Hi Chris,
On Wed, Jan 24, 2018 at 10:07:03PM +, Christopher Lane wrote:
> Ping; this is a safe change to wanr about a confusing source of error when
> you don't quote the arguments to haproxy in a "soft reloading new config a
> lot" type of environment.
>
> On Thu, Dec 7, 2017 at 1:17 PM
On Fri, Jan 26, 2018 at 01:26:35AM +1100, Igor Cicimov wrote:
> Or you meant using the haproxy 16.04 image actually. Ok, another option is
> to compile it myself with the openssl version I have atm.
What mostly matters is the version used to *build* haproxy, because
some features have to be known
Hi Willy,
On Fri, Jan 26, 2018 at 3:47 PM, Willy Tarreau wrote:
> On Fri, Jan 26, 2018 at 01:26:35AM +1100, Igor Cicimov wrote:
> > Or you meant using the haproxy 16.04 image actually. Ok, another option
> is
> > to compile it myself with the openssl version I have atm.
>
> What
Hi Igor,
On Fri, Jan 26, 2018 at 05:07:10PM +1100, Igor Cicimov wrote:
> Hi Willy,
>
> On Fri, Jan 26, 2018 at 3:47 PM, Willy Tarreau wrote:
>
> > On Fri, Jan 26, 2018 at 01:26:35AM +1100, Igor Cicimov wrote:
> > > Or you meant using the haproxy 16.04 image actually. Ok, another
Hi Willy,
On Fri, Jan 26, 2018 at 6:21 PM, Willy Tarreau wrote:
> Hi Igor,
>
> On Fri, Jan 26, 2018 at 05:07:10PM +1100, Igor Cicimov wrote:
> > Hi Willy,
> >
> > On Fri, Jan 26, 2018 at 3:47 PM, Willy Tarreau wrote:
> >
> > > On Fri, Jan 26, 2018 at 01:26:35AM +1100,
Hey All,
We have UCARP and HAproxy configured and setup between two servers.
HAproxy is bound to the UCARP VIP between the nodes. There are four
services per hoer: four on SRV1 (primary) and same four apps on SRV2
(secondary) We need active / passive behavior, since apps don't support
an
Hi Tim,
On Thu, Jan 25, 2018 at 04:24:43PM +0100, Tim Duesterhus wrote:
> Willy,
>
> okay. I added Jarno to the commit message of the actual changes
> to the ipmask converter. I did not clean up the tags, you know
> best which ones you wanted to change. If Jarno complains about
> his name being
The incorrect comment was introduced in commit:
2ac5718dbd4ec722ece228e9f613d2be74eee9da
v1.5-dev9 is the first tag containing this comment, the fix
should be backported to haproxy 1.5 and newer.
---
include/types/arg.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git
The cast functions modify their output type as of commit:
b805f71d1bb1487f01f78a6ffab26d44919e9944
v1.5-dev20 is the first tag containing this comment, the fix
should be backported to haproxy 1.5 and newer.
---
src/sample.c | 2 --
1 file changed, 2 deletions(-)
diff --git a/src/sample.c
Hi Jonathan,
Thanks for your suggestion. Yes that would also be clean enough, thanks!
Just out of curiosity, would some form of concatenation of samples be possible?
Best regards,
Pieter Vogelaar
Van: Jonathan Matthews
Datum: donderdag 25 januari 2018 om 16:17
Aan:
It’s TCP layer 4 load balancing, so the HTTP hdr(host) won’t work.
Best regards,
Pieter Vogelaar
Van: Igor Cicimov
Datum: donderdag 25 januari 2018 om 16:33
Aan: Pieter Vogelaar
CC: "haproxy@formilux.org"
Unless I'm missing something, wouldn't you be rather better off just having
a dedicated frontend for each set of ports that forwards to each distinct
backend server?
