On 23/08/11 00:03, Justin Lawler wrote:
Hi,

We have had to put in a number of URLs to the squid bypass

icap_service service_1 reqmod_precache 0 icap://127.0.0.1:1344/reqmod
icap_class class_1 service_1

acl bypassIcapRequestURLregex urlpath_regex 
"./squid-3/etc/byPass_ICAP_request_URLregex.properties"
icap_access class_1 deny bypassIcapRequestURLregex


When we added 4 regular expressions to this file, we started to see the CPU 
usage going up quite a bit, and we started to see the number of established 
connections from squid to ICAP server double or triple.

Is this a known issue? Is there a better/more efficient way to bypass ICAP than 
above?

Other than using other ACL types, no.


Regular expressions were very simple, just matching end of URLs.

a) regex is a bit slow. Did you remember to anchor the ends? and manually aggregate the patterns? avoid extended-regex pattern tricks?

b) URLs can be many KB in length. That can make URL regex very CPU intensive.

d) routing selection ACLs are run multiple times per request.

You can turn on access control debugging (level 28,3) to see how many times those are run and how long they take each test.


We're running squid 3.0.15 on Solaris 10.



Amos
--
Please be using
  Current Stable Squid 2.7.STABLE9 or 3.1.14
  Beta testers wanted for 3.2.0.10

Reply via email to