[DOC] stats: document "show table" and "clear table"
diff --git a/doc/configuration.txt b/doc/configuration.txt
index d32c2da..e6e9727 100644
--- a/doc/configuration.txt
+++ b/doc/configuration.txt
@@ -8456,6 +8456,28 @@
server. This has the same effect as restarting. This command is restricted
and can only be issued on sockets configured for level "admin".
+clear table <table> key <key>
+ Remove entry <key> from the stick-table <table>. The key must be of the same
+ type as the table, which currently is limited to IPv4. This is typically used
+ un unblock some users complaining they have been abusively denied access to a
+ service, but this can also be used to clear some stickiness entries matching
+ a server that is going to be replaced (see "show table" below for details).
+ Note that sometimes, removal of a key will be refused because it is currently
+ tracked by a session. Retrying a few seconds later after the session ends is
+ usuall enough.
+
+ Example :
+ >>> $ echo "show table http_proxy" | socat stdio /tmp/sock1
+ # table: http_proxy, type: 0, size:204800, used:2
+ 0x80e6a4c: key=127.0.0.1 use=0 exp=3594729 gpc0=0 conn_rate(30000)=1 bytes_out_rate(60000)=187
+ 0x80e6a80: key=127.0.0.2 use=0 exp=3594740 gpc0=1 conn_rate(30000)=10 bytes_out_rate(60000)=191
+
+ $ echo "clear table http_proxy key 127.0.0.1" | socat stdio /tmp/sock1
+
+ $ echo "show table http_proxy" | socat stdio /tmp/sock1
+ # table: http_proxy, type: 0, size:204800, used:1
+ 0x80e6a80: key=127.0.0.2 use=0 exp=3594740 gpc0=1 conn_rate(30000)=10 bytes_out_rate(60000)=191
+
disable server <backend>/<server>
Mark the server DOWN for maintenance. In this mode, no more checks will be
performed on the server until it leaves maintenance.
@@ -8630,6 +8652,59 @@
A similar empty line appears at the end of the second block (stats) so that
the reader knows the output has not been truncated.
+show table
+ Dump general information on all known stick-tables. Their name is returned
+ (the name of the proxy which holds them), their type (currently zero, always
+ IP), their size in maximum possible number of entries, and the number of
+ entries currently in use.
+
+ Example :
+ >>> $ echo "show table" | socat stdio /tmp/sock1
+ # table: front_pub, type: 0, size:204800, used:171454
+ # table: back_rdp, type: 0, size:204800, used:0
+
+show table <name> [ data.<type> <operator> <value> ]
+ Dump contents of stick-table <name>. In this mode, a first line of generic
+ information about the table is reported as with "show table", then all
+ entries are dumped. Since this can be quite heavy, it is possible to specify
+ a filter in order to specify what entries to display. The filter then applies
+ to the stored data (see "stick-table" in section 4.2). One stored data type
+ has to be specified in <type>, and this data type must be stored in the table
+ otherwise an error is reported. The data is compared according to <operator>
+ with the 64-bit integer <value>. Operators are the same as with the ACLs :
+ - eq : match entries whose data is equal to this value
+ - ne : match entries whose data is not equal to this value
+ - le : match entries whose data is less than or equal to this value
+ - ge : match entries whose data is greater than or equal to this value
+ - lt : match entries whose data is less than this value
+ - gt : match entries whose data is greater than this value
+
+ Example :
+ >>> $ echo "show table http_proxy" | socat stdio /tmp/sock1
+ # table: http_proxy, type: 0, size:204800, used:2
+ 0x80e6a4c: key=127.0.0.1 use=0 exp=3594729 gpc0=0 conn_rate(30000)=1 bytes_out_rate(60000)=187
+ 0x80e6a80: key=127.0.0.2 use=0 exp=3594740 gpc0=1 conn_rate(30000)=10 bytes_out_rate(60000)=191
+
+ >>> $ echo "show table http_proxy data.gpc0 gt 0" | socat stdio /tmp/sock1
+ # table: http_proxy, type: 0, size:204800, used:2
+ 0x80e6a80: key=127.0.0.2 use=0 exp=3594740 gpc0=1 conn_rate(30000)=10 bytes_out_rate(60000)=191
+
+ >>> $ echo "show table http_proxy data.conn_rate gt 5" | socat stdio /tmp/sock1
+ # table: http_proxy, type: 0, size:204800, used:2
+ 0x80e6a80: key=127.0.0.2 use=0 exp=3594740 gpc0=1 conn_rate(30000)=10 bytes_out_rate(60000)=191
+
+ When the data criterion applies to a dynamic value dependent on time such as
+ a bytes rate, the value is dynamically computed during the evaluation of the
+ entry in order to decide whether it has to be dumped or not. This means that
+ such a filter could match for some time then not match anymore because as
+ time goes, the average event rate drops.
+
+ It is possible to use this to extract lists of IP addresses abusing the
+ service, in order to monitor them or even blacklist them in a firewall.
+ Example :
+ $ echo "show table http_proxy data.gpc0 gt 0" | socat stdio /tmp/sock1 \
+ | fgrep 'key=' | cut -d' ' -f2 | cut -d= -f2 > abusers-ip.txt
+ ( or | awk '/key/{ print a[split($2,a,"=")]; }' )
/*
* Local variables: