ini haproxy.cfg

Posted

tags:

篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了ini haproxy.cfg相关的知识,希望对你有一定的参考价值。

# This is an example of the Stack Exchange Tier 1 HAProxy config
# The only things that have been changed from what we are running are: 
# 1. User names have been removed
# 2. All Passwords have been remove
# 3. IPs have been changed to use the example/documentation ranges
# 4. Rate limit numbers have been changed to randome numbers, don't read into them

userlist stats-auth
        group admin users $admin_user
        user $admin_user insecure-password $some_password
        group readonly users $some_user
        user $some_user insecure-password $some_other_password

global
        daemon
        stats socket /var/run/haproxy-t1.stat level admin
        maxconn 100000 
        pidfile /var/run/haproxy-t1.pid
        log 127.0.0.1 local0
        log  192.0.2.17   local0
	tune.bufsize 16384
        tune.maxrewrite 1024
        spread-checks 4
	log-send-hostname ny-lb05
        

defaults
        errorfile 503 /etc/haproxy-shared/errors/503.http
        errorfile 502 /etc/haproxy-shared/errors/502.http
        mode    http
        timeout connect 15s
        timeout client 60s
        timeout server 150s
        timeout queue 60s
        timeout http-request 15s
        timeout http-keep-alive 15s
	option httplog
        option redispatch
        option dontlognull
        balance source

backend be_api_1.1
	mode http
	balance roundrobin
        reqirep ^([^\ ]*)\ /1.0/(.*) \1\ /\2
        reqirep ^([^\ ]*)\ /1.1/(.*) \1\ /\2

	stick-table type ip size 999k expire 1m store conn_rate(30s)
	acl rate_limit_whitelist src -f /etc/haproxy-shared/whitelist-ips
	tcp-request content  track-sc2 src
	acl conn_rate_abuse  sc2_conn_rate gt 10
	acl mark_as_abuser   sc1_inc_gpc0 gt 3
	tcp-request content  reject if conn_rate_abuse !rate_limit_whitelist mark_as_abuser

	stats enable
	acl AUTH http_auth(stats-auth)
        acl AUTH_ADMIN http_auth_group(stats-auth) admin
        stats http-request auth unless AUTH
        stats admin if AUTH_ADMIN
	stats uri /ilovestats
	stats refresh 30s
	option httpchk HEAD /ping HTTP/1.1\r\nUser-Agent:HAProxy\r\nHost:api.stackoverflow.com

	server ny-web01 203.0.113.101:80 check
        server ny-web02 203.0.113.102:80 check
        server ny-web03 203.0.113.103:80 check
        server ny-web04 203.0.113.104:80 check
        server ny-web05 203.0.113.105:80 check
        server ny-web06 203.0.113.106:80 check
        server ny-web07 203.0.113.107:80 check
        server ny-web08 203.0.113.108:80 check
        server ny-web09 203.0.113.109:80 check
        

backend be_api
	mode http
	balance roundrobin

	stick-table type ip size 999k expire 1m store conn_rate(30s)
	acl rate_limit_whitelist src -f /etc/haproxy-shared/whitelist-ips
	tcp-request content  track-sc2 src
	acl conn_rate_abuse  sc2_conn_rate gt 10
	acl mark_as_abuser   sc1_inc_gpc0 gt 3
	tcp-request content  reject if conn_rate_abuse !rate_limit_whitelist mark_as_abuser

	stats enable
	acl AUTH http_auth(stats-auth)
        acl AUTH_ADMIN http_auth_group(stats-auth) admin
        stats http-request auth unless AUTH
        stats admin if AUTH_ADMIN
	stats uri /ilovestats
	stats refresh 30s
	option httpchk HEAD /ping HTTP/1.1\r\nUser-Agent:HAProxy\r\nHost:api.stackexchange.com

	server ny-web01 203.0.113.101:80 check
        server ny-web02 203.0.113.102:80 check
        server ny-web03 203.0.113.103:80 check
        server ny-web04 203.0.113.104:80 check
        server ny-web05 203.0.113.105:80 check
        server ny-web06 203.0.113.106:80 check
        server ny-web07 203.0.113.107:80 check
        server ny-web08 203.0.113.108:80 check
        server ny-web09 203.0.113.109:80 check
        

