Return-Path: X-Original-To: apmail-httpd-dev-archive@www.apache.org Delivered-To: apmail-httpd-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id AD99E184CC for ; Wed, 20 Jan 2016 15:28:50 +0000 (UTC) Received: (qmail 34988 invoked by uid 500); 20 Jan 2016 15:28:50 -0000 Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 34913 invoked by uid 500); 20 Jan 2016 15:28:50 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 34902 invoked by uid 99); 20 Jan 2016 15:28:50 -0000 Received: from Unknown (HELO spamd4-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 20 Jan 2016 15:28:50 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd4-us-west.apache.org (ASF Mail Server at spamd4-us-west.apache.org) with ESMTP id AC300C0044 for ; Wed, 20 Jan 2016 15:28:49 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd4-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: 0.653 X-Spam-Level: X-Spam-Status: No, score=0.653 tagged_above=-999 required=6.31 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_NEUTRAL=0.652, URIBL_BLOCKED=0.001] autolearn=disabled Authentication-Results: spamd4-us-west.apache.org (amavisd-new); dkim=pass (2048-bit key) header.d=comcast.net Received: from mx1-us-east.apache.org ([10.40.0.8]) by localhost (spamd4-us-west.apache.org [10.40.0.11]) (amavisd-new, port 10024) with ESMTP id mFOsD6ixrgds for ; Wed, 20 Jan 2016 15:28:39 +0000 (UTC) Received: from resqmta-po-03v.sys.comcast.net (resqmta-po-03v.sys.comcast.net [96.114.154.162]) by mx1-us-east.apache.org (ASF Mail Server at mx1-us-east.apache.org) with ESMTPS id 81F37439A7 for ; Wed, 20 Jan 2016 15:28:39 +0000 (UTC) Received: from resomta-po-10v.sys.comcast.net ([96.114.154.234]) by resqmta-po-03v.sys.comcast.net with comcast id 8FTc1s00353iAfU01FUZXv; Wed, 20 Jan 2016 15:28:33 +0000 Received: from [192.168.199.10] ([69.251.84.114]) by resomta-po-10v.sys.comcast.net with comcast id 8FUY1s0082U0RYt01FUYiR; Wed, 20 Jan 2016 15:28:33 +0000 Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 9.2 \(3112\)) Subject: Re: Work in progress: mod_proxy Health Check module From: Jim Jagielski In-Reply-To: Date: Wed, 20 Jan 2016 10:28:32 -0500 Content-Transfer-Encoding: quoted-printable Message-Id: References: <25B13108-E732-422F-B3C2-41B5E0EB22D1@jaguNET.com> <9EE59597-7931-484A-A61E-1A4715D9F5A3@c8h10n4o2.org.uk> <41F5D009-7C4E-47AB-8FE7-0B0C97E569FA@jaguNET.com> <569F4683.8020206@kippdata.de> <23C0818C-160A-4907-B574-B8853CF582A1@jaguNET.com> <91142A15-43F3-4AE2-8227-8866EA5F9DE4@jaguNET.com> To: dev@httpd.apache.org X-Mailer: Apple Mail (2.3112) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.net; s=q20140121; t=1453303713; bh=96Cu03Wq1df4lJvh4L7r53TjLSXImhBZTZLPGAJVAQg=; h=Received:Received:Content-Type:Mime-Version:Subject:From:Date: Message-Id:To; b=ODsWc1DZAZxwh7Z/0qdXyV6EWFnF31XuHbSJMGIoHv01Urfq22LaJfs5DTszPJagP g/Ijfx1f6v8kvC7rb+jXNyQJItxn6ROt1BkrwAV6/3JJjDry4HbpUYODvFV1hKiO4Z INZGxkD/8BHqAkN8FeyNhhu7fq8bNa3tNs31cvYPK37Wte/IaV7ifV0NjOE8u6ZH6R AbD8KN6t2oXK1Z6IcO8Yy2+p/2r2+1kcbZfPz3qbJx+aeALn7mJHkFNpBhB0zev/Sm Z4kDbadfkUss4y4n5hA2yuBgaoRY9eRM967drtrxzywSxvx2c7OUUIARzY2GVJphiq JdEZI3N8J2cYg== > On Jan 20, 2016, at 9:57 AM, Jim Jagielski wrote: >=20 > It would *REALLY* be nice if ap_expr was r->kept_body > aware. >=20 Actually, that does NOT look that difficult...=20 Comments? Should I go for it? > I could look at folding that in, but my goal is that all the > health-check stuff is 2.4-backport-able, and don't want to > hack ap_expr to allow that and have someone block that backport > due to, well... whatever. Some people just like blocking back- > ports, especially from people who's 1st and last names have the > same letters :) >=20 >> On Jan 20, 2016, at 8:08 AM, Jim Jagielski wrote: >>=20 >>>=20 >>> On Jan 20, 2016, at 7:59 AM, Jim Jagielski wrote: >>>=20 >>>>=20 >>>> On Jan 20, 2016, at 3:34 AM, Rainer Jung = wrote: >>>>=20 >>>> Am 20.01.2016 um 01:57 schrieb Jim Jagielski: >>>>> Right now GET and CPING (as well as provider) is on my >>>>> TODO, in fact, they are currently set as "unimplemented" >>>>> although the hooks are there. >>>>>=20 >>>>> The main issue is that we need to worry about a (possibly) >>>>> large response body and some method of checking against >>>>> that. I have some ideas, but it's not as "easy" as it >>>>> was using ap_expr. >>>>=20 >>>> I wouldn't worry to much about the resource use in case of large = response bodies. As long as we warn in the docs. Most uses of this = advanced feature should end up using a special probing page in the = backend (application). GET instead of HEAD is nice though, because that = page can include some small status info which can be evaluated using the = expr. >>>>=20 >>>=20 >>> The only thing I can't figure out yet is that ap_expr doesn't >>> seem to be able to work on the response *body*, at least, >>> I haven't seen where it is able to do so. So I'll need to figure >>> out how to "trick" it to do so. >>=20 >> I guess I could shove the response body in the request note >> array... let me see. >=20