Re: [1/2] git commit: TS-2986: Adding stats to TLS errors

2014-11-14 Thread James Peach
> On Nov 14, 2014, at 4:18 PM, Brian Geffon wrote: > > Weird that error message should have errno attached: > SSL_CLR_ERR_INCR_DYN_STAT(ssl_error_ssl, > "SSLNetVConnection::sslClientHandShakeEvent, SSL_ERROR_SSL errno=%d", errno); yeh that looks more promising in master, though I think it

Re: trafficserver git commit: [TS-3199]: Do not wait for body for HEAD method

2014-11-14 Thread James Peach
> On Nov 14, 2014, at 4:27 PM, sudhe...@apache.org wrote: > > Repository: trafficserver > Updated Branches: > refs/heads/master 5c37860c7 -> d26674750 > > > [TS-3199]: Do not wait for body for HEAD method > > > Project: http://git-wip-us.apache.org/repos/asf/trafficserver/repo > Commit: http

Re: [1/2] git commit: TS-2986: Adding stats to TLS errors

2014-11-14 Thread Brian Geffon
Weird that error message should have errno attached: SSL_CLR_ERR_INCR_DYN_STAT(ssl_error_ssl, "SSLNetVConnection::sslClientHandShakeEvent, SSL_ERROR_SSL errno=%d", errno); Your version must be older, can you hack together a debug build that logs errno? Brian On Fri, Nov 14, 2014 at 4:15 PM,

Re: [1/2] git commit: TS-2986: Adding stats to TLS errors

2014-11-14 Thread James Peach
> On Aug 6, 2014, at 10:20 AM, James Peach wrote: > > On Aug 5, 2014, at 12:16 PM, Brian Geffon wrote: > >> Technically you'd probably aggregate all of these into a single variable >> for production monitoring, but having insight into the individual failure >> scenarios could prove to be very

proxy.process.ssl.user_agent_sessions

2014-11-14 Thread James Peach
Hi all, So proxy.process.ssl.user_agent_sessions tracks the total number of SSL sessions successfully established (ie. cumulative session count). Since the name is ambigious, was this originally intended to track the *current* number of established sessions? J

Caching google searches

2014-11-14 Thread Victor Lucero
Guys. Hi. Im looking for a way to cache the google searches from a network but the problem is that the caching must be done transparent but I understand that put something in the middle of an SSL/TLS connection it what SSL/TLS avoids . There is a know working scenario of something like this? T