Or are you doing this at webscale, or something? :-)
J
--
Jonathan Matthews
London, UK
http://www.jpluscplusm.com/contact.html
The len2mask4 function was introduced in commit:
70473a5f8c56d8ec2e837b9b66443dc252b24da9
which is about six years later than the commit that introduced the
str2mask function:
2937c0dd20f2f3c0065b671bbfe3fafcd8862eaf
This is a clean up in preparation for a str2mask6 function which
will use
This commit adds support for ARGT_MSK6 to make_arg_list().
---
src/arg.c | 11 +--
src/hlua.c | 7 +++
2 files changed, 16 insertions(+), 2 deletions(-)
diff --git a/src/arg.c b/src/arg.c
index 52977b718..b31858d3b 100644
--- a/src/arg.c
+++ b/src/arg.c
@@ -206,8 +206,15 @@ int
This new function mirrors the str2mask() function for IPv4 addresses.
This commit is in preparation to support ARGT_MSK6.
---
include/common/standard.h | 6 ++
src/standard.c| 22 ++
2 files changed, 28 insertions(+)
diff --git a/include/common/standard.h
Add an optional second parameter to the ipmask converter that specifies
the number of bits to mask off IPv6 addresses.
If the second parameter is not given IPv6 addresses fail to mask (resulting
in an empty string), preserving backwards compatibility: Previously
a sample like `src,ipmask(24)`
The file contained an 'e' with an gravis accent and thus was
not US-ASCII, but ISO-8859-1.
Also correct the spelling in the incorrect comment.
The incorrect character was introduced in commit:
4d9a1d1a5c4720a169654ee47f9a4364261ffab4
v1.6-dev1 is the first tag containing this comment, the fix
c_ipv62ip failed to set the output type of the cast to SMP_T_IPV4
even for a successful conversion.
This bug exists as of commit cc4d1716a2e72516c2505a6459a9ddbbfb186da2
which is the first commit adding this function.
v1.6-dev4 is the first tag containing this commit, the fix should
be
Willy,
okay. I added Jarno to the commit message of the actual changes
to the ipmask converter. I did not clean up the tags, you know
best which ones you wanted to change. If Jarno complains about
his name being in there, before you get the change to apply please
edit him out, as you need to
Hi Pieter,
On Thu, Jan 25, 2018 at 3:15 AM, Pieter Vogelaar
wrote:
> I have the following configuration:
>
>
>
>
>
> frontend default-tcp
>
> bind 192.168.52.12:5044
>
> bind 192.168.52.12:
>
> bind 192.168.52.12:5556
>
> bind 192.168.52.12:5672
>
> bind
On Fri, Jan 26, 2018 at 2:36 AM, Pieter Vogelaar
wrote:
> It’s TCP layer 4 load balancing, so the HTTP hdr(host) won’t work.
>
>
>
>
>
> Best regards,
>
> Pieter Vogelaar
>
>
>
> *Van: *Igor Cicimov
> *Datum: *donderdag 25 januari 2018
Hello Igor,
On 25 January 2018 at 15:22, Igor Cicimov
wrote:
>> Upgrade to the *current* LTS release, which is Ubuntu Xenial. It ships
>> OpenSSL 1.0.2.
>
>
> For sure I don't have to update the whole distro to get the newest openssl
> :-)
You mean you expect to
Hi,
I was testing haproxy 1.8 from the ppa repository and noticed it is not
build with alpn support so just wonder why?
Thanks,
Igor
Le 24/01/2018 à 23:54, Paul Lockaby a écrit :
This patch works for me. Thank you!
On Jan 24, 2018, at 1:02 PM, Christopher Faulet wrote:
Le 24/01/2018 à 17:21, Paul Lockaby a écrit :
Sorry, I know this list is super busy and that there are a number of other more
Le 25/01/2018 à 11:25, Linus Thiel a écrit :
Hi,
I seem to have hit a bug running the official Docker image for HAProxy.
When specifying no-check for a server, HAProxy segfaults.
