trafficserver-users mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From evan.zelkowitz@gmail.com <evan.zelkow...@gmail.com>
Subject Re: [EXTERNAL] Issue with collapsed forwarding plugin, one CONN_FAIL
Date Tue, 19 Jun 2018 15:07:33 GMT
I believe the ats params provide good enough protection except for the one specific case mentioned
in the collapsed forwarding plugin docs. The one case they can't protect against is multiple
instantaneous hits for the same content. So this actually comes up fairly often for linear
video since you have multiple clients that can all be requesting the same video chunk at the
same time

On 2018/06/19 12:24:08, Jeremy Payne <jp557198@gmail.com> wrote: 
> in testing 713, i also notice the 303 sent back to the end user. this
> is much different than what's seen with 621. at least with 621 a 5xx
> reponse is sent  after all configured retries have been exhausted.
> 
> that said.. whats the current status of this plugin? deprecated? no
> longer supported ?
> 
> is it safe to say, ATS core read_while_writer timers(and related
> parameters) should be the preferred protections against thundering
> herd ?
> maybe at one time, core parameters were not sufficient to protect the
> origin, which is why the plugin was developed in the first place.
> but now core has caught up, and the plugin is no longer needed ?
> 
> thanks!
> 
> 
> 
> 
> On Wed, May 16, 2018 at 2:51 PM, Zelkowitz, Evan
> <Evan_Zelkowitz@comcast.com> wrote:
> > So now that Im testing it more I can see on the origin side that for each
> > one of these ERR_CONNECT_FAILS that that is going back to my client
> > application which is then getting the redirect and going to the origin.  It
> > doesn’t even appear to be doing the number of retries or delays that I set
> > for the collapsed_forwarding plugin.  So something seems to be going wrong
> > with the plugin somewhere. I can see it attempting the delay, so it can see
> > the writefail header, and it sets the ‘internal’ redirect properly but that
> > appears to leak out back to the client before it gets attempted by ATS
> > itself.
> >
> >
> >
> > From: "Zelkowitz, Evan" <Evan_Zelkowitz@comcast.com>
> > Reply-To: "users@trafficserver.apache.org" <users@trafficserver.apache.org>
> > Date: Tuesday, May 15, 2018 at 2:08 PM
> > To: "users@trafficserver.apache.org" <users@trafficserver.apache.org>
> > Subject: [EXTERNAL] Issue with collapsed forwarding plugin, one CONN_FAIL
> >
> >
> >
> > Ive been testing the collapsed forwarding plugin here by sending it random
> > traffic, one request with 10 duplicates of the same request.  One thing Im
> > seeing is that a lot of the time one of the requests out of those 10 will
> > come back as an ERR_CONN_FAIL, but the pssc will be the 303 redirect.
> >
> >
> >
> > I was just wondering if this was expected? Is it an issue or has anyone seen
> > this?
> >
> >
> >
> > Here is my output logging showing one of these instances:
> >
> >
> >
> > 1526413868.121 chi=test-ip phn=test-cache-09.net php=80
> > shn=origin-test-cache-52.net
> > url=http://origin-test-cache-52.net/muxed-3000-prDi.tJZFQeIkXN_QYeLWwqAeRbJpH.ts
> > cqhm=GET cqhv=HTTP/1.1 pssc=200 ttms=1 b=107782 sssc=200 sscl=107782
