background image

208

Appendix D

Configuration Files

Reverse Proxy

proxy.config.reverse_proxy.enabled

INT

0

Enables (1) or disables (0) reverse proxy.
(HTTP only). For FTP reverse proxy, refer to

proxy.config.ftp.reverse_ftp_enabled‚ on
page 202

.

URL Remap Rules

proxy.config.url_remap.default_to_
server_pac

INT

0

Enables (1) or disables (0) requests for / and
/proxy.pac on the proxy port to be sent to the
PAC port.

proxy.config.url_remap.default_to_
server_pac_port

INT

-1

Sets the PAC port:.

-1 specifies that the PAC port will be set to
the auto-configuration port.

If you specify a specific port, PAC requests
made to Traffic Server are redirected this
port.

proxy.config.url_remap.remap_

URL

Remap Rules

required

INT

0

Set this variable to 1 if you want Traffic
Server to serve requests only from origin
servers listed in the mapping rules of the
remap.config file. If a request does not match,
the browser will receive an error.

proxy.config.url_remap.pristine_host_
hdr

INT

0

Set this variable to 1 if you want to retain the
client host header in a request during
remapping.

SSL Termination

proxy.config.ssl.enabled

INT

0

Enables (1) or disables (0) the SSL
termination option.

Refer to

Using SSL Termination‚ on page 93

.

proxy.config.ssl.server_port

INT

4443

Specifies the port used for SSL
communication.

proxy.config.ssl.client.certification_
level

INT

0

Sets the client certification level:

0

= no client certificates are required. Traffic

Server does not verify client certificates
during the SSL handshake. Access to Traffic
Server depends on Traffic Server
configuration options (such as access control
lists).

1

= client certificates are optional. If a client

has a certificate, the certificate is validated. If
the client does not have a certificate, the
client is still allowed access to Traffic Server
unless access is denied through other Traffic
Server configuration options.

2

= client certificates are required. The client

must be authenticated during the SSL
handshake. Clients without a certificate are
not allowed to access Traffic Server.

Configuration Variable

Data Type

Default Value

Description

Содержание P4535A - Web Cache Server Appliance

Страница 1: ...HP Cache Server Appliance Administrator Guide HP Part Number 5971 3045 Printed in June 2001 ...

Страница 2: ... by copyright All rights are reserved No part of this document may be photocopied reproduced or translated to another language without the prior written consent of Hewlett Packard Company UltraServer and SPARCstorage are trademarks of Sun Microsystems Inc Myrinet is a trade name of Myri com Inc UNIX is a registered trademark of AT T All other trademarks are the property of their respective owners ...

Страница 3: ...2 Getting Started 7 Overview of Access Methods 7 Verifying that Traffic Server is up and running 8 Accessing Traffic Manager 8 Using the Monitor and Configure tabs 9 Using online help 9 Starting Traffic Line 10 Restarting Traffic Server 10 3 Web Proxy Caching 11 Understanding web proxy caching 11 A day in the life of a cache request 11 Ensuring cached object freshness 12 Revalidating HTTP objects ...

Страница 4: ...ss rules 32 Viewing the current set of bypass rules 32 Configuring ARM security 32 5 Reverse Proxy and HTTP Redirects 33 Understanding reverse proxy caching 33 Reverse proxy solutions 33 How does reverse proxy caching work 34 HTTP Reverse Proxy 35 Handling origin server redirect responses 35 Using mapping rules 36 Setting HTTP reverse proxy options 38 FTP Reverse Proxy 39 Configuring FTP Reverse P...

Страница 5: ... Resolving alarms 67 Configuring Traffic Server to E mail alarms 68 Viewing Statistics from Traffic Line 68 Viewing groups of statistics 68 Retrieving individual statistics 69 Using MRTG 70 Accessing MRTG 70 Navigating MRTG 70 Using SNMP 71 Enabling SNMP 71 Configuring SNMP trap destinations 72 10Configuring Traffic Server 73 Configuring Traffic Server using Traffic Manager 73 Starting Traffic Man...

Страница 6: ... event log files 99 Choosing the logging directory 99 Controlling logging space 99 Setting log file management options 100 Choosing event log file formats 101 Using standard formats 101 Using custom formats 103 Choosing binary or ASCII 108 Using logcat to convert binary logs to ASCII 108 Rolling event log files 109 Rolled log file name format 109 Rolling intervals 110 Setting log file rolling opti...

Страница 7: ...mands 145 Traffic Line batch mode commands 145 Traffic Line interactive mode commands 146 Traffic Line variables 147 Statistics 147 Configuration Options 151 D Configuration Files 159 arm_security config 160 Format 160 Example 160 bypass config 161 Format 162 Example 162 cache config 162 Format 163 Example 164 filter config 164 Format 164 Example 165 ftp_remap config 166 Format 166 Example 166 hos...

Страница 8: ...at 176 nntp_servers config 177 Format 177 Example 179 parent config 179 Format 180 Example 181 partition config 181 Format 182 Example 182 records config 182 Format 182 Example 183 Configuration variables 183 remap config 212 Format 212 Example 213 snmpd cnf 214 Format 214 Configuring trap destinations 215 Access control 215 socks config 216 Format 216 Example 216 splitdns config 217 Format 217 Ex...

Страница 9: ...rmats 224 Netscape Common logging formats 225 Netscape Extended logging formats 225 Netscape Extended 2 logging formats 225 F Traffic Server Error Messages 227 Traffic Server error messages 227 Traffic Server Notes 227 Traffic Server Process fatal 228 Traffic Server Warnings 228 Traffic Server alarm messages 229 HTML messages sent to clients 230 Standard HTTP response messages 232 Glossary 233 Ind...

Страница 10: ...virtual IP addressing from Traffic Manager 48 To enable disable virtual IP addressing manually 49 To add or edit virtual IP addresses from Traffic Manager 49 To add or edit virtual IP addresses manually 50 To enable the HTTP parent caching option from Traffic Manager 52 To enable HTTP parent caching manually 53 To identify an HTTP parent cache from Traffic Manager 53 To set ICP options from Traffi...

Страница 11: ...ctions 95 To set SSL termination configuration variables for Traffic Server origin server connections 97 To set log management options from Traffic Manager 100 To set log management options manually 100 To select a standard event log file format from Traffic Manager 101 To select a standard event log file format manually 102 To create traditional custom log formats 104 To generate XML based custom...

Страница 12: ...mes that you have experience in UNIX or Windows and Web server administration and that you are comfortable performing complex system configuration tasks such as partitioning and formatting disks setting up TCP IP ports and establishing DNS round robin services Conventions used in this manual This manual uses the following typographic conventions Preface Convention Purpose italics Represent emphasi...

Страница 13: ...e that improves network efficiency and performance by caching frequently accessed information at the edge of the network This brings content physically closer to end users for faster delivery and dramatically reduces bandwidth usage Traffic Server is designed to improve content delivery for enterprises Internet Service Providers ISPs backbone providers and large intranets by maximizing existing ba...

Страница 14: ... hierarchies where Internet requests not fulfilled in one cache can be routed to other regional caches taking advantage of the contents and proximity of nearby caches In a hierarchy of proxy servers Traffic Server can act either as a parent or child cache either to other Traffic Servers or to other caching products Traffic Server supports the standard Internet Cache Protocol ICP to interoperate wi...

Страница 15: ... to suit your needs The Adaptive Redirection Module ARM The Adaptive Redirection Module ARM is used in transparent proxy caching to redirect intercepted user requests destined for an origin server to the Traffic Server Before the traffic is redirected by the ARM it is intercepted by an L4 switch or router To redirect user requests to Traffic Server the ARM changes an incoming packet s address The ...

Страница 16: ...c_server process The traffic_manager process is also responsible for Traffic Manager the proxy auto configuration port the statistics interface cluster administration and virtual IP failover If the traffic_manager process detects a traffic_server process failure it instantly restarts the process but also maintains a connection queue of all incoming requests All incoming connections that arrive in ...

Страница 17: ...m Traffic Manager SNMP Network Management support lets you monitor and manage Traffic Server through SNMP network management facilities Traffic Server supports two management information bases MIBs MIB 2 a well known standard MIB and the HP proprietary Traffic Server MIB that provides more specific node and cluster information Traffic Manager alarms are presented in Traffic Manager Traffic Server ...

Страница 18: ...henticated by the LDAP server Traffic Server uses a local database to improve the performance of LDAP authentication and upon completion logs successfully authenticated users Secure connections in reverse proxy mode between a client and Traffic Server and Traffic Server and the origin server using the SSL termination option Control access to Traffic Manager using o SSL Secure Sockets Layer protect...

Страница 19: ...ss the appliance with the Telnet access user name and password entered during the appliance initial network configuration session you will be presented with a menu listing a number of configuration and maintenance tasks There are some Traffic Server configuration tasks that require shell access to the cache appliance file system and you will have to select shell access from the menu to complete th...

Страница 20: ... browser based user interface consisting of a series of web pages Traffic Manager provides a rich set of graphs and statistical displays for monitoring Traffic Server performance and network traffic plus a set of options for configuring and fine tuning your system All common Traffic Server configuration tasks should be performed using this UI You access Traffic Manager through your web browser To ...

Страница 21: ...nager starts by displaying the Monitor tab To display the Configure tab click the Configure tab to the right of the Monitor tab Using online help Both the Monitor and Configure tabs provide a Help button When you click the Help button the Traffic Server online help opens in another browser window The online help describes each page that opens when you click a button on the Monitor or Configure tab...

Страница 22: ...and Configure tabs To start a Traffic Line session 1 Telnet into the HP web cache appliance and select Shell Access as described in Overview of Access Methods on page 7 You are now ready to enter Traffic Line commands Traffic Line commands take the following form traffic_line flag argument 2 For a list of traffic_line commands enter traffic_line h 3 To enter Traffic Line interactive mode enter the...

Страница 23: ...t it is communicating with a proxy and explicit proxy caching where the user s client software must be configured to send requests directly to the traffic Server proxy A day in the life of a cache request Here is an overview of the steps that take place as a Traffic Server proxy cache serves a user request 1 Traffic Server receives a user request for a document image news article or other web obje...

Страница 24: ... limit and serves the object A new copy of the object is available Traffic Server caches the new object replacing the stale copy and serves the object to the user simultaneously The object no longer exists on the origin server Traffic Server does not serve the cached copy The origin server does not respond to the revalidation query The Traffic Server serves the stale object along with a 111 Revali...

Страница 25: ...affic Manager Minimum freshness information for a document to be cacheable is one of the configuration options under Freshness Default test For documents that do not have Expires headers or do not have both Last Modified and Date headers you can specify an absolute freshness limit in the Freshness section of the Configure Cache page Revalidate rules in the cache config file Revalidate rules apply ...

