I'd like to
know and understand is why that is the case.
I am using nbproc set to 2.
On Thu, Jun 7, 2018 at 2:43 PM, Aleksandar Lazic wrote:
> On 07/06/2018 14:30, Mihir Shirali wrote:
>
>> We have a large number of ip phones connecting to this port. They could
>> be as large as
ACE] trace
On Thu, Jun 7, 2018 at 2:13 PM, Aleksandar Lazic wrote:
> Hi Mihir.
>
> On 07/06/2018 10:27, Mihir Shirali wrote:
>
>> Hi Team,
>>
>> We use haproxy to front tls for a large number of endpoints, haproxy
>> prcesses the TLS session and then forw
Hi Team,
We use haproxy to front tls for a large number of endpoints, haproxy
prcesses the TLS session and then forwards the request to the backend
application.
What we have noticed is that if there are a large number of connections
from different clients - the CPU usage goes up significantly.
apr...@none.at>
wrote:
> Hi Mihir.
>
> Am 11.05.2018 um 05:57 schrieb Mihir Shirali:
> > Hi Aleksandar,
> >
> > Why do you add http header for a tftp service?
> > Do you really mean https://de.wikipedia.org/wiki/Trivial_File_Transfer_
> P
cision based on the high number of requests.
On Fri, May 11, 2018 at 1:58 AM, Aleksandar Lazic <al-hapr...@none.at>
wrote:
> Am 10.05.2018 um 18:27 schrieb Mihir Shirali:
> > Hi Team,
> >
> > We have haproxy installed on a server which is being used primarily fo
Hi Team,
We have haproxy installed on a server which is being used primarily for
front ending TLS. After session establishment it sets certain headers in
the http request and forwards it to the application in the backend. The
back end application is a tftp server and hence it can receive requests
Hi All,
We have a scenario where HA proxy might send a large of "Acceptable client
certificate CA names" to the client as part of the "Certificate Request"
message. What we see on the client side, is that it balks with the following
error:
>>> TLS 1.2 Alert [length 0002], fatal
7 matches
Mail list logo