Thanks for your hint, but I couldn't find a good heuristic to distinguish SPOP from TCP. I think, that the current implementation is usable enough for development purposes. Feel free to enhance it. :-)
There is a Wireshark feature called "Decode as...", where you can choose the SPOP dissector
Hi,
I had a patch for my issue with multi-port + multi-server listener that
got fixed in 1.7.10 that seems to have gotten forgotten. I add this
patch again.
Thanks for considering adding it to the test cases.
thanks
Philipp
--
I *think* you're going to have to fully construct your logging format with
a whitelist of params you want, rather than an exclusion list. I'm not sure
you can scope this by HTTP method, however.
Given your use of this as a forward proxy, I assume you could scope it by
Host header ... but that *mig
Hi,
I'm using haproxy to handle TLS termination to a 3rd party API that requires
authentication (username/password) to be passed as query parameters to a GET
call.
I want to log the request as usual, just not all the query parameters.
Obviously for a POST the parameters would not be logged at
NA4�27�EE�98v84�1AwE5002
_EB�12NBAT58R42N3AO60cD0O9BN00N2AS05�F9~D9O60R17QFAv84W30W40�0CO46b7EN0DR30O60002
VE0k64�0Cb11NECeE0lD5\06S05cD0O9B~D9O60002
�F7fF4eB0N0B�62�A9b11NEC�FDY1F�BER30O60f0EY29O60vEER4Dv84W30W40002
fF4eB0_53R4DW30W40
�22�22
5 matches
Mail list logo