backend be_area51_stackexchange_com
	mode http

	stick-table type ip size 999k expire 1m store conn_rate(30s)
	acl rate_limit_whitelist src -f /etc/haproxy-shared/whitelist-ips
	tcp-request content  track-sc2 src
	acl conn_rate_abuse  sc2_conn_rate gt 10
	acl mark_as_abuser   sc1_inc_gpc0 gt 3
	tcp-request content  reject if conn_rate_abuse !rate_limit_whitelist mark_as_abuser

	stats enable
	acl AUTH http_auth(stats-auth)
        acl AUTH_ADMIN http_auth_group(stats-auth) admin
        stats http-request auth unless AUTH
        stats admin if AUTH_ADMIN
	stats uri /ilovestats
	stats refresh 30s
	option httpchk HEAD / HTTP/1.1\r\nUser-Agent:HAProxy\r\nHost:area51.stackexchange.com

	server ny-web01 203.0.113.101:80 check
        server ny-web02 203.0.113.102:80 check
        server ny-web03 203.0.113.103:80 check
        server ny-web04 203.0.113.104:80 check
        server ny-web05 203.0.113.105:80 check
        server ny-web06 203.0.113.106:80 check
        server ny-web07 203.0.113.107:80 check
        server ny-web08 203.0.113.108:80 check
        server ny-web09 203.0.113.109:80 check
        

backend be_careers
	mode http

	stick-table type ip size 999k expire 1m store conn_rate(30s)
	acl rate_limit_whitelist src -f /etc/haproxy-shared/whitelist-ips
	tcp-request content  track-sc2 src
	acl conn_rate_abuse  sc2_conn_rate gt 10
	acl mark_as_abuser   sc1_inc_gpc0 gt 3
	tcp-request content  reject if conn_rate_abuse !rate_limit_whitelist mark_as_abuser

	stats enable
	acl AUTH http_auth(stats-auth)
        acl AUTH_ADMIN http_auth_group(stats-auth) admin
        stats http-request auth unless AUTH
        stats admin if AUTH_ADMIN
	stats uri /ilovestats
	stats refresh 30s
	option httpchk HEAD /ping HTTP/1.1\r\nUser-Agent:HAProxy\r\nHost:careers.stackoverflow.com

	server ny-web01 203.0.113.101:80 check
        server ny-web02 203.0.113.102:80 check
        server ny-web03 203.0.113.103:80 check
        server ny-web04 203.0.113.104:80 check
        server ny-web05 203.0.113.105:80 check
        server ny-web06 203.0.113.106:80 check
        server ny-web07 203.0.113.107:80 check
        server ny-web08 203.0.113.108:80 check
        server ny-web09 203.0.113.109:80 check
        

backend be_internal_api
	mode http
	balance roundrobin
        option http-server-close

	stick-table type ip size 999k expire 1m store conn_rate(30s)
	acl rate_limit_whitelist src -f /etc/haproxy-shared/whitelist-ips
	tcp-request content  track-sc2 src
	acl conn_rate_abuse  sc2_conn_rate gt 10
	acl mark_as_abuser   sc1_inc_gpc0 gt 3
	tcp-request content  reject if conn_rate_abuse !rate_limit_whitelist mark_as_abuser

	stats enable
	acl AUTH http_auth(stats-auth)
        acl AUTH_ADMIN http_auth_group(stats-auth) admin
        stats http-request auth unless AUTH
        stats admin if AUTH_ADMIN
	stats uri /ilovestats
	stats refresh 30s
	option httpchk HEAD / HTTP/1.1\r\nUser-Agent:HAProxy\r\nHost:stackoverflow.com

	server ny-web01 203.0.113.101:80 check
        server ny-web02 203.0.113.102:80 check
        server ny-web03 203.0.113.103:80 check
        server ny-web04 203.0.113.104:80 check
        server ny-web05 203.0.113.105:80 check
        server ny-web06 203.0.113.106:80 check
        server ny-web07 203.0.113.107:80 check
        server ny-web08 203.0.113.108:80 check
        server ny-web09 203.0.113.109:80 check
        

backend be_meta_so
	mode http

	stick-table type ip size 999k expire 1m store conn_rate(30s)
	acl rate_limit_whitelist src -f /etc/haproxy-shared/whitelist-ips
	tcp-request content  track-sc2 src
	acl conn_rate_abuse  sc2_conn_rate gt 10
	acl mark_as_abuser   sc1_inc_gpc0 gt 3
	tcp-request content  reject if conn_rate_abuse !rate_limit_whitelist mark_as_abuser

