blob: 8ce8e6a39048cf2073c11cc6908627f97a95d4e7 [file] [log] [blame]
Willy Tarreau2212e6a2015-10-13 14:40:55 +02001 ------------------------
2 HAProxy Management Guide
3 ------------------------
4 version 1.6
5
6
7This document describes how to start, stop, manage, and troubleshoot HAProxy,
8as well as some known limitations and traps to avoid. It does not describe how
9to configure it (for this please read configuration.txt).
10
11Note to documentation contributors :
12 This document is formatted with 80 columns per line, with even number of
13 spaces for indentation and without tabs. Please follow these rules strictly
14 so that it remains easily printable everywhere. If you add sections, please
15 update the summary below for easier searching.
16
17
18Summary
19-------
20
211. Prerequisites
222. Quick reminder about HAProxy's architecture
233. Starting HAProxy
244. Stopping and restarting HAProxy
255. File-descriptor limitations
266. Memory management
277. CPU usage
288. Logging
299. Statistics and monitoring
Willy Tarreau44aed902015-10-13 14:45:29 +0200309.1. CSV format
319.2. Unix Socket commands
Willy Tarreau2212e6a2015-10-13 14:40:55 +02003210. Tricks for easier configuration management
3311. Well-known traps to avoid
3412. Debugging and performance issues
3513. Security considerations
36
37
381. Prerequisites
39----------------
40
41In this document it is assumed that the reader has sufficient administration
42skills on a UNIX-like operating system, uses the shell on a daily basis and is
43familiar with troubleshooting utilities such as strace and tcpdump.
44
45
462. Quick reminder about HAProxy's architecture
47----------------------------------------------
48
49HAProxy is a single-threaded, event-driven, non-blocking daemon. This means is
50uses event multiplexing to schedule all of its activities instead of relying on
51the system to schedule between multiple activities. Most of the time it runs as
52a single process, so the output of "ps aux" on a system will report only one
53"haproxy" process, unless a soft reload is in progress and an older process is
54finishing its job in parallel to the new one. It is thus always easy to trace
55its activity using the strace utility.
56
57HAProxy is designed to isolate itself into a chroot jail during startup, where
58it cannot perform any file-system access at all. This is also true for the
59libraries it depends on (eg: libc, libssl, etc). The immediate effect is that
60a running process will not be able to reload a configuration file to apply
61changes, instead a new process will be started using the updated configuration
62file. Some other less obvious effects are that some timezone files or resolver
63files the libc might attempt to access at run time will not be found, though
64this should generally not happen as they're not needed after startup. A nice
65consequence of this principle is that the HAProxy process is totally stateless,
66and no cleanup is needed after it's killed, so any killing method that works
67will do the right thing.
68
69HAProxy doesn't write log files, but it relies on the standard syslog protocol
70to send logs to a remote server (which is often located on the same system).
71
72HAProxy uses its internal clock to enforce timeouts, that is derived from the
73system's time but where unexpected drift is corrected. This is done by limiting
74the time spent waiting in poll() for an event, and measuring the time it really
75took. In practice it never waits more than one second. This explains why, when
76running strace over a completely idle process, periodic calls to poll() (or any
77of its variants) surrounded by two gettimeofday() calls are noticed. They are
78normal, completely harmless and so cheap that the load they imply is totally
79undetectable at the system scale, so there's nothing abnormal there. Example :
80
81 16:35:40.002320 gettimeofday({1442759740, 2605}, NULL) = 0
82 16:35:40.002942 epoll_wait(0, {}, 200, 1000) = 0
83 16:35:41.007542 gettimeofday({1442759741, 7641}, NULL) = 0
84 16:35:41.007998 gettimeofday({1442759741, 8114}, NULL) = 0
85 16:35:41.008391 epoll_wait(0, {}, 200, 1000) = 0
86 16:35:42.011313 gettimeofday({1442759742, 11411}, NULL) = 0
87
88HAProxy is a TCP proxy, not a router. It deals with established connections that
89have been validated by the kernel, and not with packets of any form nor with
90sockets in other states (eg: no SYN_RECV nor TIME_WAIT), though their existence
91may prevent it from binding a port. It relies on the system to accept incoming
92connections and to initiate outgoing connections. An immediate effect of this is
93that there is no relation between packets observed on the two sides of a
94forwarded connection, which can be of different size, numbers and even family.
95Since a connection may only be accepted from a socket in LISTEN state, all the
96sockets it is listening to are necessarily visible using the "netstat" utility
97to show listening sockets. Example :
98
99 # netstat -ltnp
100 Active Internet connections (only servers)
101 Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
102 tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 1629/sshd
103 tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 2847/haproxy
104 tcp 0 0 0.0.0.0:443 0.0.0.0:* LISTEN 2847/haproxy
105
106
1073. Starting HAProxy
108-------------------
109
110HAProxy is started by invoking the "haproxy" program with a number of arguments
111passed on the command line. The actual syntax is :
112
113 $ haproxy [<options>]*
114
115where [<options>]* is any number of options. An option always starts with '-'
116followed by one of more letters, and possibly followed by one or multiple extra
117arguments. Without any option, HAProxy displays the help page with a reminder
118about supported options. Available options may vary slightly based on the
119operating system. A fair number of these options overlap with an equivalent one
120if the "global" section. In this case, the command line always has precedence
121over the configuration file, so that the command line can be used to quickly
122enforce some settings without touching the configuration files. The current
123list of options is :
124
125 -- <cfgfile>* : all the arguments following "--" are paths to configuration
126 file to be loaded and processed in the declaration order. It is mostly
127 useful when relying on the shell to load many files that are numerically
128 ordered. See also "-f". The difference between "--" and "-f" is that one
129 "-f" must be placed before each file name, while a single "--" is needed
130 before all file names. Both options can be used together, the command line
131 ordering still applies. When more than one file is specified, each file
132 must start on a section boundary, so the first keyword of each file must be
133 one of "global", "defaults", "peers", "listen", "frontend", "backend", and
134 so on. A file cannot contain just a server list for example.
135
136 -f <cfgfile> : adds <cfgfile> to the list of configuration files to be
137 loaded. Configuration files are loaded and processed in their declaration
138 order. This option may be specified multiple times to load multiple files.
139 See also "--". The difference between "--" and "-f" is that one "-f" must
140 be placed before each file name, while a single "--" is needed before all
141 file names. Both options can be used together, the command line ordering
142 still applies. When more than one file is specified, each file must start
143 on a section boundary, so the first keyword of each file must be one of
144 "global", "defaults", "peers", "listen", "frontend", "backend", and so
145 on. A file cannot contain just a server list for example.
146
147 -C <dir> : changes to directory <dir> before loading configuration
148 files. This is useful when using relative paths. Warning when using
149 wildcards after "--" which are in fact replaced by the shell before
150 starting haproxy.
151
152 -D : start as a daemon. The process detaches from the current terminal after
153 forking, and errors are not reported anymore in the terminal. It is
154 equivalent to the "daemon" keyword in the "global" section of the
155 configuration. It is recommended to always force it in any init script so
156 that a faulty configuration doesn't prevent the system from booting.
157
158 -Ds : work in systemd mode. Only used by the systemd wrapper.
159
160 -L <name> : change the local peer name to <name>, which defaults to the local
161 hostname. This is used only with peers replication.
162
163 -N <limit> : sets the default per-proxy maxconn to <limit> instead of the
164 builtin default value (usually 2000). Only useful for debugging.
165
166 -V : enable verbose mode (disables quiet mode). Reverts the effect of "-q" or
167 "quiet".
168
169 -c : only performs a check of the configuration files and exits before trying
170 to bind. The exit status is zero if everything is OK, or non-zero if an
171 error is encountered.
172
173 -d : enable debug mode. This disables daemon mode, forces the process to stay
174 in foreground and to show incoming and outgoing events. It is equivalent to
175 the "global" section's "debug" keyword. It must never be used in an init
176 script.
177
178 -dG : disable use of getaddrinfo() to resolve host names into addresses. It
179 can be used when suspecting that getaddrinfo() doesn't work as expected.
180 This option was made available because many bogus implementations of
181 getaddrinfo() exist on various systems and cause anomalies that are
182 difficult to troubleshoot.
183
184 -dM[<byte>] : forces memory poisonning, which means that each and every
185 memory region allocated with malloc() or pool_alloc2() will be filled with
186 <byte> before being passed to the caller. When <byte> is not specified, it
187 defaults to 0x50 ('P'). While this slightly slows down operations, it is
188 useful to reliably trigger issues resulting from missing initializations in
189 the code that cause random crashes. Note that -dM0 has the effect of
190 turning any malloc() into a calloc(). In any case if a bug appears or
191 disappears when using this option it means there is a bug in haproxy, so
192 please report it.
193
194 -dS : disable use of the splice() system call. It is equivalent to the
195 "global" section's "nosplice" keyword. This may be used when splice() is
196 suspected to behave improperly or to cause performance issues, or when
197 using strace to see the forwarded data (which do not appear when using
198 splice()).
199
200 -dV : disable SSL verify on the server side. It is equivalent to having
201 "ssl-server-verify none" in the "global" section. This is useful when
202 trying to reproduce production issues out of the production
203 environment. Never use this in an init script as it degrades SSL security
204 to the servers.
205
206 -db : disable background mode and multi-process mode. The process remains in
207 foreground. It is mainly used during development or during small tests, as
208 Ctrl-C is enough to stop the process. Never use it in an init script.
209
210 -de : disable the use of the "epoll" poller. It is equivalent to the "global"
211 section's keyword "noepoll". It is mostly useful when suspecting a bug
212 related to this poller. On systems supporting epoll, the fallback will
213 generally be the "poll" poller.
214
215 -dk : disable the use of the "kqueue" poller. It is equivalent to the
216 "global" section's keyword "nokqueue". It is mostly useful when suspecting
217 a bug related to this poller. On systems supporting kqueue, the fallback
218 will generally be the "poll" poller.
219
220 -dp : disable the use of the "poll" poller. It is equivalent to the "global"
221 section's keyword "nopoll". It is mostly useful when suspecting a bug
222 related to this poller. On systems supporting poll, the fallback will
223 generally be the "select" poller, which cannot be disabled and is limited
224 to 1024 file descriptors.
225
Willy Tarreau70060452015-12-14 12:46:07 +0100226 -m <limit> : limit the total allocatable memory to <limit> megabytes across
227 all processes. This may cause some connection refusals or some slowdowns
Willy Tarreau2212e6a2015-10-13 14:40:55 +0200228 depending on the amount of memory needed for normal operations. This is
Willy Tarreau70060452015-12-14 12:46:07 +0100229 mostly used to force the processes to work in a constrained resource usage
230 scenario. It is important to note that the memory is not shared between
231 processes, so in a multi-process scenario, this value is first divided by
232 global.nbproc before forking.
Willy Tarreau2212e6a2015-10-13 14:40:55 +0200233
234 -n <limit> : limits the per-process connection limit to <limit>. This is
235 equivalent to the global section's keyword "maxconn". It has precedence
236 over this keyword. This may be used to quickly force lower limits to avoid
237 a service outage on systems where resource limits are too low.
238
239 -p <file> : write all processes' pids into <file> during startup. This is
240 equivalent to the "global" section's keyword "pidfile". The file is opened
241 before entering the chroot jail, and after doing the chdir() implied by
242 "-C". Each pid appears on its own line.
243
244 -q : set "quiet" mode. This disables some messages during the configuration
245 parsing and during startup. It can be used in combination with "-c" to
246 just check if a configuration file is valid or not.
247
248 -sf <pid>* : send the "finish" signal (SIGUSR1) to older processes after boot
249 completion to ask them to finish what they are doing and to leave. <pid>
250 is a list of pids to signal (one per argument). The list ends on any
251 option starting with a "-". It is not a problem if the list of pids is
252 empty, so that it can be built on the fly based on the result of a command
253 like "pidof" or "pgrep".
254
255 -st <pid>* : send the "terminate" signal (SIGTERM) to older processes after
256 boot completion to terminate them immediately without finishing what they
257 were doing. <pid> is a list of pids to signal (one per argument). The list
258 is ends on any option starting with a "-". It is not a problem if the list
259 of pids is empty, so that it can be built on the fly based on the result of
260 a command like "pidof" or "pgrep".
261
262 -v : report the version and build date.
263
264 -vv : display the version, build options, libraries versions and usable
265 pollers. This output is systematically requested when filing a bug report.
