. For instance:
front-http/5: SSL handshake failure (error:0A00010B:SSL routines::wrong version
number)
You should use at least HAProxy 3.1 to benefit from the error-log-format for TLS
handshake errors.
--
Christopher Faulet
www.haproxy.org/l/code-reports
Latest builds: https://www.haproxy.org/l/dev-packages
---
Complete changelog :
Amaury Denoyelle (2):
BUG/MINOR: config: emit warning for empty args only in discovery mode
BUG/MINOR: config: fix arg number reported on empty arg warning
Christopher Faulet
ommon counters between
{fe,be}_counters_shared
MINOR: counters: add local-only internal rates to compute some maxes
MAJOR: counters: dispatch counters over thread groups
Christopher Faulet (11):
DOC: config: Fix a typo in 2.7 (Name format for maps and ACLs)
BUG/MEDIUM: check: Re
Le 01/06/2025 à 3:26 PM, Tim Duesterhus a écrit :
Introduced in:
25bcdb1d9 BUG/MAJOR: h1: Be stricter on request target validation during
message parsing
see also:
fbbbc33df REGTESTS: Do not use REQUIRE_VERSION for HAProxy 2.5+
Thanks, the series was merged !
--
Christopher Faulet
send-proxy" options with
ring servers
DOC: config: restore default values for resolvers hold directive
Christopher Faulet (17):
BUG/MEDIUM: mux-fcgi: Try to fully fill demux buffer on receive if not
empty
BUG/MINOR: cli: Issue an error when too many args are passed for a command
solvers hold directive
Basha Mougamadou (1):
DOC: configuration: explicit multi-choice on bind shards option
Christopher Faulet (29):
BUG/MINOR: cli: Issue an error when too many args are passed for a command
BUG/MINOR: mux-h1: Don't pretend connection was released for TCP>H1>H
Le 26/05/2025 à 11:47 PM, Ilya Shipitsin a écrit :
let's reduce code duplication by involving workflow templates
Merged, thanks !
--
Christopher Faulet
Le 30/04/2025 à 7:56 PM, Christopher Faulet a écrit :
Le 30/04/2025 à 5:12 PM, Ionel GARDAIS a écrit :
Hi,
For technical showoff, I was using the fcgi-app feature to serve PHP FPM
websites (matomo and a planning portal) but with the 3.0.10 update, haproxy
starts using 100% cpu and requests
found the offending commit is
indeed "BUG/MEDIUM: mux-fcgi: Properly handle read0 on partial records". I will
review it because on 3.1 and 3.2, there is no issue.
--
Christopher Faulet
.
--
Christopher Faulet
From 6c24a1e729697c2fd57f4bd479ffa965d774e1f4 Mon Sep 17 00:00:00 2001
From: Christopher Faulet
Date: Tue, 22 Apr 2025 15:27:12 +0200
Subject: [PATCH] BUG/MEDIUM: mux-spop: Respect the negociated max-frame-size
value to send frames
When a SPOP connection is opened, the
Le 02/04/2025 à 1:37 PM, Olivier D a écrit :
Hi,
Le mer. 2 avr. 2025 à 09:10, Christopher Faulet <mailto:cfau...@haproxy.com>> a écrit :
In fact, in your case, it is expected to have no compression. You abort the
request analysis, skipping this way the response analys
action that aborts the request. A lua service is an applet
that is equivalent to a server. So the response analysis is performed and the
response is no limited to one buffer. To do so, you must use the "use-service"
action.