	stats enable
	acl AUTH http_auth(stats-auth)
        acl AUTH_ADMIN http_auth_group(stats-auth) admin
        stats http-request auth unless AUTH
        stats admin if AUTH_ADMIN
	stats uri /ilovestats
	stats refresh 30s
	option httpchk HEAD / HTTP/1.1\r\nUser-Agent:HAProxy\r\nHost:meta.stackoverflow.com

	server ny-web10 203.0.113.110:80 check
        server ny-web11 203.0.113.111:80 check
        

backend be_mobile
	mode http

	stick-table type ip size 999k expire 1m store conn_rate(30s)
	acl rate_limit_whitelist src -f /etc/haproxy-shared/whitelist-ips
	tcp-request content  track-sc2 src
	acl conn_rate_abuse  sc2_conn_rate gt 10
	acl mark_as_abuser   sc1_inc_gpc0 gt 3
	tcp-request content  reject if conn_rate_abuse !rate_limit_whitelist mark_as_abuser

	stats enable
	acl AUTH http_auth(stats-auth)
        acl AUTH_ADMIN http_auth_group(stats-auth) admin
        stats http-request auth unless AUTH
        stats admin if AUTH_ADMIN
	stats uri /ilovestats
	stats refresh 30s
	option httpchk HEAD / HTTP/1.1\r\nUser-Agent:HAProxy\r\nHost:mobile.stackexchange.com

	server ny-web01 203.0.113.101:80 check
        server ny-web02 203.0.113.102:80 check
        server ny-web03 203.0.113.103:80 check
        server ny-web04 203.0.113.104:80 check
        server ny-web05 203.0.113.105:80 check
        server ny-web06 203.0.113.106:80 check
        server ny-web07 203.0.113.107:80 check
        server ny-web08 203.0.113.108:80 check
        server ny-web09 203.0.113.109:80 check
        

backend be_openid
	mode http
	balance roundrobin

	stick-table type ip size 999k expire 1m store conn_rate(30s)
	acl rate_limit_whitelist src -f /etc/haproxy-shared/whitelist-ips
	tcp-request content  track-sc2 src
	acl conn_rate_abuse  sc2_conn_rate gt 10
	acl mark_as_abuser   sc1_inc_gpc0 gt 3
	tcp-request content  reject if conn_rate_abuse !rate_limit_whitelist mark_as_abuser

	stats enable
	acl AUTH http_auth(stats-auth)
        acl AUTH_ADMIN http_auth_group(stats-auth) admin
        stats http-request auth unless AUTH
        stats admin if AUTH_ADMIN
	stats uri /ilovestats
	stats refresh 30s
	option httpchk HEAD /ping HTTP/1.1\r\nUser-Agent:HAProxy\r\nHost:openid.stackexchange.com

	server ny-web01 203.0.113.101:80 check
        server ny-web02 203.0.113.102:80 check
        server ny-web03 203.0.113.103:80 check
        server ny-web04 203.0.113.104:80 check
        server ny-web05 203.0.113.105:80 check
        server ny-web06 203.0.113.106:80 check
        server ny-web07 203.0.113.107:80 check
        server ny-web08 203.0.113.108:80 check
        server ny-web09 203.0.113.109:80 check
        

backend be_others
	mode http

	stick-table type ip size 999k expire 1m store conn_rate(30s)
	acl rate_limit_whitelist src -f /etc/haproxy-shared/whitelist-ips
	tcp-request content  track-sc2 src
	acl conn_rate_abuse  sc2_conn_rate gt 10
	acl mark_as_abuser   sc1_inc_gpc0 gt 3
	tcp-request content  reject if conn_rate_abuse !rate_limit_whitelist mark_as_abuser

	stats enable
	acl AUTH http_auth(stats-auth)
        acl AUTH_ADMIN http_auth_group(stats-auth) admin
        stats http-request auth unless AUTH
        stats admin if AUTH_ADMIN
	stats uri /ilovestats
	stats refresh 30s
	option httpchk HEAD / HTTP/1.1\r\nUser-Agent:HAProxy\r\nHost:serverfault.com

	server ny-web01 203.0.113.101:80 check
        server ny-web02 203.0.113.102:80 check
        server ny-web03 203.0.113.103:80 check
        server ny-web04 203.0.113.104:80 check
        server ny-web05 203.0.113.105:80 check
        server ny-web06 203.0.113.106:80 check
        server ny-web07 203.0.113.107:80 check
        server ny-web08 203.0.113.108:80 check
        server ny-web09 203.0.113.109:80 check
        