266
267A safe way to start HAProxy from an init file consists in forcing the deamon
268mode, storing existing pids to a pid file and using this pid file to notify
269older processes to finish before leaving :
270
271 haproxy -f /etc/haproxy.cfg \
272 -D -p /var/run/haproxy.pid -sf $(cat /var/run/haproxy.pid)
273
274When the configuration is split into a few specific files (eg: tcp vs http),
275it is recommended to use the "-f" option :
276
277 haproxy -f /etc/haproxy/global.cfg -f /etc/haproxy/stats.cfg \
278 -f /etc/haproxy/default-tcp.cfg -f /etc/haproxy/tcp.cfg \
279 -f /etc/haproxy/default-http.cfg -f /etc/haproxy/http.cfg \
280 -D -p /var/run/haproxy.pid -sf $(cat /var/run/haproxy.pid)
281
282When an unknown number of files is expected, such as customer-specific files,
283it is recommended to assign them a name starting with a fixed-size sequence
284number and to use "--" to load them, possibly after loading some defaults :
285
286 haproxy -f /etc/haproxy/global.cfg -f /etc/haproxy/stats.cfg \
287 -f /etc/haproxy/default-tcp.cfg -f /etc/haproxy/tcp.cfg \
288 -f /etc/haproxy/default-http.cfg -f /etc/haproxy/http.cfg \
289 -D -p /var/run/haproxy.pid -sf $(cat /var/run/haproxy.pid) \
290 -f /etc/haproxy/default-customers.cfg -- /etc/haproxy/customers/*
291
292Sometimes a failure to start may happen for whatever reason. Then it is
293important to verify if the version of HAProxy you are invoking is the expected
294version and if it supports the features you are expecting (eg: SSL, PCRE,
295compression, Lua, etc). This can be verified using "haproxy -vv". Some
296important information such as certain build options, the target system and
297the versions of the libraries being used are reported there. It is also what
298you will systematically be asked for when posting a bug report :
299
300 $ haproxy -vv
301 HA-Proxy version 1.6-dev7-a088d3-4 2015/10/08
302 Copyright 2000-2015 Willy Tarreau <willy@haproxy.org>
303
304 Build options :
305 TARGET = linux2628
306 CPU = generic
307 CC = gcc
308 CFLAGS = -pg -O0 -g -fno-strict-aliasing -Wdeclaration-after-statement \
309 -DBUFSIZE=8030 -DMAXREWRITE=1030 -DSO_MARK=36 -DTCP_REPAIR=19
310 OPTIONS = USE_ZLIB=1 USE_DLMALLOC=1 USE_OPENSSL=1 USE_LUA=1 USE_PCRE=1
311
312 Default settings :
313 maxconn = 2000, bufsize = 8030, maxrewrite = 1030, maxpollevents = 200
314
315 Encrypted password support via crypt(3): yes
316 Built with zlib version : 1.2.6
317 Compression algorithms supported : identity("identity"), deflate("deflate"), \
318 raw-deflate("deflate"), gzip("gzip")
319 Built with OpenSSL version : OpenSSL 1.0.1o 12 Jun 2015
320 Running on OpenSSL version : OpenSSL 1.0.1o 12 Jun 2015
321 OpenSSL library supports TLS extensions : yes
322 OpenSSL library supports SNI : yes
323 OpenSSL library supports prefer-server-ciphers : yes
324 Built with PCRE version : 8.12 2011-01-15
325 PCRE library supports JIT : no (USE_PCRE_JIT not set)
326 Built with Lua version : Lua 5.3.1
327 Built with transparent proxy support using: IP_TRANSPARENT IP_FREEBIND
328
329 Available polling systems :
330 epoll : pref=300, test result OK
331 poll : pref=200, test result OK
332 select : pref=150, test result OK
333 Total: 3 (3 usable), will use epoll.
334
335The relevant information that many non-developer users can verify here are :
336 - the version : 1.6-dev7-a088d3-4 above means the code is currently at commit
337 ID "a088d3" which is the 4th one after after official version "1.6-dev7".
338 Version 1.6-dev7 would show as "1.6-dev7-8c1ad7". What matters here is in
339 fact "1.6-dev7". This is the 7th development version of what will become
340 version 1.6 in the future. A development version not suitable for use in
341 production (unless you know exactly what you are doing). A stable version
342 will show as a 3-numbers version, such as "1.5.14-16f863", indicating the
343 14th level of fix on top of version 1.5. This is a production-ready version.
344
345 - the release date : 2015/10/08. It is represented in the universal
346 year/month/day format. Here this means August 8th, 2015. Given that stable
347 releases are issued every few months (1-2 months at the beginning, sometimes
348 6 months once the product becomes very stable), if you're seeing an old date
349 here, it means you're probably affected by a number of bugs or security
350 issues that have since been fixed and that it might be worth checking on the
351 official site.
352
353 - build options : they are relevant to people who build their packages
354 themselves, they can explain why things are not behaving as expected. For
355 example the development version above was built for Linux 2.6.28 or later,
356 targetting a generic CPU (no CPU-specific optimizations), and lacks any
357 code optimization (-O0) so it will perform poorly in terms of performance.
358
359 - libraries versions : zlib version is reported as found in the library
360 itself. In general zlib is considered a very stable product and upgrades
361 are almost never needed. OpenSSL reports two versions, the version used at
362 build time and the one being used, as found on the system. These ones may
363 differ by the last letter but never by the numbers. The build date is also
364 reported because most OpenSSL bugs are security issues and need to be taken
365 seriously, so this library absolutely needs to be kept up to date. Seeing a
366 4-months old version here is highly suspicious and indeed an update was
367 missed. PCRE provides very fast regular expressions and is highly
368 recommended. Certain of its extensions such as JIT are not present in all
369 versions and still young so some people prefer not to build with them,
370 which is why the biuld status is reported as well. Regarding the Lua
371 scripting language, HAProxy expects version 5.3 which is very young since
372 it was released a little time before HAProxy 1.6. It is important to check
373 on the Lua web site if some fixes are proposed for this branch.
374
375 - Available polling systems will affect the process's scalability when
376 dealing with more than about one thousand of concurrent connections. These
377 ones are only available when the correct system was indicated in the TARGET
378 variable during the build. The "epoll" mechanism is highly recommended on
379 Linux, and the kqueue mechanism is highly recommended on BSD. Lacking them
380 will result in poll() or even select() being used, causing a high CPU usage
381 when dealing with a lot of connections.
382
383
3844. Stopping and restarting HAProxy
385----------------------------------
386
387HAProxy supports a graceful and a hard stop. The hard stop is simple, when the
388SIGTERM signal is sent to the haproxy process, it immediately quits and all
389established connections are closed. The graceful stop is triggered when the
390SIGUSR1 signal is sent to the haproxy process. It consists in only unbinding
391from listening ports, but continue to process existing connections until they
392close. Once the last connection is closed, the process leaves.
393
394The hard stop method is used for the "stop" or "restart" actions of the service
395management script. The graceful stop is used for the "reload" action which
396tries to seamlessly reload a new configuration in a new process.
397
398Both of these signals may be sent by the new haproxy process itself during a
399reload or restart, so that they are sent at the latest possible moment and only
400if absolutely required. This is what is performed by the "-st" (hard) and "-sf"
401(graceful) options respectively.
402
403To understand better how these signals are used, it is important to understand
404the whole restart mechanism.
405
406First, an existing haproxy process is running. The administrator uses a system
407specific command such as "/etc/init.d/haproxy reload" to indicate he wants to
408take the new configuration file into effect. What happens then is the following.
409First, the service script (/etc/init.d/haproxy or equivalent) will verify that
410the configuration file parses correctly using "haproxy -c". After that it will
411try to start haproxy with this configuration file, using "-st" or "-sf".
412
413Then HAProxy tries to bind to all listening ports. If some fatal errors happen
414(eg: address not present on the system, permission denied), the process quits
415with an error. If a socket binding fails because a port is already in use, then
416the process will first send a SIGTTOU signal to all the pids specified in the
417"-st" or "-sf" pid list. This is what is called the "pause" signal. It instructs
418all existing haproxy processes to temporarily stop listening to their ports so
419that the new process can try to bind again. During this time, the old process
420continues to process existing connections. If the binding still fails (because
421for example a port is shared with another daemon), then the new process sends a
422SIGTTIN signal to the old processes to instruct them to resume operations just
423as if nothing happened. The old processes will then restart listening to the
424ports and continue to accept connections. Not that this mechanism is system
425dependant and some operating systems may not support it in multi-process mode.
426
427If the new process manages to bind correctly to all ports, then it sends either
428the SIGTERM (hard stop in case of "-st") or the SIGUSR1 (graceful stop in case
429of "-sf") to all processes to notify them that it is now in charge of operations
430and that the old processes will have to leave, either immediately or once they
431have finished their job.
432
433It is important to note that during this timeframe, there are two small windows
434of a few milliseconds each where it is possible that a few connection failures
435will be noticed during high loads. Typically observed failure rates are around
4361 failure during a reload operation every 10000 new connections per second,
437which means that a heavily loaded site running at 30000 new connections per
438second may see about 3 failed connection upon every reload. The two situations
439where this happens are :
440
441 - if the new process fails to bind due to the presence of the old process,
442 it will first have to go through the SIGTTOU+SIGTTIN sequence, which
443 typically lasts about one millisecond for a few tens of frontends, and
444 during which some ports will not be bound to the old process and not yet
445 bound to the new one. HAProxy works around this on systems that support the
446 SO_REUSEPORT socket options, as it allows the new process to bind without
447 first asking the old one to unbind. Most BSD systems have been supporting
448 this almost forever. Linux has been supporting this in version 2.0 and
449 dropped it around 2.2, but some patches were floating around by then. It
450 was reintroduced in kernel 3.9, so if you are observing a connection
451 failure rate above the one mentionned above, please ensure that your kernel
452 is 3.9 or newer, or that relevant patches were backported to your kernel
453 (less likely).
454
455 - when the old processes close the listening ports, the kernel may not always
456 redistribute any pending connection that was remaining in the socket's
457 backlog. Under high loads, a SYN packet may happen just before the socket
458 is closed, and will lead to an RST packet being sent to the client. In some
459 critical environments where even one drop is not acceptable, these ones are
460 sometimes dealt with using firewall rules to block SYN packets during the
461 reload, forcing the client to retransmit. This is totally system-dependent,
462 as some systems might be able to visit other listening queues and avoid
463 this RST. A second case concerns the ACK from the client on a local socket
464 that was in SYN_RECV state just before the close. This ACK will lead to an
465 RST packet while the haproxy process is still not aware of it. This one is
466 harder to get rid of, though the firewall filtering rules mentionned above
467 will work well if applied one second or so before restarting the process.
468
469For the vast majority of users, such drops will never ever happen since they
470don't have enough load to trigger the race conditions. And for most high traffic
471users, the failure rate is still fairly within the noise margin provided that at
472least SO_REUSEPORT is properly supported on their systems.
473
474
4755. File-descriptor limitations
476------------------------------
477
478In order to ensure that all incoming connections will successfully be served,
479HAProxy computes at load time the total number of file descriptors that will be
480needed during the process's life. A regular Unix process is generally granted
4811024 file descriptors by default, and a privileged process can raise this limit
482itself. This is one reason for starting HAProxy as root and letting it adjust
483the limit. The default limit of 1024 file descriptors roughly allow about 500
484concurrent connections to be processed. The computation is based on the global
485maxconn parameter which limits the total number of connections per process, the
486number of listeners, the number of servers which have a health check enabled,
487the agent checks, the peers, the loggers and possibly a few other technical
488requirements. A simple rough estimate of this number consists in simply
489doubling the maxconn value and adding a few tens to get the approximate number
490of file descriptors needed.
491
492Originally HAProxy did not know how to compute this value, and it was necessary
493to pass the value using the "ulimit-n" setting in the global section. This
494explains why even today a lot of configurations are seen with this setting
495present. Unfortunately it was often miscalculated resulting in connection
496failures when approaching maxconn instead of throttling incoming connection
497while waiting for the needed resources. For this reason it is important to
498remove any vestigal "ulimit-n" setting that can remain from very old versions.
499
500Raising the number of file descriptors to accept even moderate loads is
501mandatory but comes with some OS-specific adjustments. First, the select()
502polling system is limited to 1024 file descriptors. In fact on Linux it used
503to be capable of handling more but since certain OS ship with excessively
504restrictive SELinux policies forbidding the use of select() with more than
5051024 file descriptors, HAProxy now refuses to start in this case in order to
506avoid any issue at run time. On all supported operating systems, poll() is
507available and will not suffer from this limitation. It is automatically picked
508so there is nothing ot do to get a working configuration. But poll's becomes
509very slow when the number of file descriptors increases. While HAProxy does its
510best to limit this performance impact (eg: via the use of the internal file
511descriptor cache and batched processing), a good rule of thumb is that using
512poll() with more than a thousand concurrent connections will use a lot of CPU.
513
514For Linux systems base on kernels 2.6 and above, the epoll() system call will
515be used. It's a much more scalable mechanism relying on callbacks in the kernel
516that guarantee a constant wake up time regardless of the number of registered
517monitored file descriptors. It is automatically used where detected, provided
518that HAProxy had been built for one of the Linux flavors. Its presence and
519support can be verified using "haproxy -vv".
520
521For BSD systems which support it, kqueue() is available as an alternative. It
522is much faster than poll() and even slightly faster than epoll() thanks to its
523batched handling of changes. At least FreeBSD and OpenBSD support it. Just like
524with Linux's epoll(), its support and availability are reported in the output
525of "haproxy -vv".