--
Christopher Faulet
nt methods expected contexts
BUG/MEDIUM: pattern: prevent uninitialized reads in pat_match_{str,beg}
BUG/MINOR: stktable: fix big-endian compatiblity in smp_to_stkey()
BUG/MEDIUM: stktable: fix missing lock on some table converters
Christopher Faulet (20):
MEDIUM: h1: Accept
tktable: fix missing lock on some table converters
Christopher Faulet (7):
BUG/MEDIUM: stconn: Really report blocked send if sends are blocked by an
error
BUG/MEDIUM: mux-h1: Fix how timeouts are applied on H1 connections
BUG/MEDIUM: stconn: Don't forward shut for SC in connecting s
t; to the list of global parameters
DOC: config: add missing "track-sc0" in action keywords matrix
BUG/MINOR: stktable: fix big-endian compatiblity in smp_to_stkey()
BUG/MEDIUM: stktable: fix missing lock on some table converters
BUG/MAJOR: log/sink: possible sink
t;
DOC: config: add missing "track-sc0" in action keywords matrix
BUG/MINOR: stktable: fix big-endian compatiblity in smp_to_stkey()
BUG/MEDIUM: stktable: fix missing lock on some table converters
BUG/MAJOR: log/sink: possible sink collision in sink_new_from_srv()
Christoph
big-endian compatiblity in smp_to_stkey()
BUG/MEDIUM: stktable: fix missing lock on some table converters
BUG/MAJOR: log/sink: possible sink collision in sink_new_from_srv()
Christopher Faulet (3):
BUG/MEDIUM: promex: Use right context pointers to dump backends
extra-counters
B
ltiplex the requests.
--
Christopher Faulet
tests using tune.lua.smp-preserve-bool
MINOR: hlua: rename "tune.lua.preserve-smp-bool" to
"tune.lua.bool-sample-conversion"
BUG/MINOR: stats: fix segfault caused by uninitialized value in "show schema
json"
DOC: config: add missing "track-sc
INOR: quic: remove startup alert if conn socket-owner unsupported
Aurelien DARRAGON (2):
DOC: lua: fix yield-dependent methods expected contexts
BUG/MEDIUM: event_hdl: fix uninitialized value in async mode when no data
is provided
Christopher Faulet (21):
MINOR: mux-h1: Set EOI on S
nt methods expected contexts
BUG/MEDIUM: event_hdl: fix uninitialized value in async mode when no data
is provided
Christopher Faulet (20):
BUG/MEDIUM: resolvers: Insert a non-executed resulution in front of the
wait list
BUG/MEDIUM: mux-h2: Don't send RST_STREAM frame
uninitialized reads in pat_match_{str,beg}
DOC: lua: fix yield-dependent methods expected contexts
BUG/MINOR: log: fix lf_text() behavior with empty string
BUG/MEDIUM: event_hdl: fix uninitialized value in async mode when no data
is provided
Christopher Faulet (23):
BUG/MEDIUM:
REAM was received on the client side:
h2s.flags = H2_SF_HEADERS_RCVD | H2_SF_RST_RCVD | H2_SF_ES_RCVD
So the request was in fact aborted by the client and this was forwarded to the
server. You may be interested by logging fs.aborted / fs.rst_code and bs.aborted
/ bs.rst_code to have more info and a confirmation too.
Regards,
--
Christopher Faulet
uck in maintenance after FQDN change
BUG/MEDIUM: hlua: make hlua_ctx_renew() safe
BUG/MEDIUM: hlua: properly handle sample func errors in
hlua_run_sample_{fetch,conv}()
BUG/MEDIUM: connection/http-reuse: fix address collision on unhandled
address families
Christopher Faulet (8):
BUG/MEDIUM: hlua: properly handle sample func errors in
hlua_run_sample_{fetch,conv}()
BUG/MEDIUM: connection/http-reuse: fix address collision on unhandled
address families
Christopher Faulet (3):
BUG/MINOR: http-ana: Don't report a server abort if response payload is
in
make hlua_ctx_renew() safe
BUG/MEDIUM: hlua: properly handle sample func errors in
hlua_run_sample_{fetch,conv}()
DOC: config: fix rfc7239 forwarded typo in desc
BUG/MEDIUM: connection/http-reuse: fix address collision on unhandled
address families
Christopher Faulet (9):
le func errors in
hlua_run_sample_{fetch,conv}()
DOC: config: fix rfc7239 forwarded typo in desc
BUG/MEDIUM: connection/http-reuse: fix address collision on unhandled
address families
Christopher Faulet (17):
MINOR: mux-h1: Set EOI on SE during demux when both side are in DONE
-reuse: fix address collision on unhandled
address families
DOC: config: add missing glitch_{cnt,rate} data types
DOC: config: add missing glitch_{cnt,rate} sample definitions
Christopher Faulet (24):
MINOR: connection: No longer include stconn type header in connection-t.h
I guess if someone adds a "retry-on" directive to enable some L7
retries on a backend, he also wants to wait for a full request to honor the
retry-on.