backend be_so
	mode http

	stick-table type ip size 999k expire 1m store conn_rate(30s)
	acl rate_limit_whitelist src -f /etc/haproxy-shared/whitelist-ips
	tcp-request content  track-sc2 src
	acl conn_rate_abuse  sc2_conn_rate gt 10
	acl mark_as_abuser   sc1_inc_gpc0 gt 3
	tcp-request content  reject if conn_rate_abuse !rate_limit_whitelist mark_as_abuser

	stats enable
	acl AUTH http_auth(stats-auth)
        acl AUTH_ADMIN http_auth_group(stats-auth) admin
        stats http-request auth unless AUTH
        stats admin if AUTH_ADMIN
	stats uri /ilovestats
	stats refresh 30s
	option httpchk HEAD / HTTP/1.1\r\nUser-Agent:HAProxy\r\nHost:stackoverflow.com

	server ny-web01 203.0.113.101:80 check
        server ny-web02 203.0.113.102:80 check
        server ny-web03 203.0.113.103:80 check
        server ny-web04 203.0.113.104:80 check
        server ny-web05 203.0.113.105:80 check
        server ny-web06 203.0.113.106:80 check
        server ny-web07 203.0.113.107:80 check
        server ny-web08 203.0.113.108:80 check
        server ny-web09 203.0.113.109:80 check
        

backend be_so_crawler
	mode http
	balance roundrobin

	stick-table type ip size 999k expire 1m store conn_rate(30s)
	acl rate_limit_whitelist src -f /etc/haproxy-shared/whitelist-ips
	tcp-request content  track-sc2 src
	acl conn_rate_abuse  sc2_conn_rate gt 10
	acl mark_as_abuser   sc1_inc_gpc0 gt 3
	tcp-request content  reject if conn_rate_abuse !rate_limit_whitelist mark_as_abuser

	stats enable
	acl AUTH http_auth(stats-auth)
        acl AUTH_ADMIN http_auth_group(stats-auth) admin
        stats http-request auth unless AUTH
        stats admin if AUTH_ADMIN
	stats uri /ilovestats
	stats refresh 30s
	option httpchk HEAD / HTTP/1.1\r\nUser-Agent:HAProxy\r\nHost:stackoverflow.com

	server ny-web01 203.0.113.101:80 check
        server ny-web02 203.0.113.102:80 check
        server ny-web03 203.0.113.103:80 check
        server ny-web04 203.0.113.104:80 check
        server ny-web05 203.0.113.105:80 check
        server ny-web06 203.0.113.106:80 check
        server ny-web07 203.0.113.107:80 check
        server ny-web08 203.0.113.108:80 check
        server ny-web09 203.0.113.109:80 check
        

backend be_sstatic
	mode http
	balance roundrobin
        acl HTTP_OK status 200:399
        rspidel ^Cache-Control:.* unless HTTP_OK

	stats enable
	acl AUTH http_auth(stats-auth)
        acl AUTH_ADMIN http_auth_group(stats-auth) admin
        stats http-request auth unless AUTH
        stats admin if AUTH_ADMIN
	stats uri /ilovestats
	stats refresh 30s
	option httpchk HEAD / HTTP/1.1\r\nUser-Agent:HAProxy\r\nHost:sstatic.net

	server ny-web01 203.0.113.101:80 check
        server ny-web02 203.0.113.102:80 check
        server ny-web03 203.0.113.103:80 check
        server ny-web04 203.0.113.104:80 check
        server ny-web05 203.0.113.105:80 check
        server ny-web06 203.0.113.106:80 check
        server ny-web07 203.0.113.107:80 check
        server ny-web08 203.0.113.108:80 check
        server ny-web09 203.0.113.109:80 check
        

backend be_stackauth
	mode http
	balance roundrobin
        reqirep ^([^\ ]*)\ /1.0/(.*) \1\ /\2

	stick-table type ip size 999k expire 1m store conn_rate(30s)
	acl rate_limit_whitelist src -f /etc/haproxy-shared/whitelist-ips
	tcp-request content  track-sc2 src
	acl conn_rate_abuse  sc2_conn_rate gt 10
	acl mark_as_abuser   sc1_inc_gpc0 gt 3
	tcp-request content  reject if conn_rate_abuse !rate_limit_whitelist mark_as_abuser