> > cfsc=FIN pfsc=FIN crc=TCP_MISS phr=DIRECT pqsn=origin-test-cache-52.net
> > uas="CUSTOMUAS/0.0.0" xmt="-"
> >
> > 1526413868.123 chi=test-ip phn=test-cache-09.net php=80
> > shn=origin-test-cache-52.net
> > url=http://origin-test-cache-52.net/muxed-3000-prDi.tJZFQeIkXN_QYeLWwqAeRbJpH.ts
> > cqhm=GET cqhv=HTTP/1.1 pssc=200 ttms=0 b=107782 sssc=000 sscl=0 cfsc=FIN
> > pfsc=FIN crc=TCP_HIT phr=NONE pqsn=- uas="CUSTOMUAS/0.0.0" xmt="-"
> >
> > 1526413868.124 chi=test-ip phn=test-cache-09.net php=80
> > shn=origin-test-cache-52.net
> > url=http://origin-test-cache-52.net/muxed-3000-prDi.tJZFQeIkXN_QYeLWwqAeRbJpH.ts
> > cqhm=GET cqhv=HTTP/1.1 pssc=200 ttms=0 b=107782 sssc=000 sscl=0 cfsc=FIN
> > pfsc=FIN crc=TCP_MEM_HIT phr=NONE pqsn=- uas="CUSTOMUAS/0.0.0" xmt="-"
> >
> > 1526413868.125 chi=test-ip phn=test-cache-09.net php=80
> > shn=origin-test-cache-52.net
> > url=http://origin-test-cache-52.net/muxed-3000-prDi.tJZFQeIkXN_QYeLWwqAeRbJpH.ts
> > cqhm=GET cqhv=HTTP/1.1 pssc=200 ttms=0 b=107782 sssc=000 sscl=0 cfsc=FIN
> > pfsc=FIN crc=TCP_MEM_HIT phr=NONE pqsn=- uas="CUSTOMUAS/0.0.0" xmt="-"
> >
> > 1526413868.126 chi=test-ip phn=test-cache-09.net php=80
> > shn=origin-test-cache-52.net
> > url=http://origin-test-cache-52.net/muxed-3000-prDi.tJZFQeIkXN_QYeLWwqAeRbJpH.ts
> > cqhm=GET cqhv=HTTP/1.1 pssc=200 ttms=0 b=107782 sssc=000 sscl=0 cfsc=FIN
> > pfsc=FIN crc=TCP_MEM_HIT phr=NONE pqsn=- uas="CUSTOMUAS/0.0.0" xmt="-"
> >
> > 1526413868.126 chi=test-ip phn=test-cache-09.net php=80
> > shn=origin-test-cache-52.net
> > url=http://origin-test-cache-52.net/muxed-3000-prDi.tJZFQeIkXN_QYeLWwqAeRbJpH.ts
> > cqhm=GET cqhv=HTTP/1.1 pssc=200 ttms=0 b=107782 sssc=000 sscl=0 cfsc=FIN
> > pfsc=FIN crc=TCP_MEM_HIT phr=NONE pqsn=- uas="CUSTOMUAS/0.0.0" xmt="-"
> >
> > 1526413868.127 chi=test-ip phn=test-cache-09.net php=80
> > shn=origin-test-cache-52.net
> > url=http://origin-test-cache-52.net/muxed-3000-prDi.tJZFQeIkXN_QYeLWwqAeRbJpH.ts
> > cqhm=GET cqhv=HTTP/1.1 pssc=200 ttms=0 b=107782 sssc=000 sscl=0 cfsc=FIN
> > pfsc=FIN crc=TCP_HIT phr=NONE pqsn=- uas="CUSTOMUAS/0.0.0" xmt="-"
> >
> > 1526413868.127 chi=test-ip phn=test-cache-09.net php=80
> > shn=origin-test-cache-52.net
> > url=http://origin-test-cache-52.net/muxed-3000-prDi.tJZFQeIkXN_QYeLWwqAeRbJpH.ts
> > cqhm=GET cqhv=HTTP/1.1 pssc=200 ttms=60 b=107782 sssc=000 sscl=0 cfsc=FIN
> > pfsc=FIN crc=TCP_MEM_HIT phr=NONE pqsn=- uas="CUSTOMUAS/0.0.0" xmt="-"
> >
> > 1526413868.121 chi=test-ip phn=test-cache-09.net php=80
> > shn=origin-test-cache-52.net
> > url=http://origin-test-cache-52.net/muxed-3000-prDi.tJZFQeIkXN_QYeLWwqAeRbJpH.ts
> > cqhm=GET cqhv=HTTP/1.1 pssc=303 ttms=68 b=247 sssc=000 sscl=0 cfsc=FIN
> > pfsc=FIN crc=ERR_CONNECT_FAIL phr=DIRECT pqsn=origin-test-cache-52.net
> > uas="CUSTOMUAS/0.0.0" xmt="-"
> >
> > 1526413868.122 chi=test-ip phn=test-cache-09.net php=80
> > shn=origin-test-cache-52.net
> > url=http://origin-test-cache-52.net/muxed-3000-prDi.tJZFQeIkXN_QYeLWwqAeRbJpH.ts
> > cqhm=GET cqhv=HTTP/1.1 pssc=200 ttms=108 b=107782 sssc=000 sscl=0 cfsc=FIN
> > pfsc=FIN crc=TCP_MEM_HIT phr=NONE pqsn=- uas="CUSTOMUAS/0.0.0" xmt="-"
> >
> >
> >
> >
> 

Mime
View raw message