Hi! Yes, we experienced it too. We just hacked radiusclient-ng to avoid using .seq file at all.
-- Best Regards, Alex Massover -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of Adrian Georgescu Sent: Saturday, January 10, 2009 7:23 PM To: [email protected] Cc: [email protected] Subject: [OpenSIPS-Users] group_radius , radiusclient problem The interfaces and backend used by OpenSIPS for functions like DNS, SQL and Radius impose much more relevant limits in scalability then OpenSIPS modules themselves. From your example, in my experience the limitation is most likely located in the Radius server rather than the client. Did you check the server if it can handle the amount of requests sent by OpenSIPS? Adrian >>>>>>> I have tried group_radius on system with 35K users. Check is being done for REGISTER and INVITE mgs. After enabling check with gflag, registered cound falls by 10K. In logs message below start appearing. Jan 9 02:18:46 aster20 /usr/sbin/openser[31418]: rc_get_seqnbr: couldn't get lock after 10 tries: /var/run/radius.seq Jan 9 02:18:46 aster20 /usr/sbin/openser[31395]: rc_get_seqnbr: couldn't get lock after 10 tries: /var/run/radius.seq Jan 9 02:18:46 aster20 /usr/sbin/openser[31417]: rc_get_seqnbr: couldn't get lock after 10 tries: /var/run/radius.seq Looks like it's readiusclient problem. Has anyone experience something similar? openser -V version: openser 1.2.2-notls (i386/linux) flags: STATS: Off, USE_IPV6, USE_TCP, DISABLE_NAGLE, USE_MCAST, SHM_MEM, SHM_MMAP, PKG_MALLOC, F_MALLOC, FAST_LOCK-ADAPTIVE_WAIT ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535 poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. svnrevision: unknown @(#) $Id: main.c 2304 2007-05-25 16:36:07Z bogdan_iancu $ main.c compiled on 01:12:52 Nov 5 2007 with gcc 4.1.2 -- Piotr Sobolewski sobolewski at gmail.com _______________________________________________ Users mailing list [email protected] http://lists.opensips.org/cgi-bin/mailman/listinfo/users ****************************************************************************** This footnote confirms that this email message has been scanned by Jajah Inc. Mail system for the presence of malicious code, vandals & computer viruses. ****************************************************************************** ****************************************************************************** This footnote confirms that this email message has been scanned by Jajah Inc. Mail system for the presence of malicious code, vandals & computer viruses. ****************************************************************************** _______________________________________________ Users mailing list [email protected] http://lists.opensips.org/cgi-bin/mailman/listinfo/users