--
Christopher Faulet
request payloads <
256K, but that's not what I'm seeing. Notice that sometimes there
will be retries, and the timers.Ta is consistent with the total
number of retries, but most of the time haproxy is not retrying.
This is not only happening on 504s; it's happening on 503s as well.
Not sure on other other types since those are a little harder to
induce. I've tried playing with the tune.bufsize parameter since
our reqest payloads can be quite large (max up to 1MB recently).
It's currently set it to 256K for now since that covers the 95%-ile.
The default 16K so initially we were getting almost zero retries,
but I've also tried setting tune.bufsize to 1MB, which did not
change anything either. I've also played with various retry-on
settings (like all-retryable-errors) but same thing.
Hi,
As you noticed, the request must fit in a buffer to perform L7-retries. But it
must also be fully received. You should probably add the "http-buffer-request"
option or use "wait-for-body" action if you need more control.
I recently noticed it was not mentionned in the "retry-on" documentation. And it
is not obvious. I must update the doc. Another solution would be to
automatically wait for the request body if some L7-retries are enabled.
--
Christopher Faulet
Le 08/10/2024 à 18:07, Christopher Faulet a écrit :
Le 08/10/2024 à 16:13, Christopher Faulet a écrit :
Le 08/10/2024 à 11:05, Luke Seelenbinder a écrit :
Hi Christopher,
I was out last week, but we were able to gather a few more pieces of data.
1) We ran some tcpdumps, and nothing odd
Le 08/10/2024 à 16:13, Christopher Faulet a écrit :
Le 08/10/2024 à 11:05, Luke Seelenbinder a écrit :
Hi Christopher,
I was out last week, but we were able to gather a few more pieces of data.
1) We ran some tcpdumps, and nothing odd popped up at all. Given our traffic
levels, we were
g for
the response")
The first one is the best candidate. If you perform some tests, you can try to
revert it.
--
Christopher Faulet
e, I guess it could be easier to
track the issue on Github.
Outside this bug, have you many unsuccessful termination states in your logs
(other than '' in fact) ? If not, it could be possible to enable H1 traces
on error level. Let me know. In the mean time, I will review the 3.0.5 changes...
--
Christopher Faulet
HAProxy. I don't know how it is possible.
--
Christopher Faulet
following one, not sure:
commit e2a93b649286b30245333eec5851acd3991fda47
Author: Christopher Faulet
Date: Mon Jul 29 17:48:16 2024 +0200
BUG/MEDIUM: stconn: Report error on SC on send if a previous SE error was
set
When a send on a connection is performed, if a SE error (or a pending error)
was
d versions for the backports. Nothing fancy.
Regards,
--
Christopher Faulet
tp1-proxy-tunnel" for the server keyword. And
set-http1-proxy-tunnel-header/set-http1-proxy-tunnel-target. IMHO, It is
important to specify the action performed (set here), to be able to add other
kind of actions (add, del...), even if it is unlikely for now.
I guess, it's all for now 😉
Regards,
--
Christopher Faulet
: add a test to ensure map-ordering is preserved
BUG/MINOR: pattern: prevent const sample from being tampered in
pat_match_beg()
BUG/MEDIUM: pattern: prevent UAF on reused pattern expr
BUG/MINOR: cfgparse-listen: fix option httpslog override warning message
Christopher Faulet (12
pered in
pat_match_beg()
BUG/MEDIUM: pattern: prevent UAF on reused pattern expr
BUG/MINOR: cfgparse-listen: fix option httpslog override warning message
Christopher Faulet (21):
BUG/MINOR: h1: Fail to parse empty transfer coding names
BUG/MINOR: h1: Reject empty coding name a
in to review your patchs. I guess I will be able to give you a
feedback soon. Very sorry for the delay !