526
527Having a good poller is one thing, but it is mandatory that the process can
528reach the limits. When HAProxy starts, it immediately sets the new process's
529file descriptor limits and verifies if it succeeds. In case of failure, it
530reports it before forking so that the administrator can see the problem. As
531long as the process is started by as root, there should be no reason for this
532setting to fail. However, it can fail if the process is started by an
533unprivileged user. If there is a compelling reason for *not* starting haproxy
534as root (eg: started by end users, or by a per-application account), then the
535file descriptor limit can be raised by the system administrator for this
536specific user. The effectiveness of the setting can be verified by issuing
537"ulimit -n" from the user's command line. It should reflect the new limit.
538
539Warning: when an unprivileged user's limits are changed in this user's account,
540it is fairly common that these values are only considered when the user logs in
541and not at all in some scripts run at system boot time nor in crontabs. This is
542totally dependent on the operating system, keep in mind to check "ulimit -n"
543before starting haproxy when running this way. The general advice is never to
544start haproxy as an unprivileged user for production purposes. Another good
545reason is that it prevents haproxy from enabling some security protections.
546
547Once it is certain that the system will allow the haproxy process to use the
548requested number of file descriptors, two new system-specific limits may be
549encountered. The first one is the system-wide file descriptor limit, which is
550the total number of file descriptors opened on the system, covering all
551processes. When this limit is reached, accept() or socket() will typically
552return ENFILE. The second one is the per-process hard limit on the number of
553file descriptors, it prevents setrlimit() from being set higher. Both are very
554dependent on the operating system. On Linux, the system limit is set at boot
555based on the amount of memory. It can be changed with the "fs.file-max" sysctl.
556And the per-process hard limit is set to 1048576 by default, but it can be
557changed using the "fs.nr_open" sysctl.
558
559File descriptor limitations may be observed on a running process when they are
560set too low. The strace utility will report that accept() and socket() return
561"-1 EMFILE" when the process's limits have been reached. In this case, simply
562raising the "ulimit-n" value (or removing it) will solve the problem. If these
563system calls return "-1 ENFILE" then it means that the kernel's limits have
564been reached and that something must be done on a system-wide parameter. These
565trouble must absolutely be addressed, as they result in high CPU usage (when
566accept() fails) and failed connections that are generally visible to the user.
567One solution also consists in lowering the global maxconn value to enforce
568serialization, and possibly to disable HTTP keep-alive to force connections
569to be released and reused faster.
570
571
5726. Memory management
573--------------------
574
575HAProxy uses a simple and fast pool-based memory management. Since it relies on
576a small number of different object types, it's much more efficient to pick new
577objects from a pool which already contains objects of the appropriate size than
578to call malloc() for each different size. The pools are organized as a stack or
579LIFO, so that newly allocated objects are taken from recently released objects
580still hot in the CPU caches. Pools of similar sizes are merged together, in
581order to limit memory fragmentation.
582
583By default, since the focus is set on performance, each released object is put
584back into the pool it came from, and allocated objects are never freed since
585they are expected to be reused very soon.
586
587On the CLI, it is possible to check how memory is being used in pools thanks to
588the "show pools" command :
589
590 > show pools
591 Dumping pools usage. Use SIGQUIT to flush them.
592 - Pool pipe (32 bytes) : 5 allocated (160 bytes), 5 used, 3 users [SHARED]
593 - Pool hlua_com (48 bytes) : 0 allocated (0 bytes), 0 used, 1 users [SHARED]
594 - Pool vars (64 bytes) : 0 allocated (0 bytes), 0 used, 2 users [SHARED]
595 - Pool task (112 bytes) : 5 allocated (560 bytes), 5 used, 1 users [SHARED]
596 - Pool session (128 bytes) : 1 allocated (128 bytes), 1 used, 2 users [SHARED]
597 - Pool http_txn (272 bytes) : 0 allocated (0 bytes), 0 used, 1 users [SHARED]
598 - Pool connection (352 bytes) : 2 allocated (704 bytes), 2 used, 1 users [SHARED]
599 - Pool hdr_idx (416 bytes) : 0 allocated (0 bytes), 0 used, 1 users [SHARED]
600 - Pool stream (864 bytes) : 1 allocated (864 bytes), 1 used, 1 users [SHARED]
601 - Pool requri (1024 bytes) : 0 allocated (0 bytes), 0 used, 1 users [SHARED]
602 - Pool buffer (8064 bytes) : 3 allocated (24192 bytes), 2 used, 1 users [SHARED]
603 Total: 11 pools, 26608 bytes allocated, 18544 used.
604
605The pool name is only indicative, it's the name of the first object type using
606this pool. The size in parenthesis is the object size for objects in this pool.
607Object sizes are always rounded up to the closest multiple of 16 bytes. The
608number of objects currently allocated and the equivalent number of bytes is
609reported so that it is easy to know which pool is responsible for the highest
610memory usage. The number of objects currently in use is reported as well in the
611"used" field. The difference between "allocated" and "used" corresponds to the
612objects that have been freed and are available for immediate use.
613
614It is possible to limit the amount of memory allocated per process using the
615"-m" command line option, followed by a number of megabytes. It covers all of
616the process's addressable space, so that includes memory used by some libraries
617as well as the stack, but it is a reliable limit when building a resource
618constrained system. It works the same way as "ulimit -v" on systems which have
619it, or "ulimit -d" for the other ones.
620
621If a memory allocation fails due to the memory limit being reached or because
622the system doesn't have any enough memory, then haproxy will first start to
623free all available objects from all pools before attempting to allocate memory
624again. This mechanism of releasing unused memory can be triggered by sending
625the signal SIGQUIT to the haproxy process. When doing so, the pools state prior
626to the flush will also be reported to stderr when the process runs in
627foreground.
628
629During a reload operation, the process switched to the graceful stop state also
630automatically performs some flushes after releasing any connection so that all
631possible memory is released to save it for the new process.
632
633
6347. CPU usage
635------------
636
637HAProxy normally spends most of its time in the system and a smaller part in
638userland. A finely tuned 3.5 GHz CPU can sustain a rate about 80000 end-to-end
639connection setups and closes per second at 100% CPU on a single core. When one
640core is saturated, typical figures are :
641 - 95% system, 5% user for long TCP connections or large HTTP objects
642 - 85% system and 15% user for short TCP connections or small HTTP objects in
643 close mode
644 - 70% system and 30% user for small HTTP objects in keep-alive mode
645
646The amount of rules processing and regular expressions will increase the user
647land part. The presence of firewall rules, connection tracking, complex routing
648tables in the system will instead increase the system part.
649
650On most systems, the CPU time observed during network transfers can be cut in 4
651parts :
652 - the interrupt part, which concerns all the processing performed upon I/O
653 receipt, before the target process is even known. Typically Rx packets are
654 accounted for in interrupt. On some systems such as Linux where interrupt
655 processing may be deferred to a dedicated thread, it can appear as softirq,
656 and the thread is called ksoftirqd/0 (for CPU 0). The CPU taking care of
657 this load is generally defined by the hardware settings, though in the case
658 of softirq it is often possible to remap the processing to another CPU.
659 This interrupt part will often be perceived as parasitic since it's not
660 associated with any process, but it actually is some processing being done
661 to prepare the work for the process.
662
663 - the system part, which concerns all the processing done using kernel code
664 called from userland. System calls are accounted as system for example. All
665 synchronously delivered Tx packets will be accounted for as system time. If
666 some packets have to be deferred due to queues filling up, they may then be
667 processed in interrupt context later (eg: upon receipt of an ACK opening a
668 TCP window).
669
670 - the user part, which exclusively runs application code in userland. HAProxy
671 runs exclusively in this part, though it makes heavy use of system calls.
672 Rules processing, regular expressions, compression, encryption all add to
673 the user portion of CPU consumption.
674
675 - the idle part, which is what the CPU does when there is nothing to do. For
676 example HAProxy waits for an incoming connection, or waits for some data to
677 leave, meaning the system is waiting for an ACK from the client to push
678 these data.
679
680In practice regarding HAProxy's activity, it is in general reasonably accurate
681(but totally inexact) to consider that interrupt/softirq are caused by Rx
682processing in kernel drivers, that user-land is caused by layer 7 processing
683in HAProxy, and that system time is caused by network processing on the Tx
684path.
685
686Since HAProxy runs around an event loop, it waits for new events using poll()
687(or any alternative) and processes all these events as fast as possible before
688going back to poll() waiting for new events. It measures the time spent waiting
689in poll() compared to the time spent doing processing events. The ratio of
690polling time vs total time is called the "idle" time, it's the amount of time
691spent waiting for something to happen. This ratio is reported in the stats page
692on the "idle" line, or "Idle_pct" on the CLI. When it's close to 100%, it means
693the load is extremely low. When it's close to 0%, it means that there is
694constantly some activity. While it cannot be very accurate on an overloaded
695system due to other processes possibly preempting the CPU from the haproxy
696process, it still provides a good estimate about how HAProxy considers it is
697working : if the load is low and the idle ratio is low as well, it may indicate
698that HAProxy has a lot of work to do, possibly due to very expensive rules that
699have to be processed. Conversely, if HAProxy indicates the idle is close to
700100% while things are slow, it means that it cannot do anything to speed things
701up because it is already waiting for incoming data to process. In the example
702below, haproxy is completely idle :
703
704 $ echo "show info" | socat - /var/run/haproxy.sock | grep ^Idle
705 Idle_pct: 100
706
707When the idle ratio starts to become very low, it is important to tune the
708system and place processes and interrupts correctly to save the most possible
709CPU resources for all tasks. If a firewall is present, it may be worth trying
710to disable it or to tune it to ensure it is not responsible for a large part
711of the performance limitation. It's worth noting that unloading a stateful
712firewall generally reduces both the amount of interrupt/softirq and of system
713usage since such firewalls act both on the Rx and the Tx paths. On Linux,
714unloading the nf_conntrack and ip_conntrack modules will show whether there is
715anything to gain. If so, then the module runs with default settings and you'll
716have to figure how to tune it for better performance. In general this consists
717in considerably increasing the hash table size. On FreeBSD, "pfctl -d" will
718disable the "pf" firewall and its stateful engine at the same time.
719
720If it is observed that a lot of time is spent in interrupt/softirq, it is
721important to ensure that they don't run on the same CPU. Most systems tend to
722pin the tasks on the CPU where they receive the network traffic because for
723certain workloads it improves things. But with heavily network-bound workloads
724it is the opposite as the haproxy process will have to fight against its kernel
725counterpart. Pinning haproxy to one CPU core and the interrupts to another one,
726all sharing the same L3 cache tends to sensibly increase network performance
727because in practice the amount of work for haproxy and the network stack are
728quite close, so they can almost fill an entire CPU each. On Linux this is done
729using taskset (for haproxy) or using cpu-map (from the haproxy config), and the
730interrupts are assigned under /proc/irq. Many network interfaces support
731multiple queues and multiple interrupts. In general it helps to spread them
732across a small number of CPU cores provided they all share the same L3 cache.
733Please always stop irq_balance which always does the worst possible thing on
734such workloads.
735
736For CPU-bound workloads consisting in a lot of SSL traffic or a lot of
737compression, it may be worth using multiple processes dedicated to certain
738tasks, though there is no universal rule here and experimentation will have to
739be performed.
740
741In order to increase the CPU capacity, it is possible to make HAProxy run as
742several processes, using the "nbproc" directive in the global section. There
743are some limitations though :
744 - health checks are run per process, so the target servers will get as many
745 checks as there are running processes ;
746 - maxconn values and queues are per-process so the correct value must be set
747 to avoid overloading the servers ;
748 - outgoing connections should avoid using port ranges to avoid conflicts
749 - stick-tables are per process and are not shared between processes ;
750 - each peers section may only run on a single process at a time ;
751 - the CLI operations will only act on a single process at a time.
752
753With this in mind, it appears that the easiest setup often consists in having
754one first layer running on multiple processes and in charge for the heavy
755processing, passing the traffic to a second layer running in a single process.
756This mechanism is suited to SSL and compression which are the two CPU-heavy
757features. Instances can easily be chained over UNIX sockets (which are cheaper
fengpeiyuancc123c62016-01-15 16:40:53 +0800758than TCP sockets and which do not waste ports), and the proxy protocol which is
Willy Tarreau2212e6a2015-10-13 14:40:55 +0200759useful to pass client information to the next stage. When doing so, it is
760generally a good idea to bind all the single-process tasks to process number 1
761and extra tasks to next processes, as this will make it easier to generate
762similar configurations for different machines.
763
764On Linux versions 3.9 and above, running HAProxy in multi-process mode is much
765more efficient when each process uses a distinct listening socket on the same
766IP:port ; this will make the kernel evenly distribute the load across all
767processes instead of waking them all up. Please check the "process" option of
768the "bind" keyword lines in the configuration manual for more information.