Страница 26: ...cts without Expires headers Evaluate the freshness of objects with Expires headers by first checking the Expires header and then checking Cache Control headers Evaluate freshness as follows 1 Use the Expires header test if applicable otherwise go to step 2 If the object is stale revalidate If it is fresh check the Cache Control headers 2 Use the Last Modified Date header test if applicable otherwi...

Страница 27: ... servers as well as configurable options in Traffic Manager and the cache config file Directive source Caching directives administration options Traffic Server has the following administration options for caching Configure Traffic Server not to cache objects with URLs containing the following cgi end in asp Configure Traffic Server not to cache objects served in response to the Cookie header Use n...

Страница 28: ... for HTTP concurrency at any given time The system logs the completion of all HTTP GET operations enabling you to monitor the performance of this feature News article caching Traffic Server can function as a news server or a caching news server This section provides background information about Traffic Server news server and the Network News Transfer Protocol NNTP caching features News also known ...

Страница 29: ...s subscription files Sends user postings to the parent news server When clients issue news requests Traffic Server intercepts these requests and serves them from its cache reducing traffic to parent news servers If a particular overview or article is not in the cache Traffic Server forwards requests to the parent server Supporting several parent news servers Traffic Server can cache articles for s...

Страница 30: ...d ports and network interfaces You can configure the interface from which to connect to a parent news server port You can also configure the port on the parent server to which Traffic Server connects Blocking particular groups You can block particular groups on specified news servers Clients do not see blocked groups in news server group lists You list all blocked groups in the nntp_servers config...

Страница 31: ...the Traffic Server s caching behavior for specific news groups see page 177 for more information You configure update frequencies in the Configure Protocols page of Traffic Manager Here are the available options Pull the overview information for specified groups For all groups designated as pullover the server will retrieve the overview database information using the OVER XOVER commands automatica...

Страница 32: ...se including PERL and C among others You can position them anywhere on the network connected by a secure tunnel if required Each time a user needs to be authenticated Traffic Server connects to the authentication server which is part of Traffic Server and runs the plugin CAUTION Taking a full feed is not recommended as the server will have no way to retrieve an article if it is lost for any reason...

Страница 33: ...able Traffic Server to obey cancel addgroup and rmgroup messages in the Configure Protocols page of Traffic Manager For example if you select Obey cancel control messages Traffic Server pulls cancel messages automatically in order to obey them Client bandwidth throttling You can limit the amount of bandwidth allotted to clients for downloading articles Clients that attempt to exceed the bandwidth ...

Страница 34: ...s these problem clients and servers dynamically and the ARM adaptively disables interception for these clients and servers passing their traffic unimpeded to the origin server Additionally clients and servers can be manually exempted from caching by configuring ARM See Interception bypass on page 28 for more information 4 Traffic Server receives and begins processing the intercepted client request...

Страница 35: ...ology In a complex network you must decide which clients are to be served transparently and make sure that Traffic Server is positioned to intercept their requests Traffic Server or routers or switches feeding Traffic Server are often deployed at a major artery or aggregation pipe to the Internet ARM is installed by default and must be activated to use transparency The section ARM redirection on p...

Страница 36: ...ing a WCCP enabled router for transparency Traffic Server supports WCCP 1 0 and WCCP 2 0 A WCCP 1 0 enabled router can send all port 80 HTTP traffic to Traffic Server as shown in Figure 4 2 below The Traffic Server ARM readdresses port 80 to Traffic Server s proxy port by default port 8080 Traffic Server processes the request as usual retrieving the requested document from the cache if it is a hit...

Страница 37: ...Telnet into the HP web cache appliance and select Shell Access as described in Overview of Access Methods on page 7 2 Open the records config file located in the Traffic Server s config directory with Vi 3 Set the following variable to 1 proxy config wccp enabled INT 1 4 Edit the following variable to specify the IP address of the WCCP router that is sending traffic proxy config wccp router_ip STR...

Страница 38: ... STRING IPaddress proxy config wccp2 router1_ip STRING IPaddress 9 Save and close the records config file 10 Run the command traffic_line x to apply the configuration changes ARM bypass and WCCP If Traffic Server has an ARM bypass rule discussed in Interception bypass on page 28 Traffic Server forwards particular client requests directly to the origin server bypassing the cache Bypassed requests a...

Страница 39: ...ures that all requests to a specific page on that origin server no matter which IP address is used are cached on the same node With full clustering objects are distributed among nodes according to their URLs WCCP distributes objects according to destination IP address If a particular IP address is receiving many requests WCCP load balancing may lead to a hot spot where all of that site s traffic i...

Страница 40: ... because many ISPs dynamically allocate client IP dial up addresses and more secure cryptographic protocols are now more often used Web proxies are common in corporate and Internet use so interoperability problems are extremely rare However in those rare cases Traffic Server contains an adaptive learning module that recognizes interoperability problems caused by transparent proxying and automatica...

Страница 41: ...er clients are not bypassed Bypass rules that are generated dynamically are purged after a Traffic Server restart If you want to preserve dynamically generated rules you can save a snapshot of Traffic Server s current set of bypass rules See Viewing the current set of bypass rules on page 32 Setting dynamic bypass rules By default Traffic Server is not configured to bypass the cache when it encoun...

Страница 42: ...able to 1 to enable dynamic source destination bypass when an origin server returns a 408 error proxy config arm bypass_use_and_rules_500 Set this variable to 1 to enable dynamic source destination bypass when an origin server returns a 500 error proxy config arm bypass_on_bad_client_request Set this variable to 1 to enable dynamic destination bypass in the event of non HTTP traffic on port 80 pro...

Страница 43: ...he variable proxy config arm bypass_on_403 to 1 Variable Description proxy process arm num_bypass_on_bad_client_request Displays the number of times Traffic Server bypassed the cache because it detected non HTTP traffic on port 80 proxy process arm num_bypass_on_400 Displays the number of times Traffic Server bypassed the cache because it detected an HTTP 400 error proxy process arm num_bypass_on_...

Страница 44: ...example you could route around specific client server pairs that experience broken IP authentication or out of band HTTP traffic problems when cached Source destination bypass rules might be preferable to destination rules because they block a destination server only for those particular users that experience problems To configure static bypass rules edit the bypass config file refer to bypass con...

Страница 45: ...ed to be the origin server the user is trying to connect to the origin server s advertised hostname resolves to Traffic Server which is acting as the real origin server Reverse proxy solutions There are many ways in which Traffic Server can be used as a reverse proxy Here are a few example scenarios You can use Traffic Server in reverse proxy mode to Off load heavily used origin servers Deliver co...

Страница 46: ...content is sensitive and not cacheable Traffic Server obtains the content from the origin server the firewall allows only Traffic Server access to the origin server The sensitive content resides on the origin server safely inside the firewall How does reverse proxy caching work When a browser makes a request it normally sends that request directly to the origin server When Traffic Server is in rev...

Страница 47: ...equest should be GET http real janes_books com index html HTTP 1 0 HOST real janes_books com To translate www janes_books com to real janes_books com Traffic Server needs a set of URL rewriting rules mapping rules Mapping rules are described in Using mapping rules on page 36 Generally you use reverse proxy mode to support more than one origin server In this case all of the advertised hostnames res...

Страница 48: ...ust be the same if no port is specified in a URL the default port for the scheme of the URL is used The path portion of the target URL must match a prefix of the request URL If Traffic Server finds a match it translates the request URL into the replacement URL listed in the map rule It sets the host and path of the request URL to match the replacement URL If the URL contains path prefixes Traffic ...

Страница 49: ...ct Shell Access as described in Overview of Access Methods on page 7 2 Open the remap config file located in the Traffic Server s config directory with Vi 3 Enter the mapping rules Each mapping rule must be on a separate line and must consist of three space delimited fields in the following format type target replacement The following table describes the format for each field Field Description typ...

Страница 50: ...ration file manually Both procedures are provided below To set reverse proxy options from Traffic Manager 1 Access Traffic Manager from your browser refer to Accessing Traffic Manager on page 8 2 On the Configure tab click the Routing button 3 Scroll to the Reverse Proxy section of the Routing page 4 Select the Reverse Proxy On button to enable HTTP reverse proxy mode Select the Reverse Proxy Off ...

Страница 51: ...want Traffic Server to translate the client host header proxy config url_remap remap_required Set this variable to 1 if you want Traffic Server to serve requests only from the origin servers listed in the mapping rules of the remap config file Set this variable to 0 zero if you want Traffic Server to serve requests from all origin servers proxy config header parse no_host_url_redirect Enter the UR...

Страница 52: ...le located in the Traffic Server s config directory with Vi 3 Enter one mapping rule per line in the following format Traffic_Server_ipaddress port ftp_Server_ipaddress port where Traffic_Server_ipaddress is the IP address assigned to Traffic Server and ftp_Server_ipaddress is the IP address assigned to the FTP server to which you want to redirect the FTP requests 4 Save and close the ftp_remap co...

Страница 53: ...raffic Server to process FTP requests proxy config ftp reverse_ftp_enabled Set this variable to 1 to enable the FTP reverse proxy option Set this variable to 0 zero to disable the FTP reverse proxy option NOTE If this variable is set to 0 but the proxy config ftp ftp_enabled variable described above is set to 1 Traffic Server will serve FTP requests in forward proxy mode Variable Description proxy...

Страница 54: ...istening port when sending a PORT to the FTP server proxy config ftp try_server_ctrl_connect_times Set this variable to specify the maximum number of times Traffic Server can try to connect to the FTP server s control listening port proxy config ftp try_server_data_connect_times Set this variable to specify the maximum number of times Traffic Server can try to connect to the FTP server s data list...

Страница 55: ...rol connections among multiple anonymous FTP clients Set this variable to 0 zero to disable sharing of server control connections among multiple anonymous FTP clients proxy config ftp server_ctrl_keep_alive_no_ activity_timeout Set this variable to specify the timeout value when the FTP server control connection is not used by any FTP clients proxy config ftp login_info_fresh_in_cache_time Set thi...

Страница 56: ...llowing example permanently redirects all HTTP requests for www hp to www hp2 com redirect http www hp com http www hp2 com 4 Save and close the remap config file 5 Run the following command to apply the configuration changes traffic_line x Field Description type Enter either one of the following redirect redirects HTTP requests permanently without having to contact the origin server redirect_temp...

Страница 57: ...s a multicast management protocol to provide a single system image of your Traffic Server cluster Information about cluster membership configuration and exceptions is shared across all nodes and the traffic_manager process automatically propagates configuration changes to all the nodes Full clustering In full clustering mode as well as sharing configuration information a Traffic Server cluster dis...

Страница 58: ...ation information to the newcomer This provides a convenient way to bootstrap new machines If you have an existing web cache appliance installed and you want to add that appliance to the cluster you do not have to re install the Traffic Server software on the node Instead you can edit certain configuration variables on the existing Traffic Server Follow the procedure below To add a cache appliance...

