Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id A688F200D24 for ; Tue, 10 Oct 2017 01:50:27 +0200 (CEST) Received: by cust-asf.ponee.io (Postfix) id A4F171609E0; Mon, 9 Oct 2017 23:50:27 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id EADCD1609CE for ; Tue, 10 Oct 2017 01:50:26 +0200 (CEST) Received: (qmail 68322 invoked by uid 500); 9 Oct 2017 23:50:25 -0000 Mailing-List: contact users-help@trafficserver.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: users@trafficserver.apache.org Delivered-To: mailing list users@trafficserver.apache.org Received: (qmail 68312 invoked by uid 99); 9 Oct 2017 23:50:25 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd2-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 09 Oct 2017 23:50:25 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd2-us-west.apache.org (ASF Mail Server at spamd2-us-west.apache.org) with ESMTP id ECED01A2B4E for ; Mon, 9 Oct 2017 23:50:24 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd2-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: -0.102 X-Spam-Level: X-Spam-Status: No, score=-0.102 tagged_above=-999 required=6.31 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=disabled Authentication-Results: spamd2-us-west.apache.org (amavisd-new); dkim=pass (1024-bit key) header.d=equalit.ie header.b=kEuWFBWA; dkim=pass (1024-bit key) header.d=equalit.ie header.b=eyOKqt1s Received: from mx1-lw-eu.apache.org ([10.40.0.8]) by localhost (spamd2-us-west.apache.org [10.40.0.9]) (amavisd-new, port 10024) with ESMTP id puYSWvWxaotB for ; Mon, 9 Oct 2017 23:50:22 +0000 (UTC) Received: from mail.equalit.ie (mail.equalit.ie [94.23.47.218]) by mx1-lw-eu.apache.org (ASF Mail Server at mx1-lw-eu.apache.org) with ESMTPS id 38FBD5F3FF for ; Mon, 9 Oct 2017 23:50:22 +0000 (UTC) Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.equalit.ie (Postfix) with ESMTP id 2A0311B6084C for ; Mon, 9 Oct 2017 23:50:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=equalit.ie; s=mail; t=1507593016; bh=Mf1zT5ihLbeJip0csVmbkZN+nPCfO1TdkpyH12QW4UQ=; h=To:From:Subject:Date:From; b=kEuWFBWAXQ28E40Xjw6BDSgGBMUz5HLOhH9ag37gDlpsqhC5zVMtIu5iOta1LHjdy cowOccSbNShb6ee6ha8z5yo/n7gvThoLOFtCLPGDbFSfek8XuahXP7IaBxKC1Gu+gN E/D3gwu487zMykGSQJw9fBGcQq15a1C+d3zLqF90= X-Virus-Scanned: eQualit.ie amavisd-new at equalit.ie Received: from mail.equalit.ie ([127.0.0.1]) by localhost (mail.equalit.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JR-POCCTzE0E for ; Mon, 9 Oct 2017 23:50:15 +0000 (UTC) Received: from workpad.my.domain (27-32-29-15.static.tpgi.com.au [27.32.29.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.equalit.ie (Postfix) with ESMTPSA id 38FEC1B60836 for ; Mon, 9 Oct 2017 23:50:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=equalit.ie; s=mail; t=1507593014; bh=Mf1zT5ihLbeJip0csVmbkZN+nPCfO1TdkpyH12QW4UQ=; h=To:From:Subject:Date:From; b=eyOKqt1smyPMkwV37WeqFIjhm5UG3Tk0jrx16XaVjTfuc8MjoG1B18B0jZamyxOrp T2HD0bZnt0qLTg8v7W5cTv85pmwB/DoLy08ADd5FF9IFsTpbpS0+xcJG5qiRjYzzB3 72FGZbwTLs+7FmNurq3VJzWo3RclIyDTKfeaFKLw= To: users@trafficserver.apache.org From: tomr Subject: garbled log entries - scheme UNKNOWN Message-ID: Date: Tue, 10 Oct 2017 10:50:01 +1100 User-Agent: Mozilla/5.0 (X11; OpenBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: 8bit archived-at: Mon, 09 Oct 2017 23:50:27 -0000 Hi, I'm seeing a ton of log entries with scheme "UNKNOWN", a garbled HTTP response code (circa 20 chars long), and not a huge amount of the detail I'd normally expect - apart from client ip, which appears sensible. A lot of the requests come from our own monitoring infrastructure, so there's a decent chance I'll be able to reproduce (though I can't yet). Does anyone have any suggestions about where I could start looking? We're using ATS 7.0.0, and seeing this for about 0.5% of log lines on a few million hits per day. Log format is: % % [%] \"% /% %\" % %<{Host}cqh> % % \"%<{User-Agent}cqh>\" % % % % % And an example bogus logline (with IP replaced) is: 0.0.0.0 - [09/Oct/2017:07:22:59 -0000] "- /- HTTP/1.0" UNKNOWN 8242834443987517485 0 "" ERROR_UNKNOWN(7811903955520716845) Z - 7587266184633188397 �� tia, Tom