769
770
7718. Logging
772----------
773
774For logging, HAProxy always relies on a syslog server since it does not perform
775any file-system access. The standard way of using it is to send logs over UDP
776to the log server (by default on port 514). Very commonly this is configured to
777127.0.0.1 where the local syslog daemon is running, but it's also used over the
778network to log to a central server. The central server provides additional
779benefits especially in active-active scenarios where it is desirable to keep
780the logs merged in arrival order. HAProxy may also make use of a UNIX socket to
781send its logs to the local syslog daemon, but it is not recommended at all,
782because if the syslog server is restarted while haproxy runs, the socket will
783be replaced and new logs will be lost. Since HAProxy will be isolated inside a
784chroot jail, it will not have the ability to reconnect to the new socket. It
785has also been observed in field that the log buffers in use on UNIX sockets are
786very small and lead to lost messages even at very light loads. But this can be
787fine for testing however.
788
789It is recommended to add the following directive to the "global" section to
790make HAProxy log to the local daemon using facility "local0" :
791
792 log 127.0.0.1:514 local0
793
794and then to add the following one to each "defaults" section or to each frontend
795and backend section :
796
797 log global
798
799This way, all logs will be centralized through the global definition of where
800the log server is.
801
802Some syslog daemons do not listen to UDP traffic by default, so depending on
803the daemon being used, the syntax to enable this will vary :
804
805 - on sysklogd, you need to pass argument "-r" on the daemon's command line
806 so that it listens to a UDP socket for "remote" logs ; note that there is
807 no way to limit it to address 127.0.0.1 so it will also receive logs from
808 remote systems ;
809
810 - on rsyslogd, the following lines must be added to the configuration file :
811
812 $ModLoad imudp
813 $UDPServerAddress *
814 $UDPServerRun 514
815
816 - on syslog-ng, a new source can be created the following way, it then needs
817 to be added as a valid source in one of the "log" directives :
818
819 source s_udp {
820 udp(ip(127.0.0.1) port(514));
821 };
822
823Please consult your syslog daemon's manual for more information. If no logs are
824seen in the system's log files, please consider the following tests :
825
826 - restart haproxy. Each frontend and backend logs one line indicating it's
827 starting. If these logs are received, it means logs are working.
828
829 - run "strace -tt -s100 -etrace=sendmsg -p <haproxy's pid>" and perform some
830 activity that you expect to be logged. You should see the log messages
831 being sent using sendmsg() there. If they don't appear, restart using
832 strace on top of haproxy. If you still see no logs, it definitely means
833 that something is wrong in your configuration.
834
835 - run tcpdump to watch for port 514, for example on the loopback interface if
836 the traffic is being sent locally : "tcpdump -As0 -ni lo port 514". If the
837 packets are seen there, it's the proof they're sent then the syslogd daemon
838 needs to be troubleshooted.
839
840While traffic logs are sent from the frontends (where the incoming connections
841are accepted), backends also need to be able to send logs in order to report a
842server state change consecutive to a health check. Please consult HAProxy's
843configuration manual for more information regarding all possible log settings.
844
845It is convenient to chose a facility that is not used by other deamons. HAProxy
846examples often suggest "local0" for traffic logs and "local1" for admin logs
847because they're never seen in field. A single facility would be enough as well.
848Having separate logs is convenient for log analysis, but it's also important to
849remember that logs may sometimes convey confidential information, and as such
850they must not be mixed with other logs that may accidently be handed out to
851unauthorized people.
852
853For in-field troubleshooting without impacting the server's capacity too much,
854it is recommended to make use of the "halog" utility provided with HAProxy.
855This is sort of a grep-like utility designed to process HAProxy log files at
856a very fast data rate. Typical figures range between 1 and 2 GB of logs per
857second. It is capable of extracting only certain logs (eg: search for some
858classes of HTTP status codes, connection termination status, search by response
859time ranges, look for errors only), count lines, limit the output to a number
860of lines, and perform some more advanced statistics such as sorting servers
861by response time or error counts, sorting URLs by time or count, sorting client
862addresses by access count, and so on. It is pretty convenient to quickly spot
863anomalies such as a bot looping on the site, and block them.
864
865
8669. Statistics and monitoring
867----------------------------
868
Willy Tarreau44aed902015-10-13 14:45:29 +0200869It is possible to query HAProxy about its status. The most commonly used
870mechanism is the HTTP statistics page. This page also exposes an alternative
871CSV output format for monitoring tools. The same format is provided on the
872Unix socket.
873
874
8759.1. CSV format
876---------------
877
878The statistics may be consulted either from the unix socket or from the HTTP
879page. Both means provide a CSV format whose fields follow. The first line
880begins with a sharp ('#') and has one word per comma-delimited field which
881represents the title of the column. All other lines starting at the second one
882use a classical CSV format using a comma as the delimiter, and the double quote
883('"') as an optional text delimiter, but only if the enclosed text is ambiguous
884(if it contains a quote or a comma). The double-quote character ('"') in the
885text is doubled ('""'), which is the format that most tools recognize. Please
886do not insert any column before these ones in order not to break tools which
887use hard-coded column positions.
888
889In brackets after each field name are the types which may have a value for
890that field. The types are L (Listeners), F (Frontends), B (Backends), and
891S (Servers).
892
893 0. pxname [LFBS]: proxy name
894 1. svname [LFBS]: service name (FRONTEND for frontend, BACKEND for backend,
895 any name for server/listener)
896 2. qcur [..BS]: current queued requests. For the backend this reports the
897 number queued without a server assigned.
898 3. qmax [..BS]: max value of qcur
899 4. scur [LFBS]: current sessions
900 5. smax [LFBS]: max sessions
901 6. slim [LFBS]: configured session limit
902 7. stot [LFBS]: cumulative number of connections
903 8. bin [LFBS]: bytes in
904 9. bout [LFBS]: bytes out
905 10. dreq [LFB.]: requests denied because of security concerns.
906 - For tcp this is because of a matched tcp-request content rule.
907 - For http this is because of a matched http-request or tarpit rule.
908 11. dresp [LFBS]: responses denied because of security concerns.
909 - For http this is because of a matched http-request rule, or
910 "option checkcache".
911 12. ereq [LF..]: request errors. Some of the possible causes are:
912 - early termination from the client, before the request has been sent.
913 - read error from the client
914 - client timeout
915 - client closed connection
916 - various bad requests from the client.
917 - request was tarpitted.
918 13. econ [..BS]: number of requests that encountered an error trying to
919 connect to a backend server. The backend stat is the sum of the stat
920 for all servers of that backend, plus any connection errors not
921 associated with a particular server (such as the backend having no
922 active servers).
923 14. eresp [..BS]: response errors. srv_abrt will be counted here also.
924 Some other errors are:
925 - write error on the client socket (won't be counted for the server stat)
926 - failure applying filters to the response.
927 15. wretr [..BS]: number of times a connection to a server was retried.
928 16. wredis [..BS]: number of times a request was redispatched to another
929 server. The server value counts the number of times that server was
930 switched away from.
931 17. status [LFBS]: status (UP/DOWN/NOLB/MAINT/MAINT(via)...)
932 18. weight [..BS]: total weight (backend), server weight (server)
933 19. act [..BS]: number of active servers (backend), server is active (server)
934 20. bck [..BS]: number of backup servers (backend), server is backup (server)
935 21. chkfail [...S]: number of failed checks. (Only counts checks failed when
936 the server is up.)
937 22. chkdown [..BS]: number of UP->DOWN transitions. The backend counter counts
938 transitions to the whole backend being down, rather than the sum of the
939 counters for each server.
940 23. lastchg [..BS]: number of seconds since the last UP<->DOWN transition
941 24. downtime [..BS]: total downtime (in seconds). The value for the backend
942 is the downtime for the whole backend, not the sum of the server downtime.
943 25. qlimit [...S]: configured maxqueue for the server, or nothing in the
944 value is 0 (default, meaning no limit)
945 26. pid [LFBS]: process id (0 for first instance, 1 for second, ...)
946 27. iid [LFBS]: unique proxy id
947 28. sid [L..S]: server id (unique inside a proxy)
948 29. throttle [...S]: current throttle percentage for the server, when
949 slowstart is active, or no value if not in slowstart.
950 30. lbtot [..BS]: total number of times a server was selected, either for new
951 sessions, or when re-dispatching. The server counter is the number
952 of times that server was selected.
953 31. tracked [...S]: id of proxy/server if tracking is enabled.
954 32. type [LFBS]: (0=frontend, 1=backend, 2=server, 3=socket/listener)
955 33. rate [.FBS]: number of sessions per second over last elapsed second
956 34. rate_lim [.F..]: configured limit on new sessions per second
957 35. rate_max [.FBS]: max number of new sessions per second
958 36. check_status [...S]: status of last health check, one of:
959 UNK -> unknown
960 INI -> initializing
961 SOCKERR -> socket error
962 L4OK -> check passed on layer 4, no upper layers testing enabled
963 L4TOUT -> layer 1-4 timeout
964 L4CON -> layer 1-4 connection problem, for example
965 "Connection refused" (tcp rst) or "No route to host" (icmp)
966 L6OK -> check passed on layer 6
967 L6TOUT -> layer 6 (SSL) timeout
968 L6RSP -> layer 6 invalid response - protocol error
969 L7OK -> check passed on layer 7
970 L7OKC -> check conditionally passed on layer 7, for example 404 with
971 disable-on-404
972 L7TOUT -> layer 7 (HTTP/SMTP) timeout
973 L7RSP -> layer 7 invalid response - protocol error
974 L7STS -> layer 7 response error, for example HTTP 5xx
975 37. check_code [...S]: layer5-7 code, if available
976 38. check_duration [...S]: time in ms took to finish last health check
977 39. hrsp_1xx [.FBS]: http responses with 1xx code
978 40. hrsp_2xx [.FBS]: http responses with 2xx code
979 41. hrsp_3xx [.FBS]: http responses with 3xx code
980 42. hrsp_4xx [.FBS]: http responses with 4xx code
981 43. hrsp_5xx [.FBS]: http responses with 5xx code
982 44. hrsp_other [.FBS]: http responses with other codes (protocol error)
983 45. hanafail [...S]: failed health checks details
984 46. req_rate [.F..]: HTTP requests per second over last elapsed second
985 47. req_rate_max [.F..]: max number of HTTP requests per second observed
986 48. req_tot [.F..]: total number of HTTP requests received
987 49. cli_abrt [..BS]: number of data transfers aborted by the client
988 50. srv_abrt [..BS]: number of data transfers aborted by the server
989 (inc. in eresp)
990 51. comp_in [.FB.]: number of HTTP response bytes fed to the compressor
991 52. comp_out [.FB.]: number of HTTP response bytes emitted by the compressor
992 53. comp_byp [.FB.]: number of bytes that bypassed the HTTP compressor
993 (CPU/BW limit)
994 54. comp_rsp [.FB.]: number of HTTP responses that were compressed
995 55. lastsess [..BS]: number of seconds since last session assigned to
996 server/backend
997 56. last_chk [...S]: last health check contents or textual error
998 57. last_agt [...S]: last agent check contents or textual error
999 58. qtime [..BS]: the average queue time in ms over the 1024 last requests
1000 59. ctime [..BS]: the average connect time in ms over the 1024 last requests
1001 60. rtime [..BS]: the average response time in ms over the 1024 last requests
1002 (0 for TCP)
1003 61. ttime [..BS]: the average total session time in ms over the 1024 last
1004 requests
Willy Tarreau7f618842016-01-08 11:40:03 +01001005 62. agent_status [...S]: status of last agent check, one of:
1006 UNK -> unknown
1007 INI -> initializing
1008 SOCKERR -> socket error
1009 L4OK -> check passed on layer 4, no upper layers testing enabled
1010 L4TOUT -> layer 1-4 timeout
1011 L4CON -> layer 1-4 connection problem, for example
1012 "Connection refused" (tcp rst) or "No route to host" (icmp)
1013 L7OK -> agent reported "up"
1014 L7STS -> agent reported "fail", "stop", or "down"
1015 63. agent_code [...S]: numeric code reported by agent if any (unused for now)
1016 64. agent_duration [...S]: time in ms taken to finish last check
Willy Tarreaudd7354b2016-01-08 13:47:26 +01001017 65. check_desc [...S]: short human-readable description of check_status
1018 66. agent_desc [...S]: short human-readable description of agent_status
Willy Tarreau3141f592016-01-08 14:25:28 +01001019 67. check_rise [...S]: server's "rise" parameter used by checks
1020 68. check_fall [...S]: server's "fall" parameter used by checks
1021 69. check_health [...S]: server's health check value between 0 and rise+fall-1
1022 70. agent_rise [...S]: agent's "rise" parameter, normally 1
1023 71. agent_fall [...S]: agent's "fall" parameter, normally 1
1024 72. agent_health [...S]: agent's health parameter, between 0 and rise+fall-1
Willy Tarreaua6f5a732016-01-08 16:59:56 +01001025 73. addr [L..S]: address:port or "unix". IPv6 has brackets around the address.