Страница 59: ... the Traffic Server cluster Variable Description proxy config cluster type Set this variable to 1 for full clustering mode 2 for management only mode Clustering modes are described in Understanding Traffic Server clusters on page 45 proxy config proxy_name Set this variable to the name of Traffic Server cluster All nodes in a cluster must use the same name proxy config cluster mc_group_addr Set th...

Страница 60: ...p your user base to use a DNS round robin pointing at virtual IP addresses as opposed to using the real IP addresses of the traffic server machines Because virtual IP addresses are not bound to machines a Traffic Server cluster can steal addresses from inactive traffic server nodes and distribute those addresses among the remaining live nodes Using a proprietary management protocol Traffic Server ...

Страница 61: ...g virtual IP addresses from Traffic Manager or by editing a configuration file manually Virtual IP addresses must be reserved like all IP addresses before they can be assigned to Traffic Server To add or edit virtual IP addresses from Traffic Manager 1 Access Traffic Manager from your browser refer to Accessing Traffic Manager on page 8 2 On the Configure tab click the Server button 3 Scroll to th...

Страница 62: ...select Shell Access as described in Overview of Access Methods on page 7 2 Open the vaddrs config file located in the Traffic Server s config directory with Vi 3 To delete or modify existing virtual IP addresses delete or edit the line that contains the IP address 4 To add new virtual IP addresses Enter one virtual IP address per line using the following format IP address device sub interface wher...

Страница 63: ...che which itself can search other caches before resorting to retrieving the object from the origin server You can configure a Traffic Server node to use one or more HTTP parent caches You use more than one HTTP parent cache so that if one parent is unavailable another parent can service requests This is called parent failover and is described in Chapter Parent failover below Figure 7 1 illustrates...

Страница 64: ...ble the HTTP parent caching option described in Chapter Enabling the HTTP parent caching option below Identify the HTTP parent cache s you want to use to service missed requests described in Identifying HTTP parent caches on page 53 Enabling the HTTP parent caching option You can enable the HTTP parent caching option by using Traffic Manager or by editing a configuration file manually Both procedu...

Страница 65: ... a parent cache is unavailable requests are sent to another parent cache You can identify parent caches by using Traffic Manager or by setting proxy rules in the parent configuration file parent config To set parent proxy rules refer to parent config on page 179 To identify an HTTP parent cache from Traffic Manager 1 Access Traffic Manager from your browser refer to Accessing Traffic Manager on pa...

Страница 66: ... Server can receive ICP messages only or both send and receive ICP messages o Determine if Traffic Server can send messages directly to each ICP peer or send a single message on a specified multicast channel o Specify the port used for ICP messages o Set the ICP query timeout Identify the ICP peers with which Traffic Server can communicate You can set ICP options and identify ICP peers by using Tr...

Страница 67: ... The default is 3130 6 Select ICP Multicast enabled On to send ICP messages through multicast if your Traffic Server has a multicast channel connection to its ICP peers 7 In the ICP Query Timeout field enter the timeout for ICP queries The default is 2 seconds 8 Click the Make These Changes button To set ICP options manually 1 Telnet into the HP web cache appliance and select Shell Access as descr...

Страница 68: ...the ICP section of the Routing page 4 Click the ICP Peers link The Configure ICP Peers page opens shown below 5 In the Hostname field enter the host name of the ICP peer The host name is required only if you do not specify the IP address in the Host IP field described below 6 In the Host IP field enter the IP address of the ICP peer proxy config icp multicast_enabled Set this variable to 0 to disa...

Страница 69: ...e first hop subnet 13 Click the Add button 14 Click the Make These Changes button To identify an ICP peer manually 1 Telnet into the HP web cache appliance and select Shell Access as described in Overview of Access Methods on page 7 2 Open the icp config file located in Traffic Server s config directory with Vi 3 For each ICP peer you want to identify enter a separate line in the configuration fil...

Страница 70: ...line x MC_IP Specifies the multicast IP address MC_TTL Specifies one of the following options 1 if you do not want IP multicast datagrams to be forwarded beyond a single subnetwork 2 to allow delivery of IP multicast datagrams to more than one subnet if there are one or more multicast routers attached to the first hop subnet Field Description ...

Страница 71: ...ilures on any of the cache disks If the disk fails completely Traffic Server marks the entire disk as corrupt and continues using the remaining disks An alarm is sent to Traffic Manager indicating which disk failed If all of the cache disks fail Traffic Server goes into proxy only mode You can perform the following cache configuration tasks Change the total amount of disk space allocated to the ca...

Страница 72: ...st multiple of 128 MB Each partition is striped across several disks to achieve parallel I O For example if there are 4 disks a 1 GB partition will have 256 MB on each disk assuming each disk has enough free space available 5 Save and close the partition config file 6 Restart Traffic Server with the start_traffic_server command Making changes to partition sizes and protocols After you have configu...

Страница 73: ...ve separate partitions One HTTP based partition for each origin server one streaming media based partition for each origin server and a generic partition for all other origin servers not listed the partitions do not have to be the same size 2 Telnet into the HP web cache appliance and select Shell Access as described in Overview of Access Methods on page 7 3 Open the hosting config file located in...

Страница 74: ... apply the configuration changes traffic_line x 8 Restart the traffic server with the command start_traffic_server Clearing the cache When you clear the cache you remove all data from the entire cache You should clear the cache before performing certain cache configuration tasks such as partitioning To clear the cache 1 Stop the Traffic Server using the command stop_traffic_server 2 Enter the foll...

Страница 75: ...ethod of viewing Traffic Server performance and network traffic information The statistics are the same as those you see from Traffic Manager Refer to Viewing Statistics from Traffic Line on page 68 The MRTG Multi Router Traffic Grapher tool provides a variety of graphs that show Traffic Server performance and network traffic information Refer to Using MRTG on page 70 SNMP Simple Network Managemen...

Страница 76: ...ver system displaying all cluster nodes by name and tracking essential statistics for each node If you want to display detailed information about a particular node you can click the node s name on the Dashboard and then click on one of the other buttons on the Monitor tab NOTE Use the SSL https command to reach Traffic Manager only if you have restricted access to Traffic Manager via SSL connectio...

Страница 77: ...nformation such as the document hit rate the bandwidth savings and what percentage of the cache is currently free The number of client and server connections currently open and the number of transfers currently in progress Network information such as the client throughput in Mbits per second and the number of transactions being processed per second Name resolution information such as the host data...

Страница 78: ...rsion 1 0 or 2 0 statistics that include information about the routers being used the number of active nodes the leader s IP address and whether WCCP is currently enabled on the Traffic Server node The Cache button Click the Cache button to view the following statistics about the Traffic Server s cache The amount of space in the cache currently being used and the maximum cache size in GB The total...

Страница 79: ...on the Dashboard in Traffic Manager Click the red alarm button to view alarm messages Figure 9 2 shows the red alarm button on the Dashboard Figure 9 2 Alarms on the Dashboard Resolving alarms After you have read an alarm message you can click the Resolve button in the alarm message window to tell Traffic Server that you have been informed of the problem and to dismiss the alarm Traffic Server ala...

Страница 80: ...istics related to the cache A single statistic about a node or a cluster for example the number of objects served from the cache In addition to viewing statistics you can also configure a Traffic Server from Traffic Line and use batch mode commands to stop and restart a Traffic Server system Refer to Configuring Traffic Server using Traffic Line on page 76 and Appendix C Traffic Line Commands View...

Страница 81: ... session enter exit at the prompt and press Return Retrieving individual statistics You can view specific information about a Traffic Server node or cluster by specifying the variable that corresponds to the statistic you want to see Using this method you see only the information you want to obtain instead of seeing a group of related statistics To retrieve a single statistic 1 Telnet into the HP ...

Страница 82: ...nager on page 8 2 If your Traffic Server node is in a cluster choose the Traffic Server node whose statistics you want to view from the Dashboard on the Monitor tab 3 On the Monitor tab click the MRTG button The MRTG index page opens The figure below shows the MRTG Index page Navigating MRTG The MRTG index page shows a subset of the graphs available for display Click on a graph to see daily weekly...

Страница 83: ...fic hosts Enabling SNMP Traffic Server s SNMP agent must be enabled so that SNMP managers can access the MIBs and gather information You can enable the SNMP agent by using Traffic Manager or by editing a configuration file manually Both procedures are provided below To enable the SNMP agent from Traffic Manager 1 Access Traffic Manager from your browser refer to Accessing Traffic Manager on page 8...

Страница 84: ... config file 5 Run the following command to apply the configuration changes traffic_line x Configuring SNMP trap destinations To configure SNMP trap destinations edit the snmpd cnf file located in Traffic Server s config directory Refer to snmpd cnf on page 214 ...

Страница 85: ...pe one of the following locations in your browser Standard http nodename adminport SSL https nodename adminport where nodename is the name of the web cache appliance and adminport is the number assigned to Traffic Manager port which is port 8081 by default Traffic Manager starts by default in Monitor mode 3 Click the Configure tab to display the Configure mode buttons shown below 10 Configuring Tr...

Страница 86: ...Traffic Manager port and edit the refresh rate for the statistics displayed in Monitor mode Configure the use of virtual IP addresses Auto configure browsers to connect to Traffic Server as a proxy server Restrict the number of network connections Traffic Server will accept this is called throttling Configure the way Traffic Server handles overload conditions in transparency mode load shedding Ena...

Страница 87: ...sk partitions allotted to cache storage and their sizes Configure HTTP and FTP object freshness options Configure variable content options The Security button Click the Security button to view or change Traffic Server s security options You can Configure access to Traffic Manager by setting an administrator ID and password and creating administrator accounts Configure Traffic Server integration in...

Страница 88: ...g web content filtering user authentication and data transformation The Content button Click the Content button to view or change the list of objects that Traffic Server is scheduled to update automatically in the local cache You can instruct Traffic Server to explicitly preload objects in to the cache thereby increasing Traffic Server performance Configuring Traffic Server using Traffic Line You ...

Страница 89: ... prompt enter the number that corresponds to the type of configuration you want to change then press Return For example to change protocol configuration enter 2 at the prompt Each command displays a sub level of commands that group specific configuration variables together For example the Protocols command 2 displays the following sub level of commands display http ftp and nntp 3 To view a group o...

Страница 90: ...vity timeout option to 200 seconds enter the following command at the prompt and press Return traffic_line s proxy config ftp control_connection_timeout v 200 Configuring Traffic Server using configuration files As an alternative to using Traffic Manager or Traffic Line you can change Traffic Server configuration options by manually editing specific variables in the records config file The records...

Страница 91: ... file In addition to the records config file Traffic Server provides other configuration files that are used to configure specific features All the configuration files are described in Appendix D Configuration Files The variable value that you can edit The variable type an integer INT a string or a floating point FLOAT The variable name ...

Страница 92: ... the Traffic Server machine ARM security on page 81 Control and secure access to Traffic Manager using o Administrator accounts refer to Setting the administrator ID and password on page 83 and Creating a list of administrator accounts on page 85 o An access control list that defines which hosts are allowed to access Traffic Manager refer to Controlling host access to Traffic Manager on page 86 o ...