Regards,
--
Christopher Faulet
once event miss
and leak
BUG/MINOR: pattern: prevent const sample from being tampered in
pat_match_beg()
BUG/MEDIUM: pattern: prevent UAF on reused pattern expr
BUG/MINOR: cfgparse-listen: fix option httpslog override warning message
Christopher Faulet (12):
BUG/MEDIUM: stco
al entries updates may not be advertised after resync
BUG/MINOR: cfgparse-listen: fix option httpslog override warning message
Christopher Faulet (14):
BUG/MEDIUM: stconn: Report error on SC on send if a previous SE error was
set
BUG/MEDIUM: mux-pt/mux-h1: Release the p
pi/event_hdl: small updates, fix an example and add some precisions
BUG/MINOR: hlua: report proper context upon error in
hlua_cli_io_handler_fct()
Christopher Faulet (16):
BUG/MEDIUM: proxy: fix email-alert invalid free
BUG/MEDIUM: stick-table: Decrement the ref count inside lock
In attachement, the whole series for 3.0 and 2.8: My first 3 patches and the 3
new ones.
I'm going to be on vacation for 3 weeks. so there's no rush
Many thanks for your help.
--
Christopher Faulet
From db2e751bc8cc4bd8a96d2149c8a59022d15b9709 Mon Sep 17 00:00:00 2001
From: Christopher Faulet
o be a coincidence. So I may have missed something the first time,
distracted by the splicing. So, for now, it is better to wait a bit before
testing my fixes. I hope to find the root cause of the issue quickly.
Thanks !
--
Christopher Faulet
Le 29/07/2024 à 16:30, Jens Wahnes a écrit :
Christopher Faulet wrote:
Le 29/07/2024 à 09:05, Christopher Faulet a écrit :
Thanks, I will investigate. It is indeed most probably an issue with the
splicing, as Willy said. I will try to find the bug on the 2.8 and
figure out if
upper versions
Le 29/07/2024 à 09:05, Christopher Faulet a écrit :
Thanks, I will investigate. It is indeed most probably an issue with the
splicing, as Willy said. I will try to find the bug on the 2.8 and figure out if
upper versions are affected too.
I'm able to reproduce the issue by hacking the
eed most probably an issue with the
splicing, as Willy said. I will try to find the bug on the 2.8 and figure out if
upper versions are affected too.
--
Christopher Faulet
Le 28/03/2024 à 18:14, Christopher Faulet a écrit :
Thanks Lokesh, Abhijeet and Aleksandar for your feedback. This truly help us.
Thanks too to Pierre and Mattia for their feedback on the request mirroring.
Rest assured that we take this into account in our reflections.
After some internal
Le 10/07/2024 à 09:02, Maciej Zdeb a écrit :
Hi,
I've tested this patch and it looks very promising - no errors so far. I will
deploy it tomorrow on a larger scale.
Thanks Christopher!
Thanks ! I will merge it.
--
Christopher Faulet
e the issue is that there are applets but not on the current thread.
The following patch should fix the issue. Could you confirm it really fixes your
issue ? it can safely be applied on the 2.8.9 or 2.8-HEAD.
FYI, I'm working on the SPOE refactoring. I hope the f
Le 14/06/2024 à 16:22, Christopher Faulet a écrit :
Le 14/06/2024 à 16:20, Willy Tarreau a écrit :
On Fri, Jun 14, 2024 at 04:12:03PM +0200, Christopher Faulet wrote:
Hi,
HAProxy 3.1-dev1 was released on 2024/06/14. It added 95 new commits
after version 3.1-dev0.
Because Willy announced
Le 14/06/2024 à 16:20, Willy Tarreau a écrit :
On Fri, Jun 14, 2024 at 04:12:03PM +0200, Christopher Faulet wrote:
Hi,
HAProxy 3.1-dev1 was released on 2024/06/14. It added 95 new commits
after version 3.1-dev0.
