Quantcast
Channel: HAProxy community - Latest topics
Viewing all articles
Browse latest Browse all 4849

Matching TCP payload

$
0
0

Hello,

I need help of someone who knows haproxy better, tried various configs.

I have a TCP application where the client sends binary packet as soon as it connects, exactly 18 bytes (2 size + 16 payload).

Im trying like this:


tcp-request inspect-delay 10s

tcp-request content capture req.payload(0,18),hex len 18

log-format "[%t] Connection on port %fp from ip %ci forwarded to %si:%sp with data %[capture.req.hdr(0)]"

But I get this: “100000000000ADDEAD” which is wrong because “DEAD” starts at byte 4 (its 0xDEADDEAD in uint32_t).

Where do these zeros at the beginning come from? Why is the packet not complete?

1 post - 1 participant

Read full topic


Viewing all articles
Browse latest Browse all 4849

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>