTP/1.1"

We see the first request has crazy Tt and Tr even if it was really fast on the 
client side. This is, I guess because of the idle time on the TCP connection.
We see the second request has 2000 ms Tt / Tr, this is the time elapsed since 
the first request, plus the 'real' http response time.

Now I wonder if this is normal behaviour and what are my options.

I see:

- Disable all form of keepalive, with a big performance cost
- Monitor only the NI requests, with a risk of inconsistencies

Is there another way ? Do I understand correctly what is going on ?

Thank you

Bid Writing Workshops Via Zoom

2020-06-30 Thread NFP Workshops


NFP WORKSHOPS
18 Blake Street, York YO1 8QG
Affordable Training Courses for Charities, Schools & Public Sector 
Organisations 




This email has been sent to haproxy@formilux.org
CLICK TO UNSUBSCRIBE FROM LIST
Alternatively send a blank e-mail to unsubscr...@nfpmail2001.co.uk quoting 
haproxy@formilux.org in the subject line.
Unsubscribe requests will take effect within seven days. 




Bid Writing: The Basics
Online via ZOOM 

START 13.30 FINISH 16.00

COST £95.00

TOPICS COVERED

Do you know the most common reasons for rejection? Are you gathering the right 
evidence? Are you making the right arguments? Are you using the right 
terminology? Are your numbers right? Are you learning from rejections? Are you 
assembling the right documents? Do you know how to create a clear and concise 
standard funding bid?

Are you communicating with people or just excluding them? Do you know your own 
organisation well enough? Are you thinking through your projects carefully 
enough? Do you know enough about your competitors? Are you answering the 
questions funders will ask themselves about your application? Are you 
submitting applications correctly?

PARTICIPANTS  

Staff members, volunteers, trustees or board members of charities, schools, not 
for profits or public sector organisations who intend to submit grant funding 
applications to charitable grant making trusts and foundations. People who 
provide advice to these organisations are also welcome.

BOOKING DETAILS   

Participants receive full notes and sample bids by e-mail after the workshop. 
The workshop consists of talk, questions and answers. There are no power points 
or audio visuals used. All places must be booked through the online booking 
system using a debit card, credit card or paypal. We do not issue invoices or 
accept bank or cheque payments. If you do not have a payment card from your 
organisation please use a personal one and claim reimbursement using the 
booking confirmation e-mail as proof of purchase.

BOOKING TERMS

Workshop bookings are non-cancellable and non-refundable. If you are unable to 
participate on the booked date you may allow someone else to log on in your 
place. There is no need to contact us to let us know that there will be a 
different participant. Bookings are non-transferable between dates unless an 
event is postponed. If an event is postponed then bookings will be valid on any 
future scheduled date for that workshop.
   
QUESTIONS

If you have a question please e-mail questi...@nfpmail2001.co.uk You will 
usually receive a response within 24 hours. Due to our training commitments we 
are unable to accept questions by phone. 
Bid Writing: Advanced
Online via ZOOM 

START 13.30 FINISH 16.00

COST £95.00

TOPICS COVERED

Are you applying to the right trusts? Are you applying to enough trusts? Are 
you asking for the right amount of money? Are you applying in the right ways? 
Are your projects the most fundable projects? 

Are you carrying out trust fundraising in a professional way? Are you 
delegating enough work? Are you highly productive or just very busy? Are you 
looking for trusts in all the right places? 

How do you compare with your competitors for funding? Is the rest of your 
fundraising hampering your bids to trusts? Do you understand what trusts are 
ideally looking for?

PARTICIPANTS  

Staff members, volunteers, trustees or board members of charities, schools, not 
for profits or public sector organisations who intend to submit grant funding 
applications to charitable grant making trusts and foundations. People who 
provide advice to these organisations are also welcome.

BOOKING DETAILS   

Participants receive full notes and sample bids by e-mail after the workshop. 
The workshop consists of talk, questions and answers. There are no power points 
or audio visuals used. All places must be booked through the online booking 
system using a debit card, credit card or paypal. We do not issue invoices or 
accept bank or cheque payments. If you do not have a payment card from your 
organisation please use a personal one and claim reimbursement using the 
booking confirmation e-mail as proof of purchase.

BOOKING TERMS

Workshop bookings are non-cancellable and non-refundable. If you are unable to 
participate on the booked date you may allow someone else to log on in your 
place. There is no need to contact us to let us know that there will be a 
different participant. Bookings are non-transferable between dates unless an 
event is postponed. If an event is postponed then bookings will be valid on any 
future scheduled date for that workshop.
   
QUESTIONS

If you have a question please e-mail questi...@nfpmail2001.co.uk You will 
usually receive a response within 24 hours. Due to our training commitments we 
are unable to accept questions by phone. 
Dates & Booking Links
BID WRITING: THE BASICS
Mon 29 Jun 2020Booking Link
Mon 13 Jul 2020Booking Link
Mon 27 Jul 2020Booking Link
Mon 10 Aug 2020Booking