Страница 93: ...guration changes Controlling host access to the Traffic Server machine ARM security For security reasons you might want to restrict the type of communication possible with machines running Traffic Server Using Traffic Server s ARM security option you can create an access control list that is used to either allow or deny other hosts from communicating with the Traffic Server machine on specific por...

Страница 94: ... may also want to open the NFS and DNS ports if required The following example rules specify that ports 119 23 and 554 are to remain open for TCP communication and that hosts 1 1 1 1 through 1 1 1 7 are allowed access to destination port 80 However the host 11 11 11 11 is denied access to destination port 80 open tcp ports 119 23 554 allow tcp dport 80 src 1 1 1 1 1 1 1 7 deny tcp dport 80 11 11 1...

Страница 95: ...g a list of administrator accounts on page 85 Create an access control list of IP addresses that defines which machines can access Traffic Manager See Controlling host access to Traffic Manager on page 86 Use SSL for secure administration see Using SSL for secure administration on page 87 Setting the administrator ID and password During the initial web cache appliance configuration an Administrato...

Страница 96: ...new password in the boxes provided If you have forgotten the current administrator password refer to If you forget the administrator password below 6 Click the Make These Changes button to apply the configuration changes If you forget the administrator password If you forget the administrator password and cannot access Traffic Manager you can clear the current password in the records config file s...

Страница 97: ... Creating a list of administrator accounts If a single administrator ID and password for Traffic Manager is not sufficient security for your needs you can create a list of administrator accounts that define who has access to Traffic Manager and which activities they can perform You can use administrator accounts in addition to using the administrator ID and password To create a list of administrat...

Страница 98: ...ks user names and passwords only if this option is enabled 13 Click the Make These Changes button Controlling host access to Traffic Manager In addition to using an administrator ID and accounts you can control which hosts have access to Traffic Manager To control which hosts can access Traffic Manager 1 Telnet into the HP web cache appliance and select Shell Access as described in Overview of Acc...

Страница 99: ...of the certificate Enabling SSL After you have obtained an SSL certificate you can enable SSL by using Traffic Manager or by editing a configuration file manually Both procedures are provided below To enable SSL from Traffic Manager 1 Access Traffic Manager from your browser refer to Accessing Traffic Manager on page 8 2 On the Configure tab click the Security button The Security page opens displa...

Страница 100: ...o access Traffic Manager from your browser using SSL use the https command as shown below https nodename adminport where nodename is the hostname of the Traffic Server node and adminport is the port number assigned to Traffic Manager port the default port number is 8081 ...

Страница 101: ...r then relays the data to the origin server The origin server then sends the content back to Traffic Server through the SOCKS server Traffic Server caches the content and sends it to the client Setting SOCKS configuration options To configure your Traffic Server to use a SOCKS firewall you must Enable the SOCKS option Specify the IP address of your SOCKS server and the communication port As an opt...

Страница 102: ...8 Click the SOCKS List link to specify the IP address of any origin server that you want to access directly without going through the SOCKS server 9 On the Socks List page click the Add Entry button to open the Add Entry dialog box shown below Currently the only selection in the Directive drop down list box is no_socks This specifies that Traffic Server will access the origin server or group of se...

Страница 103: ...nal network while allowing DNS servers outside of the firewall to resolve hosts on the internet This maintains the security of your intranet while continuing to provide direct access to sites outside your organization You specify the rules for performing DNS server selection also called split DNS in the splitdns config file Traffic Server enables you to specify this selection based on the destinat...

Страница 104: ...ocated in Traffic Server s config directory with Vi 3 Edit the following variables 4 Save and close the records config file 5 Restart Traffic Server with the command start_traffic_server Configuring LDAP Authentication Bypass You can enable Traffic Server clients to access specific sites on the Internet without being authenticated by the LDAP server To enable clients to access specific sites witho...

Страница 105: ... termination option To enable and configure SSL termination for client Traffic Server connections follow the procedures in Client and Traffic Server connections below To enable and configure SSL termination for Traffic Server origin server connections refer to Traffic Server and origin server connections on page 96 To enable and configure SSL termination for both client Traffic Server and Traffic ...

Страница 106: ...nd other Traffic Server options that have been set for example rules in the ip_allow config file and LDAP based proxy authentication o Specify the file name and location of the Traffic Server s private key if the private key is not located in the server certificate file Traffic Server uses its private key during the SSL handshake to decrypt the session encryption keys The private key must be store...

Страница 107: ...required The client must be authenticated during the SSL handshake Clients without a certificate are not allowed to access Traffic Server proxy config ssl server cert filename Set this variable to specify the file name of Traffic Server s SSL server certificate Traffic Server provides a demo server certificate called server pem You can use this certificate to verify that the SSL feature is working...

Страница 108: ...lient certificate file Traffic Server uses its private key during the SSL handshake to decrypt the session encryption keys The private key must be stored and protected against theft o Configure the use of CAs You must use a CA if you choose not to use a client certificate otherwise security on your system may be compromised CAs allows the Traffic Server that is acting as a client to verify the ide...

Страница 109: ...nstalled an SSL client certificate on Traffic Server set this variable to specify the file name of client certificate proxy config ssl client cert path If you have installed an SSL client certificate on Traffic Server set this variable to specify the location of the client certificate The default directory is Traffic Server s config directory proxy config ssl client private_key filename Set this v...

Страница 110: ...d page on page 120 for details All system information messages are logged with the system wide logging facility message under the daemon facility The syslog conf configuration file stored in the etc directory specifies where these messages are logged A typical location is var log messages Since the messages process works on a system wide basis it serves as the single repository for messages from a...

Страница 111: ...eparate log files for different protocols based on the host See Splitting event log files on page 112 Collate log files from different Traffic Server nodes You can designate one or more nodes on the network to serve as log collation servers These servers which may either be stand alone or part of Traffic Server enable you to keep all logged information in well defined locations See Collating event...

Страница 112: ...ompress the logs and move them to an archive location or simply delete them Setting log file management options You can set log management options by using Traffic Manager or by editing a configuration file manually Both procedures are provided below To set log management options from Traffic Manager 1 Access Traffic Manager from your browser refer to Accessing Traffic Manager on page 8 2 On the C...

Страница 113: ... optimizations in collecting and formatting the data since it knows what data will be needed and in what format It is faster to use the standard log file formats instead of the custom log file formats In addition the Squid format is faster to process than the Netscape formats By default Traffic Server is configured to use the Squid log file format only Setting standard log file format options You ...

Страница 114: ...ile format manually 1 Telnet into the HP web cache appliance and select Shell Access as described in Overview of Access Methods on page 7 2 Open the records config file located in the Traffic Server s config directory with Vi 3 To use the Squid format edit the following variables Variable Description proxy config log2 squid_log_enabled Set this variable to 1 to enable the Squid log file format pro...

Страница 115: ...e to 0 to enable binary mode proxy config log2 common_log_name Enter the name you want to use for Netscape Common event log files The default is common proxy config log2 common_log_header Enter the header text you want to display at the top of the Netscape Common log files Variable Description proxy config log2 extended_log_enabled Set this variable to 1 to enable the Netscape Extended log file fo...

Страница 116: ...net into the HP web cache appliance and select Shell Access as described in Overview of Access Methods on page 7 8 Open the logs config file with Vi 9 To add a traditional custom log specification enter a line in the logs config file with the following format format enable_flag format_id format_name string file_name type header Specify values for the fields NOTE Each line in the logs config file p...

Страница 117: ...es three types of objects to create custom log files The LogFormat object defines the content of the log file using printf style format strings The LogFilter object defines a filter so that you include or exclude certain information from the log file The LogObject object specifies all the information needed to produce a log file For example o The name of the log file required o The format to be us...

Страница 118: ...y default this is logs_xml config located in the config directory 11 Save and close the records config file 12 Open the logs_xml config file with Vi 13 Add LogFormat LogFilter and LogObject specifications to the configuration file For detailed information about the logs_xml config file and associated object specifications see logs_xml config on page 171 14 Save and close the logs_xml config file 1...

Страница 119: ...as follows LogFormat Name summary Format operator field operator field Interval n Format where operator is one of the five aggregate operators COUNT SUM AVERAGE FIRST LAST You can specify more than one operator in the format line field is the logging field that you want to aggregate n is the interval in seconds between summary log entries For more information see logs_xml config on page 171 For ex...

Страница 120: ...ect Binary or ASCII in the Standard Event Log Formats section of the Logging page refer to Setting standard log file format options on page 101 For custom log formats refer to Using traditional custom formats on page 104 Before selecting ASCII versus binary for your log files consider the type of data that will be logged Try logging for one day using ASCII and then one day using binary Assuming th...

Страница 121: ...and run log analysis programs You should roll log files several times a day Rolling every 6 hours is a good guideline to follow Rolled log file name format Traffic Server provides a consistent name format for rolled log files that allows you to easily identify log files When Traffic Server rolls a log file it saves and closes the old file and starts a new file The old file is renamed to include Th...

Страница 122: ... a log file are always between the two time stamps Log files do not contain overlapping entries even if successive time stamps appear to overlap Rolling intervals Log files are rolled at specific intervals relative to a given hour of the day Two options control when log files are rolled The rolling interval The offset hour which is an hour between 0 midnight and 23 For example if the rolling inter...

Страница 123: ... headroom specified in the Log Management section of the Logging page 8 Click the Make These Changes button To set log file rolling options manually 1 Telnet into the HP web cache appliance and select Shell Access as described in Overview of Access Methods on page 7 2 Open the records config file located in the Traffic Server s config directory with Vi 3 Edit the following variables 4 Save and clo...

Страница 124: ...Traffic Server records all ICP transactions in the same log file as HTTP and FTP transactions HTTP host log splitting HTTP host log splitting enables you to record HTTP FTP transactions for different origin servers in separate log files When HTTP host log splitting is enabled Traffic Server creates a separate log file for each origin server listed in the log_hosts config file When NNTP ICP and hos...

Страница 125: ...tting On button to record all NNTP transactions in a separate log file Click the NNTP Log Splitting Off button to record all NNTP transactions in the same log file as HTTP FTP transactions 5 Click the ICP Log Splitting On button to record all ICP transactions in a separate log file Click the ICP Log Splitting Off button to record all ICP transactions in the same log file as HTTP FTP transactions 6...

Страница 126: ...lose the log_hosts config file 5 Run the command traffic_line x to apply the configuration changes records config Variable Description proxy config log2 separate_icp_logs Set this variable to 1 to record all ICP transactions in a separate log file Set this variable to 0 to record all ICP transactions in the same log file as HTTP FTP transactions proxy config log2 separate_nntp_logs Set this variab...