	stats enable
	acl AUTH http_auth(stats-auth)
        acl AUTH_ADMIN http_auth_group(stats-auth) admin
        stats http-request auth unless AUTH
        stats admin if AUTH_ADMIN
	stats uri /ilovestats
	stats refresh 30s
	option httpchk HEAD /ping HTTP/1.1\r\nUser-Agent:HAProxy\r\nHost:stackauth.com

	server ny-web01 203.0.113.101:80 check
        server ny-web02 203.0.113.102:80 check
        server ny-web03 203.0.113.103:80 check
        server ny-web04 203.0.113.104:80 check
        server ny-web05 203.0.113.105:80 check
        server ny-web06 203.0.113.106:80 check
        server ny-web07 203.0.113.107:80 check
        server ny-web08 203.0.113.108:80 check
        server ny-web09 203.0.113.109:80 check
        

frontend fe_stackauth
	bind 198.51.100.21:80 name stackauth
	bind 198.51.100.145:80 name stackauth
	
	
	log global
	
	stick-table type ip size 999k expire 1m store conn_rate(30s)

        capture request header Referer               len 64
        capture request header User-Agent            len 128
        capture request header Host                  len 64
        capture request header X-Forwarded-For       len 64
        capture request header Accept-Encoding       len 64
        capture response header Content-Encoding     len 64
        capture response header X-Page-View          len 1
        capture response header X-Route-Name         len 64
        capture response header X-Account-Id         len 7     
        capture response header X-Sql-Count          len 4
        capture response header X-Sql-Duration-Ms    len 7
        capture response header X-AspNet-Duration-Ms len 7
        capture response header X-Application-Id     len 5
        capture response header X-Request-Guid       len 36
        capture response header X-Redis-Count        len 4
        capture response header X-Redis-Duration-Ms  len 7
        capture response header X-Http-Count         len 4
        capture response header X-Http-Duration-Ms   len 7
        capture response header X-TE-Count           len 4
        capture response header X-TE-Duration-Ms     len 7

	rspidel ^(X-Page-View|Server|X-Route-Name|X-Account-Id|X-Sql-Count|X-Sql-Duration-Ms|X-AspNet-Duration-Ms|X-Application-Id|X-Request-Guid|X-Redis-Count|X-Redis-Duration-Ms|X-Http-Count|X-Http-Duration-Ms|X-TE-Count|X-TE-Duration-Ms):

	maxconn 40000
	
	option http-server-close
	option forwardfor
	option httplog

	
        acl source_is_serious_abuse src_conn_rate(fe_stackauth) gt 20


        acl rate_limit_whitelist src -f /etc/haproxy-shared/whitelist-ips

        acl api_only_ips src -f /etc/haproxy-shared/api-only-ips
        acl api_only_whitelist src -f /etc/haproxy-shared/api-only-whitelist

        acl is_crawler src -f /etc/haproxy-shared/crawlers
        acl is_crawler_ua hdr(user-agent) -f /etc/haproxy-shared/crawlers_ua
        
        acl source_is_abuser src_get_gpc0(fe_stackauth) gt 0

 

 

 

	


        tcp-request connection track-sc1 src if !source_is_abuser
	
 
	default_backend be_stackauth
frontend http-in
	bind 198.51.100.16:80 name stackexchange
	bind 198.51.100.17:80 name careers
	bind 198.51.100.30:80 name careers.sstatic.net
	bind 198.51.100.18:80 name openid
	bind 198.51.100.24:80 name misc
	bind 198.51.100.140:80 name stackexchange
	bind 198.51.100.141:80 name careers
	bind 198.51.100.154:80 name careers.sstatic.net
	bind 198.51.100.142:80 name openid
	bind 198.51.100.148:80 name misc
	
	
	log global
	
	stick-table type ip size 999k expire 1m store conn_rate(30s)