Willy Tarreaue4847c62016-01-08 15:43:54 +01001026 74: cookie [..BS]: server's cookie value or backend's cookie name
Willy Tarreau44aed902015-10-13 14:45:29 +02001027
1028
10299.2. Unix Socket commands
1030-------------------------
1031
1032The stats socket is not enabled by default. In order to enable it, it is
1033necessary to add one line in the global section of the haproxy configuration.
1034A second line is recommended to set a larger timeout, always appreciated when
1035issuing commands by hand :
1036
1037 global
1038 stats socket /var/run/haproxy.sock mode 600 level admin
1039 stats timeout 2m
1040
1041It is also possible to add multiple instances of the stats socket by repeating
1042the line, and make them listen to a TCP port instead of a UNIX socket. This is
1043never done by default because this is dangerous, but can be handy in some
1044situations :
1045
1046 global
1047 stats socket /var/run/haproxy.sock mode 600 level admin
1048 stats socket ipv4@192.168.0.1:9999 level admin
1049 stats timeout 2m
1050
1051To access the socket, an external utility such as "socat" is required. Socat is
1052a swiss-army knife to connect anything to anything. We use it to connect
1053terminals to the socket, or a couple of stdin/stdout pipes to it for scripts.
1054The two main syntaxes we'll use are the following :
1055
1056 # socat /var/run/haproxy.sock stdio
1057 # socat /var/run/haproxy.sock readline
1058
1059The first one is used with scripts. It is possible to send the output of a
1060script to haproxy, and pass haproxy's output to another script. That's useful
1061for retrieving counters or attack traces for example.
1062
1063The second one is only useful for issuing commands by hand. It has the benefit
1064that the terminal is handled by the readline library which supports line
1065editing and history, which is very convenient when issuing repeated commands
1066(eg: watch a counter).
1067
1068The socket supports two operation modes :
1069 - interactive
1070 - non-interactive
1071
1072The non-interactive mode is the default when socat connects to the socket. In
1073this mode, a single line may be sent. It is processed as a whole, responses are
1074sent back, and the connection closes after the end of the response. This is the
1075mode that scripts and monitoring tools use. It is possible to send multiple
1076commands in this mode, they need to be delimited by a semi-colon (';'). For
1077example :
1078
1079 # echo "show info;show stat;show table" | socat /var/run/haproxy stdio
1080
1081The interactive mode displays a prompt ('>') and waits for commands to be
1082entered on the line, then processes them, and displays the prompt again to wait
1083for a new command. This mode is entered via the "prompt" command which must be
1084sent on the first line in non-interactive mode. The mode is a flip switch, if
1085"prompt" is sent in interactive mode, it is disabled and the connection closes
1086after processing the last command of the same line.
1087
1088For this reason, when debugging by hand, it's quite common to start with the
1089"prompt" command :
1090
1091 # socat /var/run/haproxy readline
1092 prompt
1093 > show info
1094 ...
1095 >
1096
1097Since multiple commands may be issued at once, haproxy uses the empty line as a
1098delimiter to mark an end of output for each command, and takes care of ensuring
1099that no command can emit an empty line on output. A script can thus easily
1100parse the output even when multiple commands were pipelined on a single line.
1101
1102It is important to understand that when multiple haproxy processes are started
1103on the same sockets, any process may pick up the request and will output its
1104own stats.
1105
1106The list of commands currently supported on the stats socket is provided below.
1107If an unknown command is sent, haproxy displays the usage message which reminds
1108all supported commands. Some commands support a more complex syntax, generally
1109it will explain what part of the command is invalid when this happens.
1110
1111add acl <acl> <pattern>
1112 Add an entry into the acl <acl>. <acl> is the #<id> or the <file> returned by
1113 "show acl". This command does not verify if the entry already exists. This
1114 command cannot be used if the reference <acl> is a file also used with a map.
1115 In this case, you must use the command "add map" in place of "add acl".
1116
1117add map <map> <key> <value>
1118 Add an entry into the map <map> to associate the value <value> to the key
1119 <key>. This command does not verify if the entry already exists. It is
1120 mainly used to fill a map after a clear operation. Note that if the reference
1121 <map> is a file and is shared with a map, this map will contain also a new
1122 pattern entry.
1123
1124clear counters
1125 Clear the max values of the statistics counters in each proxy (frontend &
1126 backend) and in each server. The cumulated counters are not affected. This
1127 can be used to get clean counters after an incident, without having to
1128 restart nor to clear traffic counters. This command is restricted and can
1129 only be issued on sockets configured for levels "operator" or "admin".
1130
1131clear counters all
1132 Clear all statistics counters in each proxy (frontend & backend) and in each
1133 server. This has the same effect as restarting. This command is restricted
1134 and can only be issued on sockets configured for level "admin".
1135
1136clear acl <acl>
1137 Remove all entries from the acl <acl>. <acl> is the #<id> or the <file>
1138 returned by "show acl". Note that if the reference <acl> is a file and is
1139 shared with a map, this map will be also cleared.
1140
1141clear map <map>
1142 Remove all entries from the map <map>. <map> is the #<id> or the <file>
1143 returned by "show map". Note that if the reference <map> is a file and is
1144 shared with a acl, this acl will be also cleared.
1145
1146clear table <table> [ data.<type> <operator> <value> ] | [ key <key> ]
1147 Remove entries from the stick-table <table>.
1148
1149 This is typically used to unblock some users complaining they have been
1150 abusively denied access to a service, but this can also be used to clear some
1151 stickiness entries matching a server that is going to be replaced (see "show
1152 table" below for details). Note that sometimes, removal of an entry will be
1153 refused because it is currently tracked by a session. Retrying a few seconds
1154 later after the session ends is usual enough.
1155
1156 In the case where no options arguments are given all entries will be removed.
1157
1158 When the "data." form is used entries matching a filter applied using the
1159 stored data (see "stick-table" in section 4.2) are removed. A stored data
1160 type must be specified in <type>, and this data type must be stored in the
1161 table otherwise an error is reported. The data is compared according to
1162 <operator> with the 64-bit integer <value>. Operators are the same as with
1163 the ACLs :
1164
1165 - eq : match entries whose data is equal to this value
1166 - ne : match entries whose data is not equal to this value
1167 - le : match entries whose data is less than or equal to this value
1168 - ge : match entries whose data is greater than or equal to this value
1169 - lt : match entries whose data is less than this value
1170 - gt : match entries whose data is greater than this value
1171
1172 When the key form is used the entry <key> is removed. The key must be of the
1173 same type as the table, which currently is limited to IPv4, IPv6, integer and
1174 string.
1175
1176 Example :
1177 $ echo "show table http_proxy" | socat stdio /tmp/sock1
1178 >>> # table: http_proxy, type: ip, size:204800, used:2
1179 >>> 0x80e6a4c: key=127.0.0.1 use=0 exp=3594729 gpc0=0 conn_rate(30000)=1 \
1180 bytes_out_rate(60000)=187
1181 >>> 0x80e6a80: key=127.0.0.2 use=0 exp=3594740 gpc0=1 conn_rate(30000)=10 \
1182 bytes_out_rate(60000)=191
1183
1184 $ echo "clear table http_proxy key 127.0.0.1" | socat stdio /tmp/sock1
1185
1186 $ echo "show table http_proxy" | socat stdio /tmp/sock1
1187 >>> # table: http_proxy, type: ip, size:204800, used:1
1188 >>> 0x80e6a80: key=127.0.0.2 use=0 exp=3594740 gpc0=1 conn_rate(30000)=10 \
1189 bytes_out_rate(60000)=191
1190 $ echo "clear table http_proxy data.gpc0 eq 1" | socat stdio /tmp/sock1
1191 $ echo "show table http_proxy" | socat stdio /tmp/sock1
1192 >>> # table: http_proxy, type: ip, size:204800, used:1
1193
1194del acl <acl> [<key>|#<ref>]
1195 Delete all the acl entries from the acl <acl> corresponding to the key <key>.
1196 <acl> is the #<id> or the <file> returned by "show acl". If the <ref> is used,
1197 this command delete only the listed reference. The reference can be found with
1198 listing the content of the acl. Note that if the reference <acl> is a file and
1199 is shared with a map, the entry will be also deleted in the map.
1200
1201del map <map> [<key>|#<ref>]
1202 Delete all the map entries from the map <map> corresponding to the key <key>.
1203 <map> is the #<id> or the <file> returned by "show map". If the <ref> is used,
1204 this command delete only the listed reference. The reference can be found with
1205 listing the content of the map. Note that if the reference <map> is a file and
1206 is shared with a acl, the entry will be also deleted in the map.
1207
1208disable agent <backend>/<server>
1209 Mark the auxiliary agent check as temporarily stopped.
1210
1211 In the case where an agent check is being run as a auxiliary check, due
1212 to the agent-check parameter of a server directive, new checks are only
1213 initialised when the agent is in the enabled. Thus, disable agent will
1214 prevent any new agent checks from begin initiated until the agent
1215 re-enabled using enable agent.
1216
1217 When an agent is disabled the processing of an auxiliary agent check that
1218 was initiated while the agent was set as enabled is as follows: All
1219 results that would alter the weight, specifically "drain" or a weight
1220 returned by the agent, are ignored. The processing of agent check is
1221 otherwise unchanged.
1222
1223 The motivation for this feature is to allow the weight changing effects
1224 of the agent checks to be paused to allow the weight of a server to be
1225 configured using set weight without being overridden by the agent.
1226
1227 This command is restricted and can only be issued on sockets configured for
1228 level "admin".
1229
1230disable frontend <frontend>
1231 Mark the frontend as temporarily stopped. This corresponds to the mode which
1232 is used during a soft restart : the frontend releases the port but can be
1233 enabled again if needed. This should be used with care as some non-Linux OSes
1234 are unable to enable it back. This is intended to be used in environments
1235 where stopping a proxy is not even imaginable but a misconfigured proxy must
1236 be fixed. That way it's possible to release the port and bind it into another
1237 process to restore operations. The frontend will appear with status "STOP"
1238 on the stats page.
1239
1240 The frontend may be specified either by its name or by its numeric ID,
1241 prefixed with a sharp ('#').
1242
1243 This command is restricted and can only be issued on sockets configured for
1244 level "admin".
1245
1246disable health <backend>/<server>
1247 Mark the primary health check as temporarily stopped. This will disable
1248 sending of health checks, and the last health check result will be ignored.
1249 The server will be in unchecked state and considered UP unless an auxiliary
1250 agent check forces it down.
1251
1252 This command is restricted and can only be issued on sockets configured for
1253 level "admin".
1254
1255disable server <backend>/<server>
1256 Mark the server DOWN for maintenance. In this mode, no more checks will be
1257 performed on the server until it leaves maintenance.
1258 If the server is tracked by other servers, those servers will be set to DOWN
1259 during the maintenance.
1260
1261 In the statistics page, a server DOWN for maintenance will appear with a
1262 "MAINT" status, its tracking servers with the "MAINT(via)" one.
1263
1264 Both the backend and the server may be specified either by their name or by
1265 their numeric ID, prefixed with a sharp ('#').
1266
1267 This command is restricted and can only be issued on sockets configured for
1268 level "admin".
1269
1270enable agent <backend>/<server>
1271 Resume auxiliary agent check that was temporarily stopped.
1272
1273 See "disable agent" for details of the effect of temporarily starting
1274 and stopping an auxiliary agent.
1275
1276 This command is restricted and can only be issued on sockets configured for
1277 level "admin".
1278
1279enable frontend <frontend>
1280 Resume a frontend which was temporarily stopped. It is possible that some of
1281 the listening ports won't be able to bind anymore (eg: if another process
1282 took them since the 'disable frontend' operation). If this happens, an error
1283 is displayed. Some operating systems might not be able to resume a frontend
1284 which was disabled.
1285
1286 The frontend may be specified either by its name or by its numeric ID,
1287 prefixed with a sharp ('#').
1288
1289 This command is restricted and can only be issued on sockets configured for
1290 level "admin".
1291
1292enable health <backend>/<server>
1293 Resume a primary health check that was temporarily stopped. This will enable
1294 sending of health checks again. Please see "disable health" for details.
1295
1296 This command is restricted and can only be issued on sockets configured for
1297 level "admin".
1298
1299enable server <backend>/<server>
1300 If the server was previously marked as DOWN for maintenance, this marks the
1301 server UP and checks are re-enabled.
1302
1303 Both the backend and the server may be specified either by their name or by
1304 their numeric ID, prefixed with a sharp ('#').
1305
1306 This command is restricted and can only be issued on sockets configured for
1307 level "admin".
1308
1309get map <map> <value>
1310get acl <acl> <value>
1311 Lookup the value <value> in the map <map> or in the ACL <acl>. <map> or <acl>
1312 are the #<id> or the <file> returned by "show map" or "show acl". This command
1313 returns all the matching patterns associated with this map. This is useful for
1314 debugging maps and ACLs. The output format is composed by one line par
1315 matching type. Each line is composed by space-delimited series of words.
1316
1317 The first two words are:
1318
1319 <match method>: The match method applied. It can be "found", "bool",
1320 "int", "ip", "bin", "len", "str", "beg", "sub", "dir",
1321 "dom", "end" or "reg".