Страница 127: ...erver When the log collation server receives a log buffer from a client it writes it to its own log file as if it were generated locally See Figure 12 1 Figure 12 1 Log collation If log clients cannot contact their log collation server they write their log buffers to their local disks into orphan log files Orphan log files require manual collation See Figure 12 2 Figure 12 2 Orphan log files hold ...

Страница 128: ...ssing Traffic Manager on page 8 2 On the Configure tab click the Logging button 3 Scroll to the Log Collation section of the Logging page shown below 4 Click the Be a collation host button 5 In the Log Collation port field enter the port number that all nodes in a cluster must use to exchange event log entries The default port number is 8085 6 In the Log Collation secret field enter the password u...

Страница 129: ...log entries The default port number is 8085 7 In the Log Collation secret field enter the password used to validate logging data and prevent the exchange of arbitrary information This must be the same secret you set on the collation server 8 In the Log collation host tagged field select Yes if you want to preserve the origin of log entries in the collated log files 9 In the Log space limit for orp...

Страница 130: ... config file from a Traffic Server installation to a directory on the stand alone collator records config Variable Description proxy config log2 collation_host Specify the collation server s hostname proxy config log2 collation_host_tagged Set this variable to 1 if you want the hostname of the collation client that generated the log entry to be included in each entry Set this variable to 0 if you ...

Страница 131: ... line logclean m filename This command collates records from the orphan file into your central log files 3 Delete orphan log files from your local disks Viewing logging statistics Traffic Server generates the following statistics about the logging system that help you see How many log files formats are currently being written The current amount of space being used by the logging directory which co...

Страница 132: ... cluster problem Objects Served The total number of objects served by the node Transactions per second The number of transactions per second processed by the node More Detail Cache Hit Rate The percentage of HTTP requests served from the cache averaged over the past 10 seconds This value is refreshed every 10 seconds Cache Hit Rate Fresh The percentage of HTTP requests for fresh objects in the cac...

Страница 133: ... a cluster display at the bottom of the More Detail page Statistic Description Cache Document Hit Rate The ratio of cache hits to total cache requests averaged over 10 seconds This value is refreshed every 10 seconds Bandwidth Savings The ratio of bytes served from the cache to total requested bytes averaged over 10 seconds This value is refreshed every 10 seconds Cache Percent Free The ratio of c...

Страница 134: ...client aborted transactions and their average transaction times Questionable Client Aborts The percentage of transactions that could possibly be client aborted and their average transaction times Partial Request Hangups The percentage of early hangups after partial requests and their average transaction times Pre Request Hangups The percentage of pre request hangups and their average transaction t...

Страница 135: ...on demand as opposed to an overview pull Group Hits The number of group hits since installation Group Refreshes The number of group refreshes since installation Posts The number of article posts since installation Post Bytes The amount of news data posted since installation Pull Bytes The amount of article and overview data pulled since installation Feed Bytes The amount of NNTP data received thro...

Страница 136: ...rtbeats received from the router WCCP 1 0 Protocol Statistics Enabled Indicates if WCCP is enabled on this node Leader s IP address The IP address of the leader node Number of active nodes The number of active nodes in the WCCP cache farm WCCP 2 0 Configuration Information Security Enabled Indicates if WCCP security is enabled Multicast Enabled Indicates if multicast mode is enabled Multicast Addr...

Страница 137: ...d 1 is used for NNTP Leader s IP The IP address of the leader node in the WCCP cache farm Number of Caches The number of nodes in the WCCP cache farm Number of Routers The number of WCCP routers sending traffic to the Traffic Server Router 0 IP address Router 1 IP address The IP address of the router sending traffic to the Traffic Server If there is more than one router sending traffic the IP addr...

Страница 138: ...ic Server revalidates a document finds it to be deleted on the origin server and deletes it from the cache includes NNTP HTTP and FTP removes Successes The number of successful cache removes completed since installation includes NNTP HTTP and FTP removes Failures The number of cache remove failures since installation includes NNTP HTTP and FTP removes Statistic Description Host DataBase Total Look...

Страница 139: ... SOCKS server since installation Connections in progress The number of SOCKS connections in progress Logging Currently Open Log Files The number of event log files formats that are currently being written Space Used For Log Files The current amount of space being used by the logging directory which contains all of the event and error logs Number of Access Events Logged The current number of access...

Страница 140: ...lly the traffic_server process should remain on However you must turn the Traffic Server off before performing certain maintenance tasks Traffic Server Name Displays the hostname of your Traffic Server or the hostnames of all the nodes in a cluster Traffic Server Port Specifies the port number by which all browsers can connect to the proxy process that runs on the Traffic Server system The port mu...

Страница 141: ...rate in Monitor mode Select a refresh rate for the statistics displayed on Traffic Manager s Monitor tab Virtual IP Addressing Virtual IP on off Set virtual IP addressing on or off CAUTION If virtual IP addressing is disabled Traffic Server nodes cannot cover each other s failures Edit virtual IP addresses Click this link to edit your list of virtual IP addresses first assigned when you installed ...

Страница 142: ... mibs directory The Traffic Server MIB contains both node specific and cluster wide information You should configure your system so that only certain hosts can access these MIBs Configure access control and SNMP trap destinations in the snmpd cnf file in Traffic Server s config directory See snmpd cnf on page 214 Customizable Response Pages Traffic Server should suppress generated response pages I...

Страница 143: ...ut period you specify If the client does not make another request before the timeout expires the Traffic Server closes the connection If the client does make another request the timeout period starts over NOTE The client can close the connection at any time Keep Alive Timeout Outbound Specifies how long the Traffic Server should keep connections to origin servers open for a subsequent transfer of ...

Страница 144: ...move Client ip Select Remove Client ip to remove client IP addresses from headers for more privacy NNTP NNTP Server on off Enables the Traffic Server to cache and serve news articles NOTE After turning NNTP on or off you must restart the Traffic Server cluster to effect the change NNTP Server Port Specifies the port that the Traffic Server uses for serving NNTP requests The default port is 119 NOT...

Страница 145: ...all non feed news groups the Traffic Server actively polls parent NNTP servers for cancelled articles See the Check for Cancelled Articles option below NNTP option Obey Newgroups Control Messages Configures Traffic Server to obey newgroup control messages NOTE Traffic Server actively polls parent NNTP servers for new groups see the Check for New Groups option below NNTP option Obey Rmgroups Contro...

Страница 146: ...ed HTTPS Restrict SSL connections to ports Configures Traffic server to restrict SSL connections to certain ports thereby containing attacks to designated ports FTP FTP connection mode An FTP transfer requires two connections a control connection to inform the FTP server of a request for data and a data connection to send the data The Traffic Server always initiates the control connection FTP mode...

Страница 147: ...ch request In particular some URLs can have large numbers of alternates due to cookies If Traffic Server is set to vary on cookies you might encounter this problem View cache storage configuration Click this link to see a list of the files or hard disk partitions allotted to cache storage and their sizes NOTE Raw partitions may not have an associated size Freshness Verify freshness by checking Con...

Страница 148: ...ain a question mark a semi colon cgi or end in asp Enable Alternates Configures Traffic Server to cache alternate versions of HTTP documents Vary on these HTTP header fields Using document header information Traffic Server can compare cached document specifications against requested specifications to determine if the correct alternate version of the document is in the cache For example a document ...

Страница 149: ... config file and then enter a new password in this field Setting the password variable to NULL in the configuration file means that a password is not needed to access Traffic Manager You cannot set passwords in the records config file because the password variables can only contain password encryptions or NULL Additional Users Click this link to create a list of administrator accounts that defines...

Страница 150: ... Traffic Server at a parent network cache either another Traffic Server or a different caching product to form a cache hierarchy where a child cache relies upon a parent cache in fulfilling client requests Parent Cache Specifies the identify a parent cache and parent cache port using the following format parent_name port_number The port must be dedicated If the Traffic Server cannot find a request...

Страница 151: ...rules Redirect requests without Host header to URL Specifies an alternate URL to which to direct incoming requests from older clients that do not provide a Host header The best solution is to set this option to a page that explains the situation to the user and advises a browser upgrade or provides a link directly to the origin server bypassing the Traffic Server Alternatively you can specify a ma...

Страница 152: ...lve hostnames whenever clients reload pages DNS Configuration Resolve attempt timeout Specifies how long the Traffic Server must wait for the DNS server to respond with an IP address even if the client request has been cancelled NOTE If the client abandons the request before this timeout expires the Traffic Server can still obtain the host s IP address in order to cache it The next time a client m...

Страница 153: ...Server to be a log collation client Selecting this option instructs Traffic Server to send traditional custom formats to the specified host You must enter the name of this collation server for your cluster in the to collation host field Traditional custom formats are specified using the logs config file For more information see Using custom formats on page 103 Send standard and custom non xml form...

Страница 154: ...ng the Traditional option instructs Traffic Server to look to the logs config file in the config directory for custom log formats For more information see Using custom formats on page 103 Selecting XML instructs Traffic Server to look to the logs_xml config file for highly configurable custom log formats For more information see Using custom formats on page 103 Log File Rolling Rolling enabled On ...

Страница 155: ...pshot button The name cannot contain a forward slash NOTE It is a good idea to take a snapshot before performing system maintenance or attempting to tune system performance Taking a snapshot only takes a few seconds and it can save you hours of correcting configuration mistakes Restore Snapshot Restores a previously created snapshot so that you can return to a set of configuration values you saved...

Страница 156: ...tly you must manually stop and restart the Traffic Server process The Add Entry page contains the following options URL HTTP and FTP based URLs The system validates the syntax of the URL but does not confirm its existence Request Headers Optional A semicolon separated list of headers passed in each GET request You can define any request header that conforms to the HTTP specification The default is...

Страница 157: ...or Traffic Line and Traffic Manager communication The default path is install_dir config cli traffic_line r variable Displays specific performance statistics or a current configuration setting For a list of the variables you can specify refer to Traffic Line variables on page 147 traffic_line s variable v value Sets configuration variables variable is the configuration variable you want to change ...

Страница 158: ...ic Server performance and network traffic statistics Refer to Chapter 9 Monitoring Traffic 2 configure Displays the Configure mode commands so that you can configure the Traffic Server system Refer to Chapter 10 Configuring Traffic Server 3 reread Re reads the configuration files NOTE Some configuration changes require that you initiate a configuration re read for the changes to take effect 4 shut...

Страница 159: ...e Objects Served proxy node user_agents_total_documents_served Transactions per second proxy node user_agent__exacts_per_second Node Cache Document Hit Rate proxy node cache_hit_ratio_avg_10s proxy cluster cache_hit_ratio_avg_10s Bandwidth Savings proxy node bandwidth_hit_ratio_avg_10s proxy cluster bandwidth_hit_ratio_avg_10s Cache percent free proxy node cache percent_free proxy cluster cache pe...

