This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| network_stuff:haproxy [2017/08/27 18:24] – created jotasandoku | network_stuff:haproxy [2023/11/02 14:38] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| __**BASIC CONCEPTS**__\\ | __**BASIC CONCEPTS**__\\ | ||
| [[https:// | [[https:// | ||
| + | / | ||
| We define acl and backends. | We define acl and backends. | ||
| Then acl define what backend we use. | Then acl define what backend we use. | ||
| use_backend blog-backend if acl_url_blog | use_backend blog-backend if acl_url_blog | ||
| + | |||
| + | ---- | ||
| + | **OPERATION: | ||
| + | Restart: | ||
| + | / | ||
| + | |||
| + | ---- | ||
| + | |||
| + | |||
| __**MONITORING**__\\ | __**MONITORING**__\\ | ||
| - | [[https:// | + | From the cli, this command gives us a csv, dump in Calc. Check max connections and current connections. |
| + | echo "show info;show stat" | nc -U / | ||
| + | ssh -o UserKnownHostsFile=/ | ||
| + | ssh -o UserKnownHostsFile=/ | ||
| + | |||
| + | [[https:// | ||
| There' | There' | ||
| nc -U / | nc -U / | ||
| Also non-interactive commands for automated based operations. | Also non-interactive commands for automated based operations. | ||
| + | \\ | ||
| + | \\ | ||
| + | From the stats page: | ||
| + | * Session rate : number of new sessions per second. A session is a connection that was accepted by the layer 4 rules. | ||
| + | * Connection: Note that a session can have one or more connections. "With the introduction of SSL, proxy protocol and layer4 ACLs, it was needed to cut the end-to-end sessions in smaller parts, hence the introduction of " | ||
| + | |||
| + | |||
| + | ---- | ||
| + | |||
| + | __**PROTECT AGAINST DDOS:**__\\ | ||
| + | * [[https:// | ||
| + | * Block by source IP based on different criteria. Stick tables. Some examples [[http:// | ||
| + | |||
| + | ---- | ||
| + | |||
| + | **SPECIAL FEATURES**\\ | ||
| + | Enable slow start: | ||
| + | [[https:// | ||
| + | |||
| + | ---- | ||
| + | * Conceptual difference between a proxy and a ' | ||
| + | * Proxy hides clients identity to the server. This is for client to server connections. | ||
| + | * Proxy hides servers identity to the client. This is for client to server connections **as well**. | ||
| + | TODO:\\ | ||
| + | * Block by source IP based on different criteria. Stick tables: | ||
| + | * Some examples here: http:// | ||