1322
1323 <match result>: The result. Can be "match" or "no-match".
1324
1325 The following words are returned only if the pattern matches an entry.
1326
1327 <index type>: "tree" or "list". The internal lookup algorithm.
1328
1329 <case>: "case-insensitive" or "case-sensitive". The
1330 interpretation of the case.
1331
1332 <entry matched>: match="<entry>". Return the matched pattern. It is
1333 useful with regular expressions.
1334
1335 The two last word are used to show the returned value and its type. With the
1336 "acl" case, the pattern doesn't exist.
1337
1338 return=nothing: No return because there are no "map".
1339 return="<value>": The value returned in the string format.
1340 return=cannot-display: The value cannot be converted as string.
1341
1342 type="<type>": The type of the returned sample.
1343
1344get weight <backend>/<server>
1345 Report the current weight and the initial weight of server <server> in
1346 backend <backend> or an error if either doesn't exist. The initial weight is
1347 the one that appears in the configuration file. Both are normally equal
1348 unless the current weight has been changed. Both the backend and the server
1349 may be specified either by their name or by their numeric ID, prefixed with a
1350 sharp ('#').
1351
1352help
1353 Print the list of known keywords and their basic usage. The same help screen
1354 is also displayed for unknown commands.
1355
1356prompt
1357 Toggle the prompt at the beginning of the line and enter or leave interactive
1358 mode. In interactive mode, the connection is not closed after a command
1359 completes. Instead, the prompt will appear again, indicating the user that
1360 the interpreter is waiting for a new command. The prompt consists in a right
1361 angle bracket followed by a space "> ". This mode is particularly convenient
1362 when one wants to periodically check information such as stats or errors.
1363 It is also a good idea to enter interactive mode before issuing a "help"
1364 command.
1365
1366quit
1367 Close the connection when in interactive mode.
1368
1369set map <map> [<key>|#<ref>] <value>
1370 Modify the value corresponding to each key <key> in a map <map>. <map> is the
1371 #<id> or <file> returned by "show map". If the <ref> is used in place of
1372 <key>, only the entry pointed by <ref> is changed. The new value is <value>.
1373
1374set maxconn frontend <frontend> <value>
1375 Dynamically change the specified frontend's maxconn setting. Any positive
1376 value is allowed including zero, but setting values larger than the global
1377 maxconn does not make much sense. If the limit is increased and connections
1378 were pending, they will immediately be accepted. If it is lowered to a value
1379 below the current number of connections, new connections acceptation will be
1380 delayed until the threshold is reached. The frontend might be specified by
1381 either its name or its numeric ID prefixed with a sharp ('#').
1382
Andrew Hayworthedb93a72015-10-27 21:46:25 +00001383set maxconn server <backend/server> <value>
1384 Dynamically change the specified server's maxconn setting. Any positive
1385 value is allowed including zero, but setting values larger than the global
1386 maxconn does not make much sense.
1387
Willy Tarreau44aed902015-10-13 14:45:29 +02001388set maxconn global <maxconn>
1389 Dynamically change the global maxconn setting within the range defined by the
1390 initial global maxconn setting. If it is increased and connections were
1391 pending, they will immediately be accepted. If it is lowered to a value below
1392 the current number of connections, new connections acceptation will be
1393 delayed until the threshold is reached. A value of zero restores the initial
1394 setting.
1395
1396set rate-limit connections global <value>
1397 Change the process-wide connection rate limit, which is set by the global
1398 'maxconnrate' setting. A value of zero disables the limitation. This limit
1399 applies to all frontends and the change has an immediate effect. The value
1400 is passed in number of connections per second.
1401
1402set rate-limit http-compression global <value>
1403 Change the maximum input compression rate, which is set by the global
1404 'maxcomprate' setting. A value of zero disables the limitation. The value is
1405 passed in number of kilobytes per second. The value is available in the "show
1406 info" on the line "CompressBpsRateLim" in bytes.
1407
1408set rate-limit sessions global <value>
1409 Change the process-wide session rate limit, which is set by the global
1410 'maxsessrate' setting. A value of zero disables the limitation. This limit
1411 applies to all frontends and the change has an immediate effect. The value
1412 is passed in number of sessions per second.
1413
1414set rate-limit ssl-sessions global <value>
1415 Change the process-wide SSL session rate limit, which is set by the global
1416 'maxsslrate' setting. A value of zero disables the limitation. This limit
1417 applies to all frontends and the change has an immediate effect. The value
1418 is passed in number of sessions per second sent to the SSL stack. It applies
1419 before the handshake in order to protect the stack against handshake abuses.
1420
1421set server <backend>/<server> addr <ip4 or ip6 address>
1422 Replace the current IP address of a server by the one provided.
1423
1424set server <backend>/<server> agent [ up | down ]
1425 Force a server's agent to a new state. This can be useful to immediately
1426 switch a server's state regardless of some slow agent checks for example.
1427 Note that the change is propagated to tracking servers if any.
1428
1429set server <backend>/<server> health [ up | stopping | down ]
1430 Force a server's health to a new state. This can be useful to immediately
1431 switch a server's state regardless of some slow health checks for example.
1432 Note that the change is propagated to tracking servers if any.
1433
1434set server <backend>/<server> state [ ready | drain | maint ]
1435 Force a server's administrative state to a new state. This can be useful to
1436 disable load balancing and/or any traffic to a server. Setting the state to
1437 "ready" puts the server in normal mode, and the command is the equivalent of
1438 the "enable server" command. Setting the state to "maint" disables any traffic
1439 to the server as well as any health checks. This is the equivalent of the
1440 "disable server" command. Setting the mode to "drain" only removes the server
1441 from load balancing but still allows it to be checked and to accept new
1442 persistent connections. Changes are propagated to tracking servers if any.
1443
1444set server <backend>/<server> weight <weight>[%]
1445 Change a server's weight to the value passed in argument. This is the exact
1446 equivalent of the "set weight" command below.
1447
1448set ssl ocsp-response <response>
1449 This command is used to update an OCSP Response for a certificate (see "crt"
1450 on "bind" lines). Same controls are performed as during the initial loading of
1451 the response. The <response> must be passed as a base64 encoded string of the
1452 DER encoded response from the OCSP server.
1453
1454 Example:
1455 openssl ocsp -issuer issuer.pem -cert server.pem \
1456 -host ocsp.issuer.com:80 -respout resp.der
1457 echo "set ssl ocsp-response $(base64 -w 10000 resp.der)" | \
1458 socat stdio /var/run/haproxy.stat
1459
1460set ssl tls-key <id> <tlskey>
1461 Set the next TLS key for the <id> listener to <tlskey>. This key becomes the
1462 ultimate key, while the penultimate one is used for encryption (others just
1463 decrypt). The oldest TLS key present is overwritten. <id> is either a numeric
1464 #<id> or <file> returned by "show tls-keys". <tlskey> is a base64 encoded 48
1465 bit TLS ticket key (ex. openssl rand -base64 48).
1466
1467set table <table> key <key> [data.<data_type> <value>]*
1468 Create or update a stick-table entry in the table. If the key is not present,
1469 an entry is inserted. See stick-table in section 4.2 to find all possible
1470 values for <data_type>. The most likely use consists in dynamically entering
1471 entries for source IP addresses, with a flag in gpc0 to dynamically block an
1472 IP address or affect its quality of service. It is possible to pass multiple
1473 data_types in a single call.
1474
1475set timeout cli <delay>
1476 Change the CLI interface timeout for current connection. This can be useful
1477 during long debugging sessions where the user needs to constantly inspect
1478 some indicators without being disconnected. The delay is passed in seconds.
1479
1480set weight <backend>/<server> <weight>[%]
1481 Change a server's weight to the value passed in argument. If the value ends
1482 with the '%' sign, then the new weight will be relative to the initially
1483 configured weight. Absolute weights are permitted between 0 and 256.
1484 Relative weights must be positive with the resulting absolute weight is
1485 capped at 256. Servers which are part of a farm running a static
1486 load-balancing algorithm have stricter limitations because the weight
1487 cannot change once set. Thus for these servers, the only accepted values
1488 are 0 and 100% (or 0 and the initial weight). Changes take effect
1489 immediately, though certain LB algorithms require a certain amount of
1490 requests to consider changes. A typical usage of this command is to
1491 disable a server during an update by setting its weight to zero, then to
1492 enable it again after the update by setting it back to 100%. This command
1493 is restricted and can only be issued on sockets configured for level
1494 "admin". Both the backend and the server may be specified either by their
1495 name or by their numeric ID, prefixed with a sharp ('#').
1496
Willy Tarreauae795722016-02-16 11:27:28 +01001497show env [<name>]
1498 Dump one or all environment variables known by the process. Without any
1499 argument, all variables are dumped. With an argument, only the specified
1500 variable is dumped if it exists. Otherwise "Variable not found" is emitted.
1501 Variables are dumped in the same format as they are stored or returned by the
1502 "env" utility, that is, "<name>=<value>". This can be handy when debugging
1503 certain configuration files making heavy use of environment variables to
1504 ensure that they contain the expected values. This command is restricted and
1505 can only be issued on sockets configured for levels "operator" or "admin".
1506
Willy Tarreau44aed902015-10-13 14:45:29 +02001507show errors [<iid>]
1508 Dump last known request and response errors collected by frontends and
1509 backends. If <iid> is specified, the limit the dump to errors concerning
1510 either frontend or backend whose ID is <iid>. This command is restricted
1511 and can only be issued on sockets configured for levels "operator" or
1512 "admin".
1513
1514 The errors which may be collected are the last request and response errors
1515 caused by protocol violations, often due to invalid characters in header
1516 names. The report precisely indicates what exact character violated the
1517 protocol. Other important information such as the exact date the error was
1518 detected, frontend and backend names, the server name (when known), the
1519 internal session ID and the source address which has initiated the session
1520 are reported too.
1521
1522 All characters are returned, and non-printable characters are encoded. The
1523 most common ones (\t = 9, \n = 10, \r = 13 and \e = 27) are encoded as one
1524 letter following a backslash. The backslash itself is encoded as '\\' to
1525 avoid confusion. Other non-printable characters are encoded '\xNN' where
1526 NN is the two-digits hexadecimal representation of the character's ASCII
1527 code.
1528
1529 Lines are prefixed with the position of their first character, starting at 0
1530 for the beginning of the buffer. At most one input line is printed per line,
1531 and large lines will be broken into multiple consecutive output lines so that
1532 the output never goes beyond 79 characters wide. It is easy to detect if a
1533 line was broken, because it will not end with '\n' and the next line's offset
1534 will be followed by a '+' sign, indicating it is a continuation of previous
1535 line.
1536
1537 Example :
1538 $ echo "show errors" | socat stdio /tmp/sock1
1539 >>> [04/Mar/2009:15:46:56.081] backend http-in (#2) : invalid response
1540 src 127.0.0.1, session #54, frontend fe-eth0 (#1), server s2 (#1)
1541 response length 213 bytes, error at position 23:
1542
1543 00000 HTTP/1.0 200 OK\r\n
1544 00017 header/bizarre:blah\r\n
1545 00038 Location: blah\r\n
1546 00054 Long-line: this is a very long line which should b
1547 00104+ e broken into multiple lines on the output buffer,
1548 00154+ otherwise it would be too large to print in a ter
1549 00204+ minal\r\n
1550 00211 \r\n
1551
1552 In the example above, we see that the backend "http-in" which has internal
1553 ID 2 has blocked an invalid response from its server s2 which has internal
1554 ID 1. The request was on session 54 initiated by source 127.0.0.1 and
1555 received by frontend fe-eth0 whose ID is 1. The total response length was
1556 213 bytes when the error was detected, and the error was at byte 23. This
1557 is the slash ('/') in header name "header/bizarre", which is not a valid
1558 HTTP character for a header name.
1559
1560show backend
1561 Dump the list of backends available in the running process
1562
1563show info
1564 Dump info about haproxy status on current process.
1565
1566show map [<map>]
1567 Dump info about map converters. Without argument, the list of all available
1568 maps is returned. If a <map> is specified, its contents are dumped. <map> is
1569 the #<id> or <file>. The first column is a unique identifier. It can be used
1570 as reference for the operation "del map" and "set map". The second column is
1571 the pattern and the third column is the sample if available. The data returned
1572 are not directly a list of available maps, but are the list of all patterns
1573 composing any map. Many of these patterns can be shared with ACL.
1574
1575show acl [<acl>]
1576 Dump info about acl converters. Without argument, the list of all available
1577 acls is returned. If a <acl> is specified, its contents are dumped. <acl> if
1578 the #<id> or <file>. The dump format is the same than the map even for the
1579 sample value. The data returned are not a list of available ACL, but are the
1580 list of all patterns composing any ACL. Many of these patterns can be shared
1581 with maps.
1582
1583show pools
1584 Dump the status of internal memory pools. This is useful to track memory
1585 usage when suspecting a memory leak for example. It does exactly the same
1586 as the SIGQUIT when running in foreground except that it does not flush
1587 the pools.