Страница 160: ...ul_pasv Unsuccessful PASV Connections proxy process ftp connections_failed_pasv Successful PORT Connections proxy process ftp connections_successful_port Unsuccessful PORT Connections proxy process ftp connections_failed_port ICP Queries originating from this node Query requests proxy process icp icp_query_requests Query messages sent proxy process icp total_udp_send_queries Peer hit messages rece...

Страница 161: ...y process nntp pull_bytes Feed Bytes proxy process nntp feed_bytes WCCP Router statistics Router s IP address proxy node wccp router_ip Router status proxy node wccp router_status WCCP Node statistics Node IP address proxy node wccp my ip Percentage of traffic received proxy node wccp my_share Number of heartbeats proxy node wccp hbeats_received WCCP Protocol statistics Enabled proxy node wccp ena...

Страница 162: ...rocess dns lookup_successes Cluster Bytes Read proxy process cluster read_bytes Bytes Written proxy process cluster write_bytes Connections Open proxy process cluster connections_open Total Operations proxy process cluster connections_opened Network Backups proxy process cluster net_backup Clustering Nodes proxy process cluster nodes SOCKS Connections Unsuccessful proxy process socks connections_u...

Страница 163: ... Monitor mode proxy config admin ui_refresh_rate Virtual IP Addressing Virtual IP proxy config vmap enabled 1 Enable 0 Disable Auto Configuration Auto configuration Port proxy config admin autoconf_port Throttling of Network Connections Maximum Number of Connections proxy config net connections_throttle SNMP SNMP Master Agent proxy config snmp master_agent_enabled 1 Enable 0 Disable Customizable R...

Страница 164: ...proxy config http anonymize_remove_referer proxy config http anonymize_remove_user_agent proxy config http anonymize_remove_cookie 1 Yes 0 No Comma separated list of headers to remove proxy config http anonymize_other_header_list Insert Client IP headers proxy config http anonymize_insert_client_ip 1 Yes 0 No Remove Client IP headers proxy config http anonymize_remove_client_ip 1 Yes 0 No HTTPS Re...

Страница 165: ...l_cancel Obey NewGroups Control Messages proxy config nntp obey_control_newgroup Obey RmGroups Control Messages proxy config nntp obey_control_rmgroup Inactivity Timeout secs proxy config nntp inactivity_timeout Check for New Groups Every secs proxy config nntp check_newgroups_every Check for Cancelled Articles Every secs proxy config nntp check_cancels_every Check Parent NNTP Server Every secs pr...

Страница 166: ... when the object has expired or has no expiration date 2 always 3 never Minimum information needed to cache document proxy config http cache required_headers 0 nothing 1 a last modified time 2 an explicit lifetime minimum life time secs proxy config http cache heuristic_min_lifetime maximum life time secs proxy config http cache heuristic_max_lifetime FTP cached objects expire after secs proxy con...

Страница 167: ...cks socks_server_port SOCKS timeout seconds proxy config socks socks_timeout Logging Event Logging Event Logging proxy config log2 logging_enabled 0 no logging at all 1 log errors only 2 full logging Log Management Log directory proxy config log2 logfile_dir Log space limit MB proxy config log2 max_space_mb_for_logs Log space Headroom MB proxy config log2 max_space_mb_headroom Log Collation Log co...

Страница 168: ...binary Netscape Extended Log file name proxy config log2 extended_log_name Netscape Extended Log file header proxy config log2 extended_log_header Netscape Extended2 Format Netscape Extended2 Enabled proxy config log2 extended2_log_enabled 1 Enable 0 Disable Netscape Extended2 Log file type proxy config log2 extended2_log_is_ascii 1 ASCII 0 binary Netscape Extended2 Log file name proxy config log2...

Страница 169: ... icp icp_port ICP multicast enabled proxy config icp multicast_enabled 1 Enable 0 Disable ICP Query Timeout proxy config icp query_timeout Reverse Proxy Server Acceleration proxy config reverse_proxy enabled 1 Enable 0 Disable Require Document Route Rewriting proxy config url_remap remap_required 1 Yes 0 No URL to redirect requests without Host header proxy config url_remap pristine_host_hdr HostD...

Страница 170: ...158 Appendix C Traffic Line Commands DNS Configuration Resolve attempt timeout secs proxy config dns lookup_timeout Number of retries proxy config dns retries Configuration Option Variable ...

Страница 171: ...nfig on page 169 log_hosts config on page 171 logs_xml config on page 171 mgmt_allow config on page 176 nntp_access config on page 176 nntp_servers config on page 177 parent config on page 179 partition config on page 181 records config on page 182 remap config on page 212 snmpd cnf on page 214 socks config on page 216 splitdns config on page 217 storage config on page 218 update config on page 21...

Страница 172: ... TCP and UDP Define the hosts that are to be allowed access to specific destination ports for either TCP or UDP Format Each line in the arm_security config file uses one of the following formats open tcp udp ports o_ports deny tcp udp dport d_ports src src_IPaddresses allow tcp udp src src_IPaddresses dst dst_IPaddresses dport d_ports sport s_ports The following table describes each field Example ...

Страница 173: ... Server to generate destination or source destination bypass rules in the following instances If there is a non HTTP request on port 80 If an HTTP request returns the following errors o 400 Bad Request error o 401 Unauthorized error o 403 Forbidden error o 405 Method not allowed error o 406 Not Acceptable access error o 408 Request timeout error o 500 Internal server error Rule Description Source ...

Страница 174: ...ddress can be a simple IP address such as 1 1 1 1 in CIDR Classless Inter Domain Routing format such as 1 1 1 0 24 a range separated by a dash such as 1 1 1 1 2 2 2 2 any combination of the above separated by commas such as 1 1 1 0 24 25 25 25 25 123 1 23 1 123 1 23 123 destination IP bypass bypass dst IPaddress Where IPaddress has the same format as src IPaddress source destination IP bypass bypa...

Страница 175: ...Allowed dest_domain Requested domain name dest_host Requested hostname dest_ip Requested IP address url_regex Regular expression to be found in a URL Secondary Specifier Allowed Value time A time range such as 08 00 14 00 src_ip The IP address of the client prefix A prefix in the path part of a URL suffix A file suffix in the URL port A requested URL port method A request URL method one of the fol...

Страница 176: ...the requested document When a request is denied the client receives an access denied message Format Each line in the filter config file contains a filtering rule Traffic Server recognizes three space delimited tags primary destination value secondary specifier value action value The following table lists the possible primary destinations and their allowed values The secondary specifiers are option...

Страница 177: ...ecifiers Allowed Value time A time range such as 08 00 14 00 src_ip The IP address of the client prefix A prefix in the path part of a URL suffix A file suffix in the URL port A requested URL port method A request URL method one of the following get post put trace scheme A request URL protocol one of the following HTTP FTP Action Value action allow deny PUSH If the PUSH option is enabled the PUSH ...

Страница 178: ...er s IP address of 111 111 11 1 are directed to the FTP server s IP address 11 11 11 1 when a request is a cache miss or is stale 111 111 11 1 7999 11 11 11 1 21 hosting config The hosting config file lets you assign cache partitions to specific origin servers and or domains so that you can manage your cache space more efficiently and restrict disk usage For step by step instructions on partitioni...

Страница 179: ...oes not belong to any of the origin servers or domains listed If all partitions for a particular origin server become corrupt Traffic Server will also use the generic partition to store content for that origin server The generic partition must have the following format hostname partition list_of_partition_numbers where list_of_partition_numbers is a comma separated list of generic partitions Examp...

Страница 180: ...he hostname of the ICP peer The name localhost is reserved for the Traffic Server host _IP The IP address of the ICP peer cache _type Use the following options 1 to indicate an ICP parent cache 2 to indicate an ICP sibling cache Option 3 is reserved for the local host the Traffic Server itself proxy _port The port number of the TCP port used by the ICP peer for proxy communication icp_port The por...

Страница 181: ...he available server directives Example The following line exempts URLs to the domain xyz com from having to authenticate using the LDAP server dest_domain xyz com server auth_bypass logs config The logs config file establishes and formats custom transaction log files For Traffic Server to create the custom log files you define you must enable the custom logging option by setting the proxy config l...

Страница 182: ...oxy response header psh format enabled 1 test User Agent cqh Retry After psh test ASCII none IMPORTANT After you modify the logs config file Traffic Manager has to reread the configuration files Run the traffic_line x command If you are running a cluster you need only run the command for one node the changes will propagate Field Allowed Inputs format All lines must begin with the word format activ...

Страница 183: ...file configure Traffic Server to create a separate log files containing all HTTP FTP transactions for the origin servers webserver1 webserver2 and webserver3 if the HTTP host log splitting option is enabled webserver1 webserver2 webserver3 For information about enabling the HTTP host log splitting option refer to HTTP host log splitting on page 112 logs_xml config This is the configuration file fo...

Страница 184: ...name filters and potentially multiple collation servers LogFormat LogFormat specifications can consist of the following tags NOTE The logs_xml config file ignores extra white space blank lines and all comments Field Allowed Inputs Name valid_format_name Required Valid format names include any name except squid common extended or extended2 which are pre defined formats There is no default for this ...

Страница 185: ...of the field CASE_INSENSITIVE_CONTAIN is a case insensitive version of CONTAIN valid_comparison_value Any string or integer matching the field type For integer values all of the operators are equivalent and mean that the field must be equal to the specified value NOTE There are no negative comparison operators If you want to specify a negative condition use the Action field to REJECT the record Fi...

Страница 186: ...hat you can see the pipe right after Traffic Server starts However pipes on a collation server are created when Traffic Server starts CollationHosts list_of_valid_hostnames A comma separated list of collation servers to which all log entries for this object are forwarded Collation servers can be specified by name or IP address Specify the collation port with a colon after the name for example host...

Страница 187: ...ect specification that includes only HTTP requests served by hosts in the domain company com or by the specific server server somewhere com Log entries are sent to port 4000 of the collation host logs company com and to port 5000 of the collation host 209 131 52 129 LogObject Format minimal Filename minimal ServerHosts company com server somewhere com Protocols http CollationHosts logs company com...

Страница 188: ...action ip_allow The following line allows a range of IP addresses to access Traffic Manager src_ip 123 12 3 000 123 12 3 123 action ip_allow nntp_access config The nntp_access config file controls user access to news articles cached by the Traffic Server Each line in the nntp_access config file describes the access privileges for a particular group of clients Format Each line begins with a specifi...

Страница 189: ...ews articles receiving news feeds The network interface the Traffic Server uses to contact the parent NNTP server Format Each line in the nntp_servers config file must have the following format hostname group wildmat priority interface The hostname and group wildmat tags are required priority and interface are optional The following table describes allowed values If access is authenticator is user...

Страница 190: ...or changes in the group list feed The Traffic Server will receive news feeds for the specified groups as the parent NNTP server receives news feeds The Traffic Server will not cache articles on demand since it will simply have them CAUTION If Traffic Server is clustered make sure that your news server sends feeds to one of the nodes in the cluster to avoid possible article numbering conflicts NOTE...