I have prepared a test case, which is attached here. To run it:
docker-compose build
docker-compose up
I get:
Hi,
I seem to have hit a bug running the official Docker image for HAProxy.
When specifying no-check for a server, HAProxy segfaults.
I have prepared a test case, which is attached here. To run it:
docker-compose build
docker-compose up
I get:
haproxybug_haproxy-no-check-alpine_1 exited with
Hello,
On 25 January 2018 at 14:53, Igor Cicimov
wrote:
>
> Hi,
>
> The info below, that openssl version fort he build is little bit oldish isn't
> it?
>
> # haproxy -vv
> [...]
> Built with OpenSSL version : OpenSSL 1.0.1f 6 Jan 2014
> Running on OpenSSL
Hi Lukas,
On Fri, Jan 26, 2018 at 1:04 AM, Lukas Tribus wrote:
> Hello,
>
>
> On 25 January 2018 at 14:53, Igor Cicimov
> wrote:
> >
> > Hi,
> >
> > The info below, that openssl version fort he build is little bit oldish
> isn't it?
> >
> > #
On Thu, Jan 25, 2018 at 11:28:38AM +0100, Christopher Faulet wrote:
> Thanks for tests guys. Willy, you can merge the patch.
Applied, thanks!
Willy
Hi guys,
On Mon, Jan 22, 2018 at 08:13:59AM +0200, Jarno Huuskonen wrote:
> I did some brief testing on saturday and with this silly config
> frontend test4
> bind ipv4@127.0.0.1:8080
> bind ipv6@::1:8080
>
> http-request track-sc1 src,ipmask(32,128) table test_be
>
>
Hi Jérôme,
On Wed, Jan 24, 2018 at 02:38:20PM +0100, Jérôme Magnin wrote:
> Hi,
>
> I've been toying with haproxy and rate limiting lately, and noticed an odd
> behavior with rate-limit sessions, or maybe I misunderstood how it is supposed
> to be used.
>
> I'm using the following config:
>
>
Hello,
On 25 January 2018 at 13:26, Igor Cicimov
wrote:
> Hi,
>
> I was testing haproxy 1.8 from the ppa repository and noticed it is not
> build with alpn support so just wonder why?
Which OS exactly?
Lukas
On Thu, Jan 25, 2018 at 11:47:20AM +0100, Christopher Faulet wrote:
> This is a bug in HAProxy. I attached the patch. Willy, you can merge it. It
> must be backported in 1.8.
Applied, thanks!
Willy
On 2018-01-25 13:53, Willy Tarreau wrote:
> On Thu, Jan 25, 2018 at 11:47:20AM +0100, Christopher Faulet wrote:
>> This is a bug in HAProxy. I attached the patch. Willy, you can merge it. It
>> must be backported in 1.8.
>
> Applied, thanks!
Great, such quickness!
Happy to oblige,
Linus
--
Hi Igor,
On Thu, Jan 25, 2018 at 11:26:14PM +1100, Igor Cicimov wrote:
> Hi,
>
> I was testing haproxy 1.8 from the ppa repository and noticed it is not
> build with alpn support so just wonder why?
what's the output of haproxy -vv ?
Jérôme
Hi,
The info below, that openssl version fort he build is little bit oldish
isn't it?
# haproxy -vv
HA-Proxy version 1.8.3-1ppa1~trusty 2018/01/02
Copyright 2000-2017 Willy Tarreau
Build options :
TARGET = linux2628
CPU = generic
CC = gcc
CFLAGS = -g -O2
On Fri, Jan 26, 2018 at 1:22 AM, Igor Cicimov <
ig...@encompasscorporation.com> wrote:
> Hi Lukas,
>
> On Fri, Jan 26, 2018 at 1:04 AM, Lukas Tribus wrote:
>
>> Hello,
>>
>>
>> On 25 January 2018 at 14:53, Igor Cicimov
>> wrote:
>> >
>> > Hi,
>> >
37 matches
Mail list logo