1588
1589show servers state [<backend>]
1590 Dump the state of the servers found in the running configuration. A backend
1591 name or identifier may be provided to limit the output to this backend only.
1592
1593 The dump has the following format:
1594 - first line contains the format version (1 in this specification);
1595 - second line contains the column headers, prefixed by a sharp ('#');
1596 - third line and next ones contain data;
1597 - each line starting by a sharp ('#') is considered as a comment.
1598
1599 Since multiple versions of the ouptput may co-exist, below is the list of
1600 fields and their order per file format version :
1601 1:
1602 be_id: Backend unique id.
1603 be_name: Backend label.
1604 srv_id: Server unique id (in the backend).
1605 srv_name: Server label.
1606 srv_addr: Server IP address.
1607 srv_op_state: Server operational state (UP/DOWN/...).
1608 In source code: SRV_ST_*.
1609 srv_admin_state: Server administrative state (MAINT/DRAIN/...).
1610 In source code: SRV_ADMF_*.
1611 srv_uweight: User visible server's weight.
1612 srv_iweight: Server's initial weight.
1613 srv_time_since_last_change: Time since last operational change.
1614 srv_check_status: Last health check status.
1615 srv_check_result: Last check result (FAILED/PASSED/...).
1616 In source code: CHK_RES_*.
1617 srv_check_health: Checks rise / fall current counter.
1618 srv_check_state: State of the check (ENABLED/PAUSED/...).
1619 In source code: CHK_ST_*.
1620 srv_agent_state: State of the agent check (ENABLED/PAUSED/...).
1621 In source code: CHK_ST_*.
1622 bk_f_forced_id: Flag to know if the backend ID is forced by
1623 configuration.
1624 srv_f_forced_id: Flag to know if the server's ID is forced by
1625 configuration.
1626
1627show sess
1628 Dump all known sessions. Avoid doing this on slow connections as this can
1629 be huge. This command is restricted and can only be issued on sockets
1630 configured for levels "operator" or "admin".
1631
1632show sess <id>
1633 Display a lot of internal information about the specified session identifier.
1634 This identifier is the first field at the beginning of the lines in the dumps
1635 of "show sess" (it corresponds to the session pointer). Those information are
1636 useless to most users but may be used by haproxy developers to troubleshoot a
1637 complex bug. The output format is intentionally not documented so that it can
1638 freely evolve depending on demands. You may find a description of all fields
1639 returned in src/dumpstats.c
1640
1641 The special id "all" dumps the states of all sessions, which must be avoided
1642 as much as possible as it is highly CPU intensive and can take a lot of time.
1643
1644show stat [<iid> <type> <sid>]
1645 Dump statistics in the CSV format. By passing <id>, <type> and <sid>, it is
1646 possible to dump only selected items :
1647 - <iid> is a proxy ID, -1 to dump everything
1648 - <type> selects the type of dumpable objects : 1 for frontends, 2 for
1649 backends, 4 for servers, -1 for everything. These values can be ORed,
1650 for example:
1651 1 + 2 = 3 -> frontend + backend.
1652 1 + 2 + 4 = 7 -> frontend + backend + server.
1653 - <sid> is a server ID, -1 to dump everything from the selected proxy.
1654
1655 Example :
1656 $ echo "show info;show stat" | socat stdio unix-connect:/tmp/sock1
1657 >>> Name: HAProxy
1658 Version: 1.4-dev2-49
1659 Release_date: 2009/09/23
1660 Nbproc: 1
1661 Process_num: 1
1662 (...)
1663
1664 # pxname,svname,qcur,qmax,scur,smax,slim,stot,bin,bout,dreq, (...)
1665 stats,FRONTEND,,,0,0,1000,0,0,0,0,0,0,,,,,OPEN,,,,,,,,,1,1,0, (...)
1666 stats,BACKEND,0,0,0,0,1000,0,0,0,0,0,,0,0,0,0,UP,0,0,0,,0,250,(...)
1667 (...)
1668 www1,BACKEND,0,0,0,0,1000,0,0,0,0,0,,0,0,0,0,UP,1,1,0,,0,250, (...)
1669
1670 $
1671
1672 Here, two commands have been issued at once. That way it's easy to find
1673 which process the stats apply to in multi-process mode. Notice the empty
1674 line after the information output which marks the end of the first block.
1675 A similar empty line appears at the end of the second block (stats) so that
1676 the reader knows the output has not been truncated.
1677
1678show stat resolvers [<resolvers section id>]
1679 Dump statistics for the given resolvers section, or all resolvers sections
1680 if no section is supplied.
1681
1682 For each name server, the following counters are reported:
1683 sent: number of DNS requests sent to this server
1684 valid: number of DNS valid responses received from this server
1685 update: number of DNS responses used to update the server's IP address
1686 cname: number of CNAME responses
1687 cname_error: CNAME errors encountered with this server
1688 any_err: number of empty response (IE: server does not support ANY type)
1689 nx: non existent domain response received from this server
1690 timeout: how many time this server did not answer in time
1691 refused: number of requests refused by this server
1692 other: any other DNS errors
1693 invalid: invalid DNS response (from a protocol point of view)
1694 too_big: too big response
1695 outdated: number of response arrived too late (after an other name server)
1696
1697show table
1698 Dump general information on all known stick-tables. Their name is returned
1699 (the name of the proxy which holds them), their type (currently zero, always
1700 IP), their size in maximum possible number of entries, and the number of
1701 entries currently in use.
1702
1703 Example :
1704 $ echo "show table" | socat stdio /tmp/sock1
1705 >>> # table: front_pub, type: ip, size:204800, used:171454
1706 >>> # table: back_rdp, type: ip, size:204800, used:0
1707
1708show table <name> [ data.<type> <operator> <value> ] | [ key <key> ]
1709 Dump contents of stick-table <name>. In this mode, a first line of generic
1710 information about the table is reported as with "show table", then all
1711 entries are dumped. Since this can be quite heavy, it is possible to specify
1712 a filter in order to specify what entries to display.
1713
1714 When the "data." form is used the filter applies to the stored data (see
1715 "stick-table" in section 4.2). A stored data type must be specified
1716 in <type>, and this data type must be stored in the table otherwise an
1717 error is reported. The data is compared according to <operator> with the
1718 64-bit integer <value>. Operators are the same as with the ACLs :
1719
1720 - eq : match entries whose data is equal to this value
1721 - ne : match entries whose data is not equal to this value
1722 - le : match entries whose data is less than or equal to this value
1723 - ge : match entries whose data is greater than or equal to this value
1724 - lt : match entries whose data is less than this value
1725 - gt : match entries whose data is greater than this value
1726
1727
1728 When the key form is used the entry <key> is shown. The key must be of the
1729 same type as the table, which currently is limited to IPv4, IPv6, integer,
1730 and string.
1731
1732 Example :
1733 $ echo "show table http_proxy" | socat stdio /tmp/sock1
1734 >>> # table: http_proxy, type: ip, size:204800, used:2
1735 >>> 0x80e6a4c: key=127.0.0.1 use=0 exp=3594729 gpc0=0 conn_rate(30000)=1 \
1736 bytes_out_rate(60000)=187
1737 >>> 0x80e6a80: key=127.0.0.2 use=0 exp=3594740 gpc0=1 conn_rate(30000)=10 \
1738 bytes_out_rate(60000)=191
1739
1740 $ echo "show table http_proxy data.gpc0 gt 0" | socat stdio /tmp/sock1
1741 >>> # table: http_proxy, type: ip, size:204800, used:2
1742 >>> 0x80e6a80: key=127.0.0.2 use=0 exp=3594740 gpc0=1 conn_rate(30000)=10 \
1743 bytes_out_rate(60000)=191
1744
1745 $ echo "show table http_proxy data.conn_rate gt 5" | \
1746 socat stdio /tmp/sock1
1747 >>> # table: http_proxy, type: ip, size:204800, used:2
1748 >>> 0x80e6a80: key=127.0.0.2 use=0 exp=3594740 gpc0=1 conn_rate(30000)=10 \
1749 bytes_out_rate(60000)=191
1750
1751 $ echo "show table http_proxy key 127.0.0.2" | \
1752 socat stdio /tmp/sock1
1753 >>> # table: http_proxy, type: ip, size:204800, used:2
1754 >>> 0x80e6a80: key=127.0.0.2 use=0 exp=3594740 gpc0=1 conn_rate(30000)=10 \
1755 bytes_out_rate(60000)=191
1756
1757 When the data criterion applies to a dynamic value dependent on time such as
1758 a bytes rate, the value is dynamically computed during the evaluation of the
1759 entry in order to decide whether it has to be dumped or not. This means that
1760 such a filter could match for some time then not match anymore because as
1761 time goes, the average event rate drops.
1762
1763 It is possible to use this to extract lists of IP addresses abusing the
1764 service, in order to monitor them or even blacklist them in a firewall.
1765 Example :
1766 $ echo "show table http_proxy data.gpc0 gt 0" \
1767 | socat stdio /tmp/sock1 \
1768 | fgrep 'key=' | cut -d' ' -f2 | cut -d= -f2 > abusers-ip.txt
1769 ( or | awk '/key/{ print a[split($2,a,"=")]; }' )
1770
1771show tls-keys
1772 Dump all loaded TLS ticket keys. The TLS ticket key reference ID and the
1773 file from which the keys have been loaded is shown. Both of those can be
1774 used to update the TLS keys using "set ssl tls-key".
1775
1776shutdown frontend <frontend>
1777 Completely delete the specified frontend. All the ports it was bound to will
1778 be released. It will not be possible to enable the frontend anymore after
1779 this operation. This is intended to be used in environments where stopping a
1780 proxy is not even imaginable but a misconfigured proxy must be fixed. That
1781 way it's possible to release the port and bind it into another process to
1782 restore operations. The frontend will not appear at all on the stats page
1783 once it is terminated.
1784
1785 The frontend may be specified either by its name or by its numeric ID,
1786 prefixed with a sharp ('#').
1787
1788 This command is restricted and can only be issued on sockets configured for
1789 level "admin".
1790
1791shutdown session <id>
1792 Immediately terminate the session matching the specified session identifier.
1793 This identifier is the first field at the beginning of the lines in the dumps
1794 of "show sess" (it corresponds to the session pointer). This can be used to
1795 terminate a long-running session without waiting for a timeout or when an
1796 endless transfer is ongoing. Such terminated sessions are reported with a 'K'
1797 flag in the logs.
1798
1799shutdown sessions server <backend>/<server>
1800 Immediately terminate all the sessions attached to the specified server. This
1801 can be used to terminate long-running sessions after a server is put into
1802 maintenance mode, for instance. Such terminated sessions are reported with a
1803 'K' flag in the logs.
1804
Willy Tarreau2212e6a2015-10-13 14:40:55 +02001805
180610. Tricks for easier configuration management
1807----------------------------------------------
1808
1809It is very common that two HAProxy nodes constituting a cluster share exactly
1810the same configuration modulo a few addresses. Instead of having to maintain a
1811duplicate configuration for each node, which will inevitably diverge, it is
1812possible to include environment variables in the configuration. Thus multiple
1813configuration may share the exact same file with only a few different system
1814wide environment variables. This started in version 1.5 where only addresses
1815were allowed to include environment variables, and 1.6 goes further by
1816supporting environment variables everywhere. The syntax is the same as in the
1817UNIX shell, a variable starts with a dollar sign ('$'), followed by an opening
1818curly brace ('{'), then the variable name followed by the closing brace ('}').
1819Except for addresses, environment variables are only interpreted in arguments
1820surrounded with double quotes (this was necessary not to break existing setups
1821using regular expressions involving the dollar symbol).
1822
1823Environment variables also make it convenient to write configurations which are
1824expected to work on various sites where only the address changes. It can also
1825permit to remove passwords from some configs. Example below where the the file
1826"site1.env" file is sourced by the init script upon startup :
1827
1828 $ cat site1.env
1829 LISTEN=192.168.1.1
1830 CACHE_PFX=192.168.11
1831 SERVER_PFX=192.168.22
1832 LOGGER=192.168.33.1
1833 STATSLP=admin:pa$$w0rd
1834 ABUSERS=/etc/haproxy/abuse.lst
1835 TIMEOUT=10s
1836
1837 $ cat haproxy.cfg
1838 global
1839 log "${LOGGER}:514" local0
1840
1841 defaults
1842 mode http
1843 timeout client "${TIMEOUT}"
1844 timeout server "${TIMEOUT}"
1845 timeout connect 5s
1846
1847 frontend public
1848 bind "${LISTEN}:80"
1849 http-request reject if { src -f "${ABUSERS}" }
1850 stats uri /stats
1851 stats auth "${STATSLP}"
1852 use_backend cache if { path_end .jpg .css .ico }
1853 default_backend server
1854
1855 backend cache
1856 server cache1 "${CACHE_PFX}.1:18080" check
1857 server cache2 "${CACHE_PFX}.2:18080" check
1858
1859 backend server
1860 server cache1 "${SERVER_PFX}.1:8080" check
1861 server cache2 "${SERVER_PFX}.2:8080" check
1862
1863
186411. Well-known traps to avoid
1865-----------------------------
1866
1867Once in a while, someone reports that after a system reboot, the haproxy
1868service wasn't started, and that once they start it by hand it works. Most
1869often, these people are running a clustered IP address mechanism such as
1870keepalived, to assign the service IP address to the master node only, and while
1871it used to work when they used to bind haproxy to address 0.0.0.0, it stopped
1872working after they bound it to the virtual IP address. What happens here is
1873that when the service starts, the virtual IP address is not yet owned by the
1874local node, so when HAProxy wants to bind to it, the system rejects this
1875because it is not a local IP address. The fix doesn't consist in delaying the
1876haproxy service startup (since it wouldn't stand a restart), but instead to
1877properly configure the system to allow binding to non-local addresses. This is
1878easily done on Linux by setting the net.ipv4.ip_nonlocal_bind sysctl to 1. This
1879is also needed in order to transparently intercept the IP traffic that passes
1880through HAProxy for a specific target address.
