Hi Iago,
On Tue, Jan 24, 2023 at 04:45:54PM +0100, Iago Alonso wrote:
> We are happy to report that after downgrading to OpenSSL 1.1.1s (from
> 3.0.7), our performance problems are solved, and now looks like
> HAProxy scales linearly with the available resources.
Excellent, thanks for this nice f
We are happy to report that after downgrading to OpenSSL 1.1.1s (from
3.0.7), our performance problems are solved, and now looks like
HAProxy scales linearly with the available resources.
For reference, in a synthetic load test with a request payload of 2k,
and a 32-core server (128GB RAM) with 10
Interesting, so you have conntrack enabled. With 5M conns, there's no
reason to fill your table. However, have you checked your servers' kernel
logs to see if you find any "conntrack table full" message, that might
be caused by too fast connection recycling ?
We can't see any message mentioning c
On Fri, Dec 16, 2022 at 05:42:50PM +0100, Iago Alonso wrote:
> Hi,
>
> > Ah that's pretty useful :-) It's very likely dealing with the handshake.
> > Could you please run "perf top" on this machine and list the 10 top-most
> > lines ? I'm interested in seeing if you're saturating on crypto functio
Hi,
> Ah that's pretty useful :-) It's very likely dealing with the handshake.
> Could you please run "perf top" on this machine and list the 10 top-most
> lines ? I'm interested in seeing if you're saturating on crypto functions
> or locking functions (e.g. "native_queued_spin_lock_slowpath"), th
On Wed, Dec 14, 2022 at 02:04:44PM +0100, Iago Alonso wrote:
> Also, our connections are renewed constantly, with a ssl rate of about 3000
> per second, same as our connection rate.
Very useful, that answers one of my previous questions. Then please check
"perf top", it will be very instructive I
On Wed, Dec 14, 2022 at 12:50:10PM +0100, Iago Alonso wrote:
> Hi,
>
> We are not sure what element produces the errors, in the haproxy logs we
> don't see them.
Then they don't pass through haproxy nor do they come from haproxy.
> What does it happen with the new connections when we hit the
> l
Also, our connections are renewed constantly, with a ssl rate of about
3000 per second, same as our connection rate.
On 14/12/22 12:50, Iago Alonso wrote:
Hi,
We are not sure what element produces the errors, in the haproxy logs
we don't see them. What does it happen with the new connections
Hi,
We are not sure what element produces the errors, in the haproxy logs we
don't see them. What does it happen with the new connections when we hit
the limit? What server resource should be affected by it, if any?
We have our logs in `warning` level so we do not see the response time
on th
Hi,
We are letting HAProxy pick what it think is best for our hardware. It
seems to always pick `nbproc = 1` (we only have one cpu socket), and
`nbthread = $(nproc)`
On 14/12/22 3:15, Emerson Gomes wrote:
Hi,
Have you tried increasing the number of processes/threads?
I dont see any nbthrea
Hi,
On Tue, Dec 13, 2022 at 03:33:58PM +0100, Iago Alonso wrote:
> Hi,
>
> We do hit our defined max ssl/conn rates, but given the spare
> resources, we don't expect to suddenly return 5xx.
What bothers me is that once this limit is reached there's no more
connection accepted by haproxy so you s
Hi,
Have you tried increasing the number of processes/threads?
I dont see any nbthreads or nbproc in your config.
Check out https://www.haproxy.com/blog/multithreading-in-haproxy/
BR.,
Emerson
Em seg., 12 de dez. de 2022 às 02:49, Iago Alonso
escreveu:
> Hello,
>
> We are performing a lot of
Hi,
We do hit our defined max ssl/conn rates, but given the spare
resources, we don't expect to suddenly return 5xx.
Here's the output of `haproxy -vv` (I've also added it to the post on
discourse):
HAProxy version 2.6.6-274d1a4 2022/09/22 - https://haproxy.org/
Status: long-term supported branc
Hi,
On Mon, 2022-12-12 at 09:47 +0100, Iago Alonso wrote:
>
Can you share haproxy -vv output ?
> HAProxy config:
> global
> log /dev/log len 65535 local0 warning
> chroot /var/lib/haproxy
> stats socket /run/haproxy-admin.sock mode 660 level admin
> user haproxy
> group hapr
14 matches
Mail list logo