Because Willy announced publicly I should managed a -dev1 before his return
from
MINOR: log: provide proxy context to resolve_logger()
MINOR: log: add __send_log_set_metadata_sd helper
MINOR: log: add logger flags
MINOR: log: add log-profile parsing logic
MINOR: log: add log profile buildlines
MEDIUM: log: handle log-profile in process_send_log()
ename show stats domain cli "dns" to "resolvers"
Christopher Faulet (1):
BUG/MAJOR: mux-h1: Prevent any UAF on H1 connection after draining a
request
Valentine Krasnobaeva (2):
DOC/MINOR: management: add missed -dR and -dv options
DOC/MINOR: management: add -dZ option
--
Christopher Faulet
proxy_free_common()
DOC: management: rename show stats domain cli "dns" to "resolvers"
Christopher Faulet (2):
BUG/MINOR: promex: Skip resolvers metrics when there is no resolver
section
BUG/MAJOR: mux-h1: Prevent any UAF on H1 connection after draining a
r
fix. I choose to keep your message with just a comment at the end.
However, I changed the subject to "BUG/MEDIUM: stconn/mux-h1: Fix suspect change
causing timeouts".
It is part of the 3.0.1.
--
Christopher Faulet
n't use lua_pushfstring() when we don't expect LJMP
BUG/MINOR: hlua: fix unsafe hlua_pusherror() usage
BUG/MINOR: hlua: prevent LJMP in hlua_traceback()
BUG/MINOR: hlua: fix leak in hlua_ckch_set() error path
CLEANUP: hlua: simplify ambiguous lua_insert() usage in
CO_SRC_TPROXY_DIP).
Finally, I didn't checked deeply, but CO_SRC_TPROXY_CIP is used in proto_tcp.c
and proto_quic.c files. I guess something must also be added here.
I have also a question. For completeness, could the 'dst' parameter be useful ?
--
Christopher Faulet
://www.haproxy.org/l/code-reports
Latest builds: https://www.haproxy.org/l/dev-packages
---
Complete changelog :
Christopher Faulet (1):
BUILD: proxy: Replace free_logformat_list() to manually release log-format
--
Christopher Faulet
xtract_{ipv4,ipv6}
BUG/MINOR: server: 'source' interface ignored from 'default-server'
directive
DOC: config: balance 'first' not usable in LOG mode
BUG/MINOR: log/balance: detect if user tries to use unsupported algo
BUG/MINOR: proxy: fix logform
MINOR: hlua: use accessors for stream hlua ctx
BUG/MEDIUM: hlua: streams don't support mixing lua-load with
lua-load-per-thread (2nd try)
OPTIM: http_ext: avoid useless copy in http_7239_extract_{ipv4,ipv6}
BUG/MINOR: server: 'source' interface ignored from 'default-s
BUG/MINOR: hlua: missing lock in hlua_filter_new()
BUG/MINOR: hlua: fix missing lock in hlua_filter_delete()
BUG/MINOR: server: 'source' interface ignored from 'default-server'
directive
DEBUG: lua: precisely identify if stream is stuck inside lua or not
MIN
;default-server'
directive
DEBUG: lua: precisely identify if stream is stuck inside lua or not
MINOR: hlua: use accessors for stream hlua ctx
BUG/MEDIUM: hlua: streams don't support mixing lua-load with
lua-load-per-thread (2nd try)
BUG/MINOR: proxy: fix logf
R: cfgparse: report proper location for log-format-sd errors
BUG/MINOR: server: 'source' interface ignored from 'default-server'
directive
DEBUG: lua: precisely identify if stream is stuck inside lua or not
MINOR: hlua: use accessors for stream hlua ctx
):
BUG/MINOR: cfgparse: report proper location for log-format-sd errors
BUG/MINOR: server: 'source' interface ignored from 'default-server'
directive
Christopher Faulet (6):
BUG/MEDIUM: mux-h2: Report too large HEADERS frame only when rxbuf is
empty
NOR: server: 'source' interface ignored from 'default-server'
directive
Christopher Faulet (5):
BUG/MEDIUM: mux-h2: Report too large HEADERS frame only when rxbuf is
empty
BUG/MEDIUM: spoe: Never create new spoe applet if there is no server up
BUG/MINOR: hlua:
med on the 3.1.
