Aurélien D.
Aurélien D.
Maybe Lua filters could help you to achieve that: https://www.arpalert.org/src/haproxy-lua-api/3.0/index.html#filter-class If you need assistance about this feature, I suggest you to have a look at existing github issues (lua filters...
Regarding this observation: ``` The ring-level maxlen which I had set to 16384 triggered a warning: ``` I guess you're talking about this kind of warning? ``` [WARNING] (103159) :...
>In addition to that, the tcp syslog header announcing the payload's length (rfc-6587 octet counting) seems to be gone as well. Just thinking, perhaps the extra invalid bytes are there...
>Do you by any chance know if I should stick to powers-of-two or just set size = maxlen + overhead? (finding out what the overhead is is a bit tricky,...
> I'll still finish my bisect in any case, but cool to see that at least it won't be a dead end and unreproduceable on your side 😄 oh yes...
Regarding the regression described earlier (due to 01aa0a05), this patch seems to fix it on my side: ```diff diff --git a/src/log.c b/src/log.c index 0ab8c3308..e5d3782fb 100644 --- a/src/log.c +++ b/src/log.c @@...
>Regarding the regression described earlier (due to https://github.com/haproxy/haproxy/commit/01aa0a057c1553590891078854ddbbccf0eeffe3), this patch seems to fix it on my side: Here's the redacted patch: [0001-BUG-MEDIUM-log-ring-broken-syslog-octet-counting.patch.txt](https://github.com/haproxy/haproxy/files/15237591/0001-BUG-MEDIUM-log-ring-broken-syslog-octet-counting.patch.txt)
Now merged! Thanks guys
From your config: ``` stick-table type binary len 8 size 100k expire 10s store http_req_rate(1s) ``` Since `table_http_req_rate()` uses path as unique key, and that your setup involves long paths...
Thanks for the report, I'm able to reproduce First bad commit is: b4db3be86e03ec31055303d46056223bb989472e 7223296092c72c2b10729a6da218897887858dba aimed at fixing the above issue, but it is not sufficient and leads to UAF when...