1881
1882Multi-process configurations involving source port ranges may apparently seem
1883to work but they will cause some random failures under high loads because more
1884than one process may try to use the same source port to connect to the same
1885server, which is not possible. The system will report an error and a retry will
1886happen, picking another port. A high value in the "retries" parameter may hide
1887the effect to a certain extent but this also comes with increased CPU usage and
1888processing time. Logs will also report a certain number of retries. For this
1889reason, port ranges should be avoided in multi-process configurations.
1890
1891Since HAProxy uses SO_REUSEPORT and supports having multiple independant
1892processes bound to the same IP:port, during troubleshooting it can happen that
1893an old process was not stopped before a new one was started. This provides
1894absurd test results which tend to indicate that any change to the configuration
1895is ignored. The reason is that in fact even the new process is restarted with a
1896new configuration, the old one also gets some incoming connections and
1897processes them, returning unexpected results. When in doubt, just stop the new
1898process and try again. If it still works, it very likely means that an old
1899process remains alive and has to be stopped. Linux's "netstat -lntp" is of good
1900help here.
1901
1902When adding entries to an ACL from the command line (eg: when blacklisting a
1903source address), it is important to keep in mind that these entries are not
1904synchronized to the file and that if someone reloads the configuration, these
1905updates will be lost. While this is often the desired effect (for blacklisting)
1906it may not necessarily match expectations when the change was made as a fix for
1907a problem. See the "add acl" action of the CLI interface.
1908
1909
191012. Debugging and performance issues
1911------------------------------------
1912
1913When HAProxy is started with the "-d" option, it will stay in the foreground
1914and will print one line per event, such as an incoming connection, the end of a
1915connection, and for each request or response header line seen. This debug
1916output is emitted before the contents are processed, so they don't consider the
1917local modifications. The main use is to show the request and response without
1918having to run a network sniffer. The output is less readable when multiple
1919connections are handled in parallel, though the "debug2ansi" and "debug2html"
1920scripts found in the examples/ directory definitely help here by coloring the
1921output.
1922
1923If a request or response is rejected because HAProxy finds it is malformed, the
1924best thing to do is to connect to the CLI and issue "show errors", which will
1925report the last captured faulty request and response for each frontend and
1926backend, with all the necessary information to indicate precisely the first
1927character of the input stream that was rejected. This is sometimes needed to
1928prove to customers or to developers that a bug is present in their code. In
1929this case it is often possible to relax the checks (but still keep the
1930captures) using "option accept-invalid-http-request" or its equivalent for
1931responses coming from the server "option accept-invalid-http-response". Please
1932see the configuration manual for more details.
1933
1934Example :
1935
1936 > show errors
1937 Total events captured on [13/Oct/2015:13:43:47.169] : 1
1938
1939 [13/Oct/2015:13:43:40.918] frontend HAProxyLocalStats (#2): invalid request
1940 backend <NONE> (#-1), server <NONE> (#-1), event #0
1941 src 127.0.0.1:51981, session #0, session flags 0x00000080
1942 HTTP msg state 26, msg flags 0x00000000, tx flags 0x00000000
1943 HTTP chunk len 0 bytes, HTTP body len 0 bytes
1944 buffer flags 0x00808002, out 0 bytes, total 31 bytes
1945 pending 31 bytes, wrapping at 8040, error at position 13:
1946
1947 00000 GET /invalid request HTTP/1.1\r\n
1948
1949
1950The output of "show info" on the CLI provides a number of useful information
1951regarding the maximum connection rate ever reached, maximum SSL key rate ever
1952reached, and in general all information which can help to explain temporary
1953issues regarding CPU or memory usage. Example :
1954
1955 > show info
1956 Name: HAProxy
1957 Version: 1.6-dev7-e32d18-17
1958 Release_date: 2015/10/12
1959 Nbproc: 1
1960 Process_num: 1
1961 Pid: 7949
1962 Uptime: 0d 0h02m39s
1963 Uptime_sec: 159
1964 Memmax_MB: 0
1965 Ulimit-n: 120032
1966 Maxsock: 120032
1967 Maxconn: 60000
1968 Hard_maxconn: 60000
1969 CurrConns: 0
1970 CumConns: 3
1971 CumReq: 3
1972 MaxSslConns: 0
1973 CurrSslConns: 0
1974 CumSslConns: 0
1975 Maxpipes: 0
1976 PipesUsed: 0
1977 PipesFree: 0
1978 ConnRate: 0
1979 ConnRateLimit: 0
1980 MaxConnRate: 1
1981 SessRate: 0
1982 SessRateLimit: 0
1983 MaxSessRate: 1
1984 SslRate: 0
1985 SslRateLimit: 0
1986 MaxSslRate: 0
1987 SslFrontendKeyRate: 0
1988 SslFrontendMaxKeyRate: 0
1989 SslFrontendSessionReuse_pct: 0
1990 SslBackendKeyRate: 0
1991 SslBackendMaxKeyRate: 0
1992 SslCacheLookups: 0
1993 SslCacheMisses: 0
1994 CompressBpsIn: 0
1995 CompressBpsOut: 0
1996 CompressBpsRateLim: 0
1997 ZlibMemUsage: 0
1998 MaxZlibMemUsage: 0
1999 Tasks: 5
2000 Run_queue: 1
2001 Idle_pct: 100
2002 node: wtap
2003 description:
2004
2005When an issue seems to randomly appear on a new version of HAProxy (eg: every
2006second request is aborted, occasional crash, etc), it is worth trying to enable
2007memory poisonning so that each call to malloc() is immediately followed by the
2008filling of the memory area with a configurable byte. By default this byte is
20090x50 (ASCII for 'P'), but any other byte can be used, including zero (which
2010will have the same effect as a calloc() and which may make issues disappear).
2011Memory poisonning is enabled on the command line using the "-dM" option. It
2012slightly hurts performance and is not recommended for use in production. If
2013an issue happens all the time with it or never happens when poisoonning uses
2014byte zero, it clearly means you've found a bug and you definitely need to
2015report it. Otherwise if there's no clear change, the problem it is not related.
2016
2017When debugging some latency issues, it is important to use both strace and
2018tcpdump on the local machine, and another tcpdump on the remote system. The
2019reason for this is that there are delays everywhere in the processing chain and
2020it is important to know which one is causing latency to know where to act. In
2021practice, the local tcpdump will indicate when the input data come in. Strace
2022will indicate when haproxy receives these data (using recv/recvfrom). Warning,
2023openssl uses read()/write() syscalls instead of recv()/send(). Strace will also
2024show when haproxy sends the data, and tcpdump will show when the system sends
2025these data to the interface. Then the external tcpdump will show when the data
2026sent are really received (since the local one only shows when the packets are
2027queued). The benefit of sniffing on the local system is that strace and tcpdump
2028will use the same reference clock. Strace should be used with "-tts200" to get
2029complete timestamps and report large enough chunks of data to read them.
2030Tcpdump should be used with "-nvvttSs0" to report full packets, real sequence
2031numbers and complete timestamps.
2032
2033In practice, received data are almost always immediately received by haproxy
2034(unless the machine has a saturated CPU or these data are invalid and not
2035delivered). If these data are received but not sent, it generally is because
2036the output buffer is saturated (ie: recipient doesn't consume the data fast
2037enough). This can be confirmed by seeing that the polling doesn't notify of
2038the ability to write on the output file descriptor for some time (it's often
2039easier to spot in the strace output when the data finally leave and then roll
2040back to see when the write event was notified). It generally matches an ACK
2041received from the recipient, and detected by tcpdump. Once the data are sent,
2042they may spend some time in the system doing nothing. Here again, the TCP
2043congestion window may be limited and not allow these data to leave, waiting for
2044an ACK to open the window. If the traffic is idle and the data take 40 ms or
2045200 ms to leave, it's a different issue (which is not an issue), it's the fact
2046that the Nagle algorithm prevents empty packets from leaving immediately, in
2047hope that they will be merged with subsequent data. HAProxy automatically
2048disables Nagle in pure TCP mode and in tunnels. However it definitely remains
2049enabled when forwarding an HTTP body (and this contributes to the performance
2050improvement there by reducing the number of packets). Some HTTP non-compliant
2051applications may be sensitive to the latency when delivering incomplete HTTP
2052response messages. In this case you will have to enable "option http-no-delay"
2053to disable Nagle in order to work around their design, keeping in mind that any
2054other proxy in the chain may similarly be impacted. If tcpdump reports that data
2055leave immediately but the other end doesn't see them quickly, it can mean there
2056is a congestionned WAN link, a congestionned LAN with flow control enabled and
2057preventing the data from leaving, or more commonly that HAProxy is in fact
2058running in a virtual machine and that for whatever reason the hypervisor has
2059decided that the data didn't need to be sent immediately. In virtualized
2060environments, latency issues are almost always caused by the virtualization
2061layer, so in order to save time, it's worth first comparing tcpdump in the VM
2062and on the external components. Any difference has to be credited to the
2063hypervisor and its accompanying drivers.
2064
2065When some TCP SACK segments are seen in tcpdump traces (using -vv), it always
2066means that the side sending them has got the proof of a lost packet. While not
2067seeing them doesn't mean there are no losses, seeing them definitely means the
2068network is lossy. Losses are normal on a network, but at a rate where SACKs are
2069not noticeable at the naked eye. If they appear a lot in the traces, it is
2070worth investigating exactly what happens and where the packets are lost. HTTP
2071doesn't cope well with TCP losses, which introduce huge latencies.
2072
2073The "netstat -i" command will report statistics per interface. An interface
2074where the Rx-Ovr counter grows indicates that the system doesn't have enough
2075resources to receive all incoming packets and that they're lost before being
2076processed by the network driver. Rx-Drp indicates that some received packets
2077were lost in the network stack because the application doesn't process them
2078fast enough. This can happen during some attacks as well. Tx-Drp means that
2079the output queues were full and packets had to be dropped. When using TCP it
2080should be very rare, but will possibly indicte a saturated outgoing link.
2081
2082
208313. Security considerations
2084---------------------------
2085
2086HAProxy is designed to run with very limited privileges. The standard way to
2087use it is to isolate it into a chroot jail and to drop its privileges to a
2088non-root user without any permissions inside this jail so that if any future
2089vulnerability were to be discovered, its compromise would not affect the rest
2090of the system.
2091
2092In order to perfom a chroot, it first needs to be started as a root user. It is
2093pointless to build hand-made chroots to start the process there, these ones are
2094painful to build, are never properly maintained and always contain way more
2095bugs than the main file-system. And in case of compromise, the intruder can use
2096the purposely built file-system. Unfortunately many administrators confuse
2097"start as root" and "run as root", resulting in the uid change to be done prior
2098to starting haproxy, and reducing the effective security restrictions.
2099
2100HAProxy will need to be started as root in order to :
2101 - adjust the file descriptor limits
2102 - bind to privileged port numbers
2103 - bind to a specific network interface
2104 - transparently listen to a foreign address
2105 - isolate itself inside the chroot jail
2106 - drop to another non-privileged UID
2107
2108HAProxy may require to be run as root in order to :
2109 - bind to an interface for outgoing connections
2110 - bind to privileged source ports for outgoing connections
2111 - transparently bind to a foreing address for outgoing connections
2112
2113Most users will never need the "run as root" case. But the "start as root"
2114covers most usages.
2115
2116A safe configuration will have :
2117
2118 - a chroot statement pointing to an empty location without any access
2119 permissions. This can be prepared this way on the UNIX command line :
2120
2121 # mkdir /var/empty && chmod 0 /var/empty || echo "Failed"
2122
2123 and referenced like this in the HAProxy configuration's global section :
2124
2125 chroot /var/empty
2126
2127 - both a uid/user and gid/group statements in the global section :
2128
2129 user haproxy
2130 group haproxy
2131
2132 - a stats socket whose mode, uid and gid are set to match the user and/or
2133 group allowed to access the CLI so that nobody may access it :
2134
2135 stats socket /var/run/haproxy.stat uid hatop gid hatop mode 600
2136