Of course, it is still a subject under discussion. The above issue is here to
collect ideas for the next steps but also for more long term features. Feel free
to feed it.
Regards,
--
Christopher Faulet
et us know your feeling and if
you have any suggestion, we will be happy to talk about it.
Regards,
--
Christopher Faulet
Le 11/01/2024 à 16:14, Christopher Faulet a écrit :
Hi,
HAProxy 2.9.2 was released on 2024/01/11. It added 37 new commits
after version 2.9.1.
A major issue about the zero-copy forwarding in TCP mode was fixed in this
release. A regression was introduced to the 2.9.1, blocking connection
ession
REGTESTS: add a test to ensure map-ordering is preserved
Christopher Faulet (6):
DOC: config: Update documentation about local haproxy response
BUG/MINOR: server: Use the configured address family for the initial
resolution
BUG/MAJOR: stconn: Disable zero-copy forwardi
Le 05/01/2024 à 18:17, Christopher Faulet a écrit :
Le 05/01/2024 à 14:45, Marcello Lorenzi a écrit :
yes we did it and we didn't notice the issue.
So I suggest you stay on the 2.9.1 without zero-copy forwarding for now. A new
release will be emitted soon, fixing the CPU issue.
Coul
Le 05/01/2024 à 14:45, Marcello Lorenzi a écrit :
yes we did it and we didn't notice the issue.
So I suggest you stay on the 2.9.1 without zero-copy forwarding for now. A new
release will be emitted soon, fixing the CPU issue.
Il giorno ven 5 gen 2024 alle ore 14:35 Christopher F
?
--
Christopher Faulet
he truncated response issue is still there on
the 2.9.1. And if you still experience a CPU issue with the zero-copy forwarding
disabled, it is also a unknown bug...
--
Christopher Faulet
open an issue on the issue tracker
(https://github.com/haproxy/haproxy/issues). Don't forget to share your
configuration and the log message corresponding to the truncated response.
Thanks,
--
Christopher Faulet
github/matrix.py | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
Merged now, Thanks !
--
Christopher Faulet
| 6 +++---
10 files changed, 25 insertions(+), 25 deletions(-)
Nerged now. Thanks !
--
Christopher Faulet
fy supported sections for "max-session-srv-conns"
DOC: config: add matrix entry for "max-session-srv-conns"
Christopher Faulet (2):
BUG/MEDIUM: mux-h2: Don't report an error on shutr if a shutw is pending
BUG/MEDIUM: peers: Be sure to always refresh recconnect
onfig: add matrix entry for "max-session-srv-conns"
Christopher Faulet (17):
BUG/MEDIUM: stconn: Wake applets on sending path if there is a pending
shutdown
BUG/MEDIUM: stconn/stream: Forward shutdown on write timeout
BUG/MEDIUM: mux-fcgi: Don't swap trash and dbu
Le 20/09/2023 à 22:14, Valters Jansons a écrit :
On Mon, Sep 18, 2023 at 9:32 AM Christopher Faulet wrote:
Please find a new patch. It should be good ( or better at least :)
The provided patch resolves my scenario for both the gRPC
server-client as well as the Java client to nginx server
ury Denoyelle (1):
BUG/MEDIUM: mux-quic: report early error on stream
Aurelien DARRAGON (2):
BUG/MEDIUM: map/acl: pat_ref_{set,delete}_by_id regressions
BUG/MINOR: ext-check: cannot use without preserve-env
Christopher Faulet (6):
MINOR: version: mention that it's st
DOC: config: add matrix entry for "max-session-srv-conns"
Cedric Paillet (1):
BUG/MINOR: promex: fix backend_agg_check_status
Christopher Faulet (20):
BUG/MEDIUM: dns: Be sure to unlock DSS when existing
dns_session_io_handler()
BUG/MEDIUM: stconn: Wake applets
s for "max-session-srv-conns"
DOC: config: add matrix entry for "max-session-srv-conns"
DOC: config: fix monitor-fail typo
Cedric Paillet (1):
BUG/MINOR: promex: fix backend_agg_check_status
Chris Staite (1):
BUG/MEDIUM: h1-htx: Ensure chunked parsing w
;max-session-srv-conns"
DOC: config: add matrix entry for "max-session-srv-conns"
DOC: config: fix monitor-fail typo
Cedric Paillet (1):
BUG/MINOR: promex: fix backend_agg_check_status
Chris Staite (1):
BUG/MEDIUM: h1-htx: Ensure chunked parsing with full
en: fix warning being reported as an alert
DOC: config: specify supported sections for "max-session-srv-conns"
DOC: config: add matrix entry for "max-session-srv-conns"
DOC: config: fix monitor-fail typo
Christopher Faulet (2):
BUG/MEDIUM: master/cli: Proper
fected, but it is still
possible to get a processing error.