Страница 191: ...ne The Traffic Server needs to be aware of the news server and its groups before it can pull overviews from a specific group See the examples following this table dynamic The Traffic Server automatically decides based on usage patterns whether a group should be pull pullover or demand retrieval based Enter a positive integer The Traffic Server retrieves articles on demand from the specified server...

Страница 192: ...llowed values IMPORTANT After you modify the parent config file Traffic Manager has to reread the configuration files Run the traffic_line x command If you are running a cluster you need only run the command for one node the changes will propagate Primary Destination Allowed Value dest_domain Requested domain name dest_host Requested hostname dest_ip Requested IP address url_regex Regular expressi...

Страница 193: ...s entered at the bottom of the parent config file dest_domain parent parent1 8080 partition config The partition config file lets you manage your cache space more efficiently and restrict disk usage by creating cache partitions of different sizes for specific protocols You can further configure these partitions to store data from certain origin servers and or domains in the hosting config file ref...

Страница 194: ... The records config file is a list of configurable variables that Traffic Server software uses This section lists and describes these variables Many of the variables in the records config file are set automatically when you set configuration options in Traffic Manager or Traffic Line Certain configuration options can be set only by editing variables manually in the records config file Format Each ...

Страница 195: ...r Specifies the name of the executable that runs the traffic_server process proxy config proxy_binary_opts STRING M Specifies the command line options for starting Traffic Server proxy config manager_binary STRING traffic_ manager Specifies the name of the executable that runs the traffic_manager process proxy config cli_binary STRING traffic_line Specifies the name of the executable that runs the...

Страница 196: ...fig cluster mc_ttl INT 1 Specifies the multicast Time to Live for cluster communications proxy config cluster log_bogus_mc_ msgs INT 1 Enables 1 or disables 0 logging of bogus multicast messages proxy config admin html_doc_root STRING ui Specifies the document root for Traffic Manager proxy config admin web_interface_port INT 8081 Specifies Traffic Manager port proxy config admin autoconf_port INT...

Страница 197: ...min log_mgmt_access INT 0 Enables 1 or disables 0 logging of all Traffic Manager transactions to the lm log file proxy config admin log_resolve_ hostname INT 1 When enabled 1 the hostname of the client connecting to Traffic Manager is recorded in the lm log file When disabled 0 the IP address of the client connecting to Traffic Manager is not recorded in the lm log file Process Manager proxy confi...

Страница 198: ...s cause problems proxy config arm bypass_use_and_rules _bad_client_request INT 0 Enables 1 or disables 0 dynamic source destination bypass in the event of non HTTP traffic on port 80 NOTE The variable proxy config arm bypass_on_bad_ client_request must also be enabled for this option to work proxy config arm bypass_use_and_rules _400 INT 0 Enables 1 or disables 0 dynamic generation of source desti...

Страница 199: ... option to work proxy config arm bypass_on_bad_client _request INT 0 Enables 1 or disables 0 dynamic destination bypass in the event of non HTTP traffic on port 80 proxy config arm bypass_on_400 INT 0 Enables 1 or disables 0 dynamic generation of destination bypass rules when an origin server returns a 400 error proxy config arm bypass_on_401 INT 0 Enables 1 or disables 0 dynamic generation of des...

Страница 200: ...d load shedding takes effect LDAP proxy config ldap auth enabled INT 0 Enables 1 or disables 0 LDAP based basic proxy authentication proxy config ldap cache size INT 5000 Specifies the maximum number of entries allowed in the LDAP cache When modifying this value update the value of proxy config ldap cache storage_s ize proportionally For example if you double the cache size also double the cache s...

Страница 201: ...r LDAP administrator HTTP Engine proxy config http server_port INT 8080 Specifies the port that Traffic Server uses when acting as a web proxy server for web traffic or when serving web traffic transparently proxy config http server_port_attr STRING X Specifies the server port options You can specify one of the following C SERVER_PORT_COMPRESSED X SERVER_PORT_DEFAULT T SERVER_PORT_BLIND_TUNNEL pro...

Страница 202: ... 1 Enables 1 or disables 0 the use of keep alive connections to either origin servers or clients proxy config http send_http11_requests INT 3 Configures Traffic Server to use HTTP version 1 1 when communicating with origin servers You can specify one of the following values 1 Traffic Server always uses HTTP 1 1 when communicating with origin servers 2 Traffic Server uses HTTP 1 1 if the origin ser...

Страница 203: ...isables 0 the re use of server sessions proxy config http ftp_enabled INT 1 Enables 1 or disables 0 Traffic Server from serving FTP requests sent via HTTP proxy config http record_heartbeat INT 0 Enables 1 or disables 0 traffic_cop heartbeat logging parent proxy configuration proxy config http parent_proxy_routing_ enable INT 0 Enables 1 or disables 0 the HTTP parent caching option Refer to Chapte...

Страница 204: ...ic Server keeps connections to origin servers open if the transaction stalls proxy config http transaction_active_ timeout_in INT 7200 Specifies the maximum amount of time Traffic Server can remain connected to a client If the transfer to the client is not complete before this timeout expires Traffic Server closes the connection proxy config http transaction_active_ timeout_out INT 7200 Specifies ...

Страница 205: ...because the origin server was too slow in sending the response header proxy users variables proxy config http anonymize_remove_ from INT 0 When enabled 1 Traffic Server removes the From header that accompanies transactions to protect the privacy of your users proxy config http anonymize_remove_ referer INT 0 When enabled 1 Traffic Server removes the Referer header that accompanies transactions to ...

Страница 206: ...ol proxy config http cache http INT 1 Enables 1 or disables 0 caching of HTTP requests proxy config http cache ftp INT 1 Enables 1 or disables 0 caching of FTP requests sent via HTTP proxy config http cache ignore_client_ no_cache INT 0 When enabled 1 Traffic Server ignores client requests to bypass the cache proxy config http cache ims_on_client_ no_cache INT 0 When enabled 1 Traffic Server issue...

Страница 207: ...ocument cacheable 1 at least Last Modified header required 2 explicit lifetime required Expires or Cache Control proxy config http cache max_stale_age INT 604800 Specifies the maximum age allowed for a stale response before it cannot be cached proxy config http cache add_content_ length INT 0 When enabled 1 Traffic Server adds the content length header in a request if it is absent proxy config htt...

Страница 208: ...che document_ lifetime INT 259200 Specifies the maximum amount of time that an FTP document can stay in the Traffic Server cache Customizable User Response Pages proxy config body_factory enable_ customizations INT 0 Specifies whether customizable response pages are enabled or disabled and which response pages are used 0 disable customizable user response pages 1 enable customizable user response ...

Страница 209: ...nfig nntp logging_enabled INT 1 Enables 1 or disables 0 logging of NNTP transactions in the event logs roxy config nntp background_posting_ enabled INT 0 Enables 1 or disables 0 background posting When enabled Traffic Server posts NNTP articles to parent NNTP servers in the background proxy config nntp insert_posting_trace_ header INT 1 When enabled 1 Traffic Server inserts posting trace headers p...

Страница 210: ...ew news on the NNTP servers proxy config nntp check_cancels_every INT 3600 Specifies how often in seconds Traffic Server polls parent NNTP servers for canceled articles proxy config nntp maintain_every INT 120 Specifies how often Traffic Server checks NNTP activities proxy config nntp check_pull_every INT 600 Specifies how often Traffic Server caches news articles form pull groups proxy config nnt...

Страница 211: ...rward_backlog INT 1000 Specifies the number of forwarded articles to buffer proxy config nntp add_to_path INT 0 When enabled 1 Traffic Server is added to the path header in articles proxy config nntp forward_feed_only INT 0 When enabled 1 Traffic Server does not store feed articles locally but forwards them proxy config nntp auth_on_connect INT 0 When enabled 1 configures Traffic Server to signal ...

Страница 212: ...ion_ timeout INT 300 Specifies how long Traffic Server waits for a response from the FTP server proxy config ftp ftp_enabled INT 0 Enables 1 or disables 0 processing of FTP requests from FTP clients proxy config ftp cache_enabled INT 1 Enables 1 or disables 0 FTP documents to be put in the cache If this option is disabled Traffic Server always serves FTP documents from the FTP server proxy config ...

Страница 213: ...g port when it sends a PASV to the FTP server and gets the IP listening port information proxy config ftp try_client_data_connect _times INT 3 Specifies the maximum number of times Traffic Server can try to connect to the FTP client s data listening port when the FTP client sends a PORT with the IP listening port information proxy config ftp client_ctrl_no_activity_ timeout INT 900 Specifies the n...

Страница 214: ...e_ time INT 259200 Specifies how long FTP files can stay fresh in the cache proxy config ftp simple_directory_ listing_cache_enabled INT 1 Enables 1 or disables 0 caching of directory listings without arguments for example dir ls proxy config ftp full_directory_listing_ cache_enabled INT 1 Enables 1 or disables 0 caching of directory listings with arguments for example ls al ls txt SOCKS Processor...

Страница 215: ... HTTP alternates that Traffic Server can cache proxy config cache max_doc_size INT 0 Specifies the maximum size of documents in the cache 0 there is no size limit DNS proxy config dns search_default_ domains INT 1 Enables 1 or disables 0 local domain expansion so that Traffic Server can attempt to resolve unqualified hostnames by expanding to the local domain For example if a client makes a reques...

Страница 216: ... 0 obey 1 ignore 2 min X ttl 3 max X ttl proxy config hostdb timeout INT 1440 Specifies the foreground timeout in seconds proxy config hostdb strict_round_robin INT 0 When disabled 0 Traffic Server always uses the same origin server for the same client as long as the origin server is available Logging Config proxy config log2 logging_enabled INT 3 Enables and disables event logging 0 logging disab...

Страница 217: ... umask setting of 002 will not allow write permission for others even if specified in the configuration file Permissions for existing log files are not changed when the configuration is changed proxy config log2 custom_logs_enabled INT 0 Enables 1 or disables 0 custom logging proxy config log2 xml_logs_config INT 0 Enables 1 or disables 0 extended custom logging using an XLM based configuration fi...

Страница 218: ...cape extended 2 log file format proxy config log2 extended2_log_is_ ascii INT 1 Specifies the Netscape extended 2 log file type 1 ASCII 0 binary proxy config log2 extended2_log_name STRING extended2 Specifies the Netscape extended 2 log file name proxy config log2 extended2_log_ header STRING NULL Specifies the Netscape extended 2 log file header text proxy config log2 separate_icp_logs INT 0 When...

Страница 219: ... a collation server is being used proxy config log2 collation_host_tagged INT 0 When enabled 1 configures Traffic Server to include the hostname of the collation client that generated the log entry in each entry proxy config log2 collation_retry_sec INT 5 Specifies the number of seconds between collation server connection retries proxy config log2 rolling_enabled INT 1 Enables 1 or disables 0 log ...

