Hi,
HAProxy 1.7.1 was released on 2016/12/13. It added 28 new commits
after version 1.7.0.
It addresses a few issues related to how buffers are allocated under
low memory condition consecutive to the applet scheduling changes
introduced before 1.6 was released (Christopher found a nest of
Hi Lukas,
thanks for the advice, the problem was about the chroot option.
strace with chroot :
-
Process 46596 attached
epoll_wait(0, {}, 200, 1000)= 0
epoll_wait(0, {}, 200, 1000)= 0
epoll_wait(0, {}, 200, 1000)= 0
epoll_wait(0,
Fixing the build using LibreSSL as OpenSSL implementation.
Currently, LibreSSL 2.4.4 provides the same API of OpenSSL 1.0.1x,
but it redefine the OpenSSL version number as 2.0.x, breaking all
checks with OpenSSL 1.1.x.
The patch solves the issue checking the definition of the symbol
Hi Luca,
On Mon, Dec 12, 2016 at 10:56:56AM +0100, Luca Pizzamiglio wrote:
> Fixing the build using LibreSSL as OpenSSL implementation.
> Currently, LibreSSL 2.4.4 provides the same API of OpenSSL 1.0.1x,
> but it redefine the OpenSSL version number as 2.0.x, breaking all
> checks with OpenSSL
Hello Arnall,
you said you tried different users, did you remove the "user nobody"
configuration completely?
Strace output would also help, just make sure you are looking at the
correct process or use nbproc 1 to avoid any confusion while
troubleshooting.
Lukas
more information ,
netstat display the haproxy socket : 6417/haproxy
/var/run/haproxy/haproxy_plain.sock.6416.tmp
and i have answer to HTTP request (after disabling PROXY protocol) :
echo -e "GET / HTTP/1.1\r\nHost: domaine.tld\r\n" | socat
unix-connect:/var/run/haproxy_plain.sock STDIO
Hello everyone,
i got this configuration to offload TLS on multiple process and handle
the plain http on only one process:
global
nbproc 3
listen web_tls
modehttp
bind *:443 ssl crt certif.pem process 2
bind *:443 ssl crt certif.pem process 3
maxconn 10
Hi Ricardo,
On Mon, Dec 12, Ricardo Fraile wrote:
> Yes, shell expansion did the trick, this is the working systemd unit:
>
>
> [Unit]
> Description=HAProxy Load Balancer
> After=network.target
>
> [Service]
> ExecStartPre=/bin/sh -c "/usr/local/sbin/haproxy -c -q
> -- /etc/haproxy/*"
>
Hi Q.Xie,
please check the documentation [1]. hdr(host) only looks at the host
header of your request, ie. only "test.xxx.com" from your example
"test.xxx.com/"
You can get the "" part by looking at path [2]. So you are looking
for something like
acl my_acl path ""
[1]
Hi Jarno,
Yes, shell expansion did the trick, this is the working systemd unit:
[Unit]
Description=HAProxy Load Balancer
After=network.target
[Service]
ExecStartPre=/bin/sh -c "/usr/local/sbin/haproxy -c -q
-- /etc/haproxy/*"
ExecStart=/bin/sh -c "/usr/local/sbin/haproxy-systemd-wrapper
-p
Hi,
On Mon, Dec 12, Ricardo Fraile wrote:
> But the systemd execution is still a issue with the following unit:
>
> [Unit]
> Description=HAProxy Load Balancer
> After=network.target
>
> [Service]
> ExecStartPre=/usr/local/sbin/haproxy -c -q -- /etc/haproxy/*
>
Hi Marcin,
On Mon, Dec 12, 2016 at 02:08:05PM +0100, Marcin Deranek wrote:
> Hi,
> These 2 patches add ability to fetch frontend/backend name in your
> logic, so they can be used later to make routing decisions (fe_name) or
> taking some actions based on backend which responded to request
Hello Willy,
I modified the haproxy-systemd-wrapper with the attached patch and it
works ok from the terminal:
# /usr/local/sbin/haproxy-systemd-wrapper -p /run/haproxy.pid
-- /etc/haproxy/*
<7>haproxy-systemd-wrapper: executing /usr/local/sbin/haproxy -Ds
-p /run/haproxy.pid --
Hi,
These 2 patches add ability to fetch frontend/backend name in your
logic, so they can be used later to make routing decisions (fe_name) or
taking some actions based on backend which responded to request (be_name).
In our case we needed a fetcher to be able to extract information we
needed from
14 matches
Mail list logo