The fix will be shipped with the 2.9-dev11.
--
Christopher Faulet
ile it (make dev/haring/haring). Then run
./dev/haring/haring -f /tmp/blah | less
--
Christopher Faulet
e mix up with indent changes.
However, I don't understand what you want to achieve. If you are using an
externel-check, there is no TCP health-check. The check port is useless in this
case.
--
Christopher Faulet
option httplog
Hi,
If you define a specific log-format, don't set httplog option. This directive,
set after your log-format will override it.
--
Christopher Faulet
BUG/MINOR: cfgparse/stktable: fix error message on stktable_init() failure
BUG/MINOR: stick-table/cli: Check for invalid ipv4 key
BUG/MINOR: sink: don't learn srv port from srv addr
Cedric Paillet (1):
BUG/MINOR: promex: fix backend_agg_check_status
Christopher Faulet (42):
Le 27/09/2023 à 16:43, Vladimir Vdovin a écrit :
Added set-timeout for frontend side of session, so it can be used to set
custom per-client timeouts if needed. Added cur_client_timeout to fetch
client timeout samples.
Thanks Vladimir! The patch is merged now.
--
Christopher Faulet
too busy to rework your patch it is
really not a problem. I can add the change on top of your patch or just amend it
before merging it. Just let me know.
--
Christopher Faulet
could you update "reg-tests/http-set-timeout/set_timeout.vtc" script to
add a test about the client timeout.
Of course, if you need some help or if you have any question, ask for it.
--
Christopher Faulet
her, could you please
review it next week so that we don't forget it ?
Rahh sorry, I saw it and forgotten to review it. I'll do it today of course !
--
Christopher Faulet
Le 20/09/2023 à 22:14, Valters Jansons a écrit :
On Mon, Sep 18, 2023 at 9:32 AM Christopher Faulet wrote:
Please find a new patch. It should be good ( or better at least :)
The provided patch resolves my scenario for both the gRPC
server-client as well as the Java client to nginx server
Le 16/09/2023 à 16:00, Valters Jansons a écrit :
On Thu, Sep 14, 2023 at 12:35 PM Christopher Faulet wrote:
After a discussion with Willy, we've hopefully found a way to fix the issue by
delaying detection of the server abort on the request processing side when there
is a response to fo
of an unhandled event.
Thus it could be go to test it on your side if it is possible. The patch is in
attachment. It can be applied on top of the 2.9 or 2.8. Is this possible for you ?
--
Christopher Faulet
From 04892caae72eb13605e4a32b4a182ec22fcc30bf Mon Sep 17 00:00:00 2001
From: Christ
ck_count[srv_check_status] += 1;
+ }
sv = sv->next;
}
for (; ctx->obj_state < HCHK_STATUS_SIZE;
ctx->obj_state++) {
Thanks, merged now !
--
Christopher Faulet
1 - 100 of 795 matches
Mail list logo