Страница 220: ...st_ hdr INT 0 Set this variable to 1 if you want to retain the client host header in a request during remapping SSL Termination proxy config ssl enabled INT 0 Enables 1 or disables 0 the SSL termination option Refer to Using SSL Termination on page 93 proxy config ssl server_port INT 4443 Specifies the port used for SSL communication proxy config ssl client certification_ level INT 0 Sets the clie...

Страница 221: ...d against proxy config ssl client verify server INT 0 Configures Traffic Server to verify the origin server certificate with the Certificate Authority CA proxy config ssl client cert filename STRING NULL Specifies the file name of SSL client certificate installed on Traffic Server proxy config ssl client cert path STRING config Specifies the location of the SSL client certificate installed on Traf...

Страница 222: ...iate update When enabled Traffic Server overrides the scheduling expiration time for all scheduled update entries and initiates updates until this option is disabled proxy config update retry_count INT 10 Specifies the number of times Traffic Server can retry the scheduled update of a URL in the event of failure proxy config update retry_interval INT 2 Specifies the delay in seconds between each s...

Страница 223: ...es 1 or disables 2 multicast mode proxy config wccp2 multicast_address STRING NULL Specifies the IP multicast address proxy config wccp2 number_of_routers INT 0 If multicast is not enabled the routers on your network are not automatically discovered You must specify the number of routers that direct traffic to Traffic Server WCCP 2 0 supports a maximum of 32 routers proxy config wccp2 router0_ip S...

Страница 224: ...to the Traffic Server machine ARM security on page 81 IMPORTANT After you modify the remap config file Traffic Manager has to reread the configuration files Run the traffic_line x command If you are running a cluster you need only run the command for one node the changes will propagate Field Description type Enter either one of the following map translates an incoming request URL to the appropriat...

Страница 225: ...at match the second rule also match the first rule The first rule takes precedence because it appears earlier in the remap config file The following example shows a mapping with a path prefix specified in the target and replacement map http www h com a b http server h com customers x y This rule results in the following translation Client Request Translated Request http www x com Widgets index htm...

Страница 226: ...ng variables as in the following example Entry type snmpNotifyEntry Format snmpNotifyName text snmpNotifyTag text keyed on snmpTargetAddr table snmpNotifyType trap 1 inform 2 snmpNotifyStorageType nonVolatile permanent readOnly snmpNotifyEntry 31 Console trap nonVolatile snmpNotifyEntry 32 TrapSink trap nonVolatile Client Request Translated Request http www x com Widgets http server hoster com x W...

Страница 227: ... requests using the community string public To restrict access you need to remove access related default entries in the snmpd cnf file and add entries specifying the hosts you want to allow You must Define the hosts or host groups for your system use the snmpTargetAddrEntry lines to define the IP addresses associated to each host or host group Define access communities a community can consist of a...

Страница 228: ...range where IPaddresses_or_IPaddress_range is a comma separated list of the IP addresses or IP address ranges associated with the origin servers you want Traffic Server to access directly Example The following example configures Traffic Server to access the origin server associated with the IP address 11 11 11 1 directly without going through the SOCKS server no_socks 11 11 11 1 The following exam...

Страница 229: ...ain hp com search_list hp com hp1 com dest_domain internal hp com named 255 255 255 253 Field Allowed inputs dest_domain A valid domain name This specifies that the DNS server selection be based on the destination domain You can prefix the domain with the symbol to indicate the NOT logical operator dest_host A valid hostname This specifies that the DNS server selection be based on the destination ...

Страница 230: ...cification is optional You can use any partition of any size For best performance HP recommends the following Use raw disk partitions For each disk make all partitions the same size For each node use the same number of partitions on all disks Specify pathnames according to your operating system requirements See the following examples Example The following basic example shows 64 MB of cache storage...

Страница 231: ...expanded to thousands when recursive URLs are included it is not intended to operate on massively large URL sets such as those used by Internet crawlers for example Format Each line in the update config file uses the following format URL Request_headers Offset_hour Interval Recursion_depth NOTE Always use the Content Management page to modify settings in the update config file instead of modifying...

Страница 232: ...g table offers examples to illustrate how to create a valid url_regex Field Allowed inputs URL HTTP and FTP based URLs Request_headers Optional A CR LF separated list of headers passed in each GET request You can define any request header that conforms to the HTTP specification The default is no request header Offset_hour Base hour used to derive the update periods The range is 00 23 hours Interva...

Страница 233: ...rwise a literal X This us used to escape operators such as 0 A NULL character 123 The character with octal value 123 x2a The character with hexadecimal value 2a r Matches an r where r is any regular expression You can use parentheses d to override precedence rs The regular expression r followed by the regular expression s r s Either an r or an s n Inserts an end node causing regular expression mat...

Страница 234: ... header for example Age ssh logs the Age field in server response headers caun The client authenticated user name result of the RFC931 ident lookup of the client user name cfsc The client finish status code specifies whether the client request to the proxy was successfully completed FIN or interrupted INTR chi The client host IP the IP address of the client s host machine cqbl The client request t...

Страница 235: ...ve the document pqbl The proxy request transfer length request body length bytes from proxy to server pqhl The proxy request header length request header length bytes from proxy to server pqsi The proxy request server IP 0 on cache hits parent ip for requests to parent proxies pqsn The proxy request server name pscl The proxy response transfer length response length bytes from proxy to client psct...

Страница 236: ... response header length bytes from server to proxy sshv The server response HTTP version 1 0 1 1 sssc The server response status code the HTTP response status code from server to proxy ttms The transfer time total transfer time in milliseconds ttmsf transfer time in milliseconds as a fractional number of seconds specifies the transfer time of the document in millisecond resolution but instead of f...

Страница 237: ...gging field symbols Netscape Extended 2 logging formats The following table lists the Netscape Extended 2 logging fields and the corresponding HP logging field symbols Netscape Common HP field symbols host chi usr caun time cqtn req cqtx s1 pssc c1 pscl Netscape Extended HP field symbols host chi usr caun time cqtn req cqtx s1 pssc c1 pscl s2 sssc c2 sscl b1 cqbl b2 pqbl h1 cqhl h2 pshl h3 pqhl h4...

Страница 238: ...226 Appendix E Event Logging Formats s2 sssc c2 sscl b1 cqbl b2 pqbl h1 cqhl h2 pshl h3 pqhl h4 sshl xt tts route phr pfs cfsc ss pfsc crc crc Netscape Extended 2 HP field symbols ...

Страница 239: ...ages Message Description machine down IP address Machine with given IP address is down machine up IP address protocol version X Y Machine with given IP address and protocol version is up Cluster notes Cluster IP address not in config declaring down Cluster bbwrite to IP address failed declaring down Cluster network connection to IP address backing up Cluster read from IP address failed declaring d...

Страница 240: ...unable to read cache segment marking segment corrupt or unable to write pool header there is a disk problem You may have to replace your disk can t open config file config file name for reading custom formats Custom logging was enabled but Traffic Server cannot find the logs config file connect by disallowed client IP address closing The specified client is not allowed to connect to the Traffic Se...

Страница 241: ...oxy conn closed This is an informational message informing you that the traffic_server process was down For example you would see this message if there was a restart Access logging suspended configured space allocation exhausted The space allocated to the event log files is full You must either increase the space or delete some log files to enable access logging to continue To prevent this from ha...

Страница 242: ...d root for the vip_config file in the bin directory Title HTTP code Description Customizable file name Access Denied 403 You are not allowed to access the document at location URL access denied Bad HTTP request for FTP Object 400 Bad HTTP request for FTP object ftp bad_request Cache Read Error 500 Error reading from cache Please retry request cache read_error Connection Timed Out 504 Server has no...

Страница 243: ...TTP Response 502 The host server_name did not return the document URL correctly response bad_response Malformed Server Response 502 The host server_name did not return the document URL correctly response bad_response Malformed Server Response Status 502 The host server_name did not return the document URL correctly response bad_response Maximum Transaction Time exceeded 504 Too much time has passe...

Страница 244: ... not return the document URL correctly response bad_response Unknown Host 500 Unable to locate the server named hostname The server does not have a DNS entry Perhaps there is a misspelling in the server name or the server no longer exists Double check the name and try again connect dns_failed Unsupported URL Scheme 400 Cannot perform your request for the document URL because the protocol scheme is...

Страница 245: ...apter Parent cache Cluster A group of Traffic Server nodes that share configuration information and can act as a single large virtual cache Configure mode One of two modes in Chapter Traffic Manager and Chapter Traffic Line Configure mode lets you configure the Traffic Server system See also Chapter Monitor mode Cookie A piece of information sent by an origin server to a web browser The browser so...

Страница 246: ...can be connected often with dial up phone lines 2 2 Post Office Protocol The basic protocols for addressing e mail Proxy server See Chapter Web proxy server Reverse proxy A option that allows Traffic Server to be configured as an origin server for convenient geographical distribution of server content Reverse proxy also offloads static content service from servers building dynamic content and prov...

Страница 247: ...rs to reconfigure their browser settings It does this by intercepting traffic destined for an origin server and redirecting that traffic through the Traffic Server cache URL Uniform Resource Locator The address that defines the route to a file on the web or other Internet facility Virtual IP failover An option available to clustered Traffic Servers where Traffic Server maintains a pool of virtual ...

Страница 248: ...ache 51 clearing the cache 62 client access control 29 81 168 clustering adding and deleting nodes 46 changing modes 46 full 2 management only 2 modes 2 45 collating event log files 115 configuration files 5 78 159 configuration options Traffic Manager 128 configuration variables records config 183 Configure mode Traffic Line 76 Traffic Manager 9 73 configuring Traffic Server 73 Content button Tra...

Страница 249: ...response messages 232 I ICP about 54 log file name 112 peer 54 separate logs 112 ICP cache hierarchies 54 icp config file 167 interactive mode Traffic Line 10 interactive mode commands Traffic Line 146 interception strategies 23 ip_allow config file 81 168 L LDAP based proxy authentication 92 about 6 80 authentication bypass 92 configuring 92 ldapsrvr config file 169 log collation 115 log collatio...

Страница 250: ...Traffic Manager Configure 76 print_bypass utility 32 processes Traffic Server 4 Protocols button Traffic Manager Configure 75 Traffic Manager Monitor 66 proxy caching explicit and transparent 11 HTTP alternates 14 whether to cache 15 pull group 19 pullover group 19 PUSH 194 push group 19 R RAM cache about 3 59 records config file 182 recovering log files 119 redirects 35 resolving alarms 67 revali...

Страница 251: ...ss 83 controlling host access 86 creating administrator accounts 85 Dashboard Monitor 64 Graphs button Monitor 66 121 Host Database button Configure 75 Logging button Configure 76 Monitor mode 9 MRTG button Monitor 67 Node button Monitor 65 Other button Monitor 66 Plugins button Configure 76 Protocols button Configure 75 Protocols button Monitor 66 Routing button Configure 75 Security button Confi...

Отзывы: