Hi Lukas, I thought about giving this another try, I am still having this “SOCKERR” “Connection reset by peer”. I have tried multiple httpchk configs in the tcp mode backend but I can not get past this error.
In the curl case it looks like the health check is sending a 2 nd packet of 27 bytes
[@]$ curl -v http://192.168.10.46:5001
* About to connect() to 192.168.10.46 port 5001 (#0)
* Trying 192.168.10.46... connected
* Connected to 192.168.10.46 (192.168.10.46) port 5001 (#0)
> GET / HTTP/1.1
> User-Agent: curl/7.19.7 (x86_64-redhat-linux-gnu) libcurl/7.19.7 NSS/3.44 zlib/1.2.3 libidn/1.18 libssh2/1.4.2
> Host: 192.168.10.46:5001
> Accept: */*
>
* HTTP 1.0, assume close after body
< HTTP/1.0 200
< content-length: 6
<
* Closing connection #0
200 OK
these are tcpdumps, which indeed have different patterns
curl:
3:44:35.494210 IP 192.168.10.2.51154 > 192.168.10.46.5001: tcp 0
13:44:35.494287 IP 192.168.10.46.5001 > 192.168.10.2.51154: tcp 0
13:44:35.494644 IP 192.168.10.2.51154 > 192.168.10.46.5001: tcp 0
13:44:35.494732 IP 192.168.10.2.51154 > 192.168.10.46.5001: tcp 169
13:44:35.494748 IP 192.168.10.46.5001 > 192.168.10.2.51154: tcp 0
13:44:35.501400 IP 192.168.10.46.5001 > 192.168.10.2.51154: tcp 14
13:44:35.501837 IP 192.168.10.2.51154 > 192.168.10.46.5001: tcp 0
13:44:35.501856 IP 192.168.10.46.5001 > 192.168.10.2.51154: tcp 27
13:44:35.502157 IP 192.168.10.46.5001 > 192.168.10.2.51154: tcp 0
13:44:35.502238 IP 192.168.10.2.51154 > 192.168.10.46.5001: tcp 0
13:44:35.502281 IP 192.168.10.46.5001 > 192.168.10.2.51154: tcp 0
haproxy request:
13:44:02.401674 IP 192.168.10.231.47584 > 192.168.10.46.5001: tcp 0
13:44:02.401729 IP 192.168.10.46.5001 > 192.168.10.231.47584: tcp 0
13:44:02.401904 IP 192.168.10.231.47584 > 192.168.10.46.5001: tcp 37
13:44:02.401946 IP 192.168.10.46.5001 > 192.168.10.231.47584: tcp 0
13:44:02.409983 IP 192.168.10.46.5001 > 192.168.10.231.47584: tcp 14
13:44:02.410506 IP 192.168.10.46.5001 > 192.168.10.231.47584: tcp 0
13:53:02.997451 IP (tos 0x0, ttl 64, id 7415, offset 0, flags [DF], proto TCP (6), length 60)
192.168.10.231.49168 > 192.168.10.46.5001: tcp 0
0x0000: 4500 003c 1cf7 4000 4006 875f c0a8 0ae7 E..<..@.@.._....
0x0010: c0a8 0a2e c010 1389 1318 d5e2 0000 0000 ................
0x0020: a002 7210 9694 0000 0204 05b4 0402 080a ..r.............
0x0030: be27 c915 0000 0000 0103 0307 .'..........
13:53:02.997531 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
192.168.10.46.5001 > 192.168.10.231.49168: tcp 0
0x0000: 4500 003c 0000 4000 4006 a456 c0a8 0a2e E..<..@.@..V....
0x0010: c0a8 0ae7 1389 c010 6793 4365 1318 d5e3 ........g.Ce....
0x0020: a012 7120 9694 0000 0204 05b4 0402 080a ..q.............
0x0030: ce72 0552 be27 c915 0103 0307 .r.R.'......
13:53:02.997779 IP (tos 0x0, ttl 64, id 7416, offset 0, flags [DF], proto TCP (6), length 89)
192.168.10.231.49168 > 192.168.10.46.5001: tcp 37
0x0000: 4500 0059 1cf8 4000 4006 8741 c0a8 0ae7 E..Y..@.@..A....
0x0010: c0a8 0a2e c010 1389 1318 d5e3 6793 4366 ............g.Cf
0x0020: 8018 00e5 96b1 0000 0101 080a be27 c916 .............'..
0x0030: ce72 0552 4745 5420 2f20 4854 5450 2f31 .r.RGET./.HTTP/1
0x0040: 2e30 0d0a 636f 6e74 656e 742d 6c65 6e67 .0..content-leng
0x0050: 7468 3a20 300d 0a0d 0a th:.0....
13:53:02.997825 IP (tos 0x0, ttl 64, id 13572, offset 0, flags [DF], proto TCP (6), length 52)
192.168.10.46.5001 > 192.168.10.231.49168: tcp 0
0x0000: 4500 0034 3504 4000 4006 6f5a c0a8 0a2e E..45.@.@.oZ....
0x0010: c0a8 0ae7 1389 c010 6793 4366 1318 d608 ........g.Cf....
0x0020: 8010 00e3 968c 0000 0101 080a ce72 0552 .............r.R
0x0030: be27 c916 .'..
13:53:03.006101 IP (tos 0x0, ttl 64, id 13573, offset 0, flags [DF], proto TCP (6), length 66)
192.168.10.46.5001 > 192.168.10.231.49168: tcp 14
0x0000: 4500 0042 3505 4000 4006 6f4b c0a8 0a2e E..B5.@.@.oK....
0x0010: c0a8 0ae7 1389 c010 6793 4366 1318 d608 ........g.Cf....
0x0020: 8018 00e3 969a 0000 0101 080a ce72 055a .............r.Z
0x0030: be27 c916 4854 5450 2f31 2e30 2032 3030 .'..HTTP/1.0.200
0x0040: 0d0a ..
13:53:03.006755 IP (tos 0x0, ttl 64, id 13574, offset 0, flags [DF], proto TCP (6), length 52)
192.168.10.46.5001 > 192.168.10.231.49168: tcp 0
0x0000: 4500 0034 3506 4000 4006 6f58 c0a8 0a2e E..45.@.@.oX....
0x0010: c0a8 0ae7 1389 c010 6793 4374 1318 d608 ........g.Ct....
0x0020: 8014 00e3 968c 0000 0101 080a ce72 055b .............r.[
0x0030: be27 c916 .'..