Squid parent Selection Algorithm

Login or Register for Dates, Times and to Reply

Thread Tools Search this Thread
# 1  
Squid parent Selection Algorithm

Hello guys,
I have one question regarding choosing proper peer Selection Algorithm. Actually we have six Squid (2.7) servers with two parent upstream proxies running on two web appliances. In appliance statistics we see that balancing is not optimal and first appliance is keeping the majority of load.

Currently configuration on all Squids looks like:
cache_peer parent1 parent 80 0 no-query no-digest no-netdb-exchange userhash sourcehash round-robin
cache_peer parent2 parent 80 0 no-query no-digest no-netdb-exchange userhash sourcehash round-robin

My question is how exactly Squid is acting when there is defined more algorithms of Peer Selection (in this case userhash sourcehash round-robin) and how it will behave in case that there are define only two upstream proxies?
Just note that before all six proxies is network balancer which is masking source IP of client so sourcehash seems to be for me as nonsense since source IP is the same every time. User name is visible for proxies so userhash is feasible solution but not sure how much is optimal in case just two parent proxies.

Many thanks for sharing your opinions.
Login or Register for Dates, Times and to Reply

Previous Thread | Next Thread
Thread Tools Search this Thread
Search this Thread:
Advanced Search

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Masking algorithm

I have a requirement of masking few specific fields in the UNIX file. The details are as following- File is fixed length file with each record of 250 charater length. 2 fields needs to be masked – the positions are 21:30 and 110:120 The character by character making needs to be done which... (5 Replies)
Discussion started by: n78298
5 Replies

2. UNIX and Linux Applications

squid parent-child working?

Hi I have two squids, one configured as a parent and another its child. Whenever the child finds a PARENT_HIT, it does not seem to cache it in its memory, i.e; upon a second request seems to fetch it from the parent again. Is there some configuration directive that I am missing? Google and... (0 Replies)
Discussion started by: jamie_123
0 Replies

3. Homework & Coursework Questions

Heuristic Algorithm Example

Give a counter example such that the following heuristic algorithm, for the 2-tape problem, doesn't always produce the best solution: Algorithm: Sort {Xi} in descending order. Place files in tapes one at a time. For a file being considered, assign the file to the smaller tape. Thanks in... (1 Reply)
Discussion started by: sureshcisco
1 Replies

4. IP Networking

Squid vs iptables = no Squid access.log?

Hello, I have a pretty useless satellite link at home (far from any civilization), so I wanted to set up caching in order to speed things up. My Squid 2.6 runs "3128 transparent" and is set up quite well on a separate machine. I also have my dd-wrt router to move all port 80 traffic through... (0 Replies)
Discussion started by: theWojtek
0 Replies

5. Programming

Looking for Your Help on dijkstra algorithm

Can you help to adjust the void dijkstra(int s) function to find a path from source to every node so that the minimum cost on that path is maximum. Ex: From 1 to 2 we have 1 3 4 2 , costs(2+3+4+5) From 1 to 2 we have 1 5 6 2 , costs(3+3+4+5) I need the algorithm to choose path 1... (4 Replies)
Discussion started by: ali2011
4 Replies

6. Shell Programming and Scripting

forking a child process and kill its parent to show that child process has init() as its parent

Hi everyone i am very new to linux , working on bash shell. I am trying to solve the given problem 1. Create a process and then create children using fork 2. Check the Status of the application for successful running. 3. Kill all the process(threads) except parent and first child... (2 Replies)
Discussion started by: vizz_k
2 Replies

7. Programming

Please help me to develop algorithm

Hi guys , in my study book from which I re-learn C is task to generate all possible characters combination from numbers entered by the user. I know this algorithm must use combinatorics to calculate all permutations. Problem is how to implement algortihm. // This program reads the four numbers... (0 Replies)
Discussion started by: solaris_user
0 Replies

8. Shell Programming and Scripting

full path of a file situated either in parent's dir. or parent's parent dir. so on...

hi experts(novice people can stay away as it is no child's game), i am developing a script which works like recycle bin of windows. the problem i am facing is that when ever i am trying to delete a file which is situated in parent directory or parent's parent directory i am unable to... (1 Reply)
Discussion started by: yahoo!
1 Replies

9. Shell Programming and Scripting


PID USERNAME SIZE RSS STATE PRI NICE TIME CPU PROCESS/NLWP 21444 tomusr 213M 61M sleep 29 10 1:20:46 0.1% java/43 21249 root 93M 44M sleep 29 10 1:07:19 0.2% java/56 is there anyway i can use a command to get the total of the SIZE? 306M (Derive from... (5 Replies)
Discussion started by: filthymonk
5 Replies

10. Programming

FTP's algorithm

what algorithm a FTP application uses i mean whn implemented in socket programming..if you could give a little decription (1 Reply)
Discussion started by: toughguy2handle
1 Replies
pam_auth(8)						      System Manager's Manual						       pam_auth(8)

pam_auth - Squid PAM authentication helper SYNOPSIS
squid_pam_auth [-n "service name"] [-t TTL] [-o] [-1] DESCRIPTION
This helper allows Squid to connect to a mostly any available PAM database to validate the user name and password of Basic HTTP authentica- tion. -s service-name Specifies the PAM service name Squid uses, defaults to "squid" -t TTL Unless the -1 option is used, this specified for how long the connection to the PAM database should be kept open and reused for new logins. Defaults to 60 seconds. -o Do not perform the PAM account management group (account expiration etc) -1 Specifies "One shot" mode, where a new PAM connection will be opened for each new user. This is how PAM is normally used and may be required by some backend databases. The default is to reuse the PAM connection to maximize performance. (see -t above) CONFIGURATION
The program needs a PAM service to be configured in /etc/pam.conf or /etc/pam.d/<servicename> The default service name is "squid", and the program makes use of the 'auth' and 'account' management groups to verify the password and the accounts validity. For details on how to configure PAM services, see the PAM documentation for your system. This manual does not cover PAM configuration details. NOTES
When used for authenticating to local UNIX shadow password databases the program must be running as root or else it won't have sufficient permissions to access the user password database. Such use of this program is not recommended, but if you absolutely need to then make the program setuid root chown root pam_auth chmod u+s pam_auth Please note that in such configurations it is also strongly recommended that the program is moved into a directory where normal users can- not access it, as this mode of operation will allow any local user to brute-force other users passwords. Also note the program has not been fully audited and the author cannot be held responsible for any security issues due to such installations. AUTHOR
Squid pam_auth and this manual is written by Henrik Nordstrom <hno@squid-cache.org> COPYRIGHT
Squid pam_auth and this manual is Copyright 1999,2002 Henrik Nordstrom <hno@squid-cache.org> QUESTIONS
Questions on the usage of this program can be sent to the Squid Users <squid-users@squid-cache.org> mailing list. REPORTING BUGS
Report bugs or bug-fixes to Squid Bugs <squid-bugs@squid-cache.org> or ideas for new improvements to Squid Developers <squid-dev@squid- cache.org> SEE ALSO
pam(8), PAM Systems Administrator Guide Squid PAM Auth 15 May 2002 pam_auth(8)

Featured Tech Videos