        capture request header Referer               len 64
        capture request header User-Agent            len 128
        capture request header Host                  len 64
        capture request header X-Forwarded-For       len 64
        capture request header Accept-Encoding       len 64
        capture response header Content-Encoding     len 64
        capture response header X-Page-View          len 1
        capture response header X-Route-Name         len 64
        capture response header X-Account-Id         len 7     
        capture response header X-Sql-Count          len 4
        capture response header X-Sql-Duration-Ms    len 7
        capture response header X-AspNet-Duration-Ms len 7
        capture response header X-Application-Id     len 5
        capture response header X-Request-Guid       len 36
        capture response header X-Redis-Count        len 4
        capture response header X-Redis-Duration-Ms  len 7
        capture response header X-Http-Count         len 4
        capture response header X-Http-Duration-Ms   len 7
        capture response header X-TE-Count           len 4
        capture response header X-TE-Duration-Ms     len 7

	rspidel ^(X-Page-View|Server|X-Route-Name|X-Account-Id|X-Sql-Count|X-Sql-Duration-Ms|X-AspNet-Duration-Ms|X-Application-Id|X-Request-Guid|X-Redis-Count|X-Redis-Duration-Ms|X-Http-Count|X-Http-Duration-Ms|X-TE-Count|X-TE-Duration-Ms):

	maxconn 40000
	
	option http-server-close
	option forwardfor
	option httplog

	
        acl source_is_serious_abuse src_conn_rate(http-in) gt 1000


        acl rate_limit_whitelist src -f /etc/haproxy-shared/whitelist-ips

        acl api_only_ips src -f /etc/haproxy-shared/api-only-ips
        acl api_only_whitelist src -f /etc/haproxy-shared/api-only-whitelist

        acl is_crawler src -f /etc/haproxy-shared/crawlers
        acl is_crawler_ua hdr(user-agent) -f /etc/haproxy-shared/crawlers_ua
        
        acl source_is_abuser src_get_gpc0(http-in) gt 2

	acl is_feeds path_beg /feeds/
	acl is_internal_api path_beg /api/
	acl is_careers hdr_beg(host) -i careers. jobs.
	acl is_so hdr_end(host) -i stackoverflow.com
	acl is_sstatic hdr_end(host) -i sstatic.net
	acl is_stackauth hdr_end(host) -i stackauth.com
	acl is_se hdr_end(host) -i stackexchange.com
	acl is_area51 hdr(host) -i area51.stackexchange.com
	acl is_mobile hdr(host) -i mobile.stackexchange.com
	acl is_stackexchange_com hdr(host) -i stackexchange.com
	acl is_meta_so hdr_end(host) -i meta.stackoverflow.com
	acl is_dev_meta_webapps hdr_end(host) -i meta.dev.webapps.stackexchange.com
	acl is_dev_fb hdr_end(host) -i fb.dev.stackoverflow.com
	acl is_api_2 hdr(host) -i api.stackexchange.com
	acl is_api hdr_sub(host) -i api
	acl is_api_1.0 path_beg /1.0/
	acl is_api_1.1 path_beg /1.1/
	acl is_api_root path /
	acl is_api_static path_beg -i /admin /content /crossdomain.xml /clientaccesspolicy.xml /robots.txt
	acl is_dev hdr_beg(host) -i dev.
	acl is_dev_discuss hdr_end(host) -i discuss.dev.area51.stackexchange.com
	acl is_openid hdr_beg(host) -i openid.stackexchange.com
	acl is_80 dst_port 80
	acl is_ssl hdr_beg(X-SSL) -i yes
	acl is_chat_yodeya hdr(host) -i chat.yodeya.com chat.miyodeya.com
	acl is_bam_yodeya hdr(host) -i bam.yodeya.com bam.miyodeya.com
	acl is_launchparty_yodeya hdr(host) -i launchparty.yodeya.com launchparty.miyodeya.com
	acl is_me_yodeya hdr(host) -i me.yodeya.com me.miyodeya.com
	acl is_kindle hdr_sub(user-agent) Silk-Accelerated
	acl is_akamai hdr(host) -i sstatic-a.akamaihd.net
 

 

	redirect prefix http://chat.stackexchange.com/rooms/468 code 301 if is_chat_yodeya
	redirect prefix http://chat.stackexchange.com/rooms/468 code 301 if is_bam_yodeya
	redirect prefix http://meta.judaism.stackexchange.com/questions/1134 code 301 if is_launchparty_yodeya
	redirect prefix http://judaism.stackexchange.com code 301 if is_me_yodeya
	redirect prefix https://openid.stackexchange.com code 301 if is_80 is_openid !is_ssl
 

	

        tcp-request connection track-sc1 src if !source_is_abuser
	
	use_backend be_internal_api if is_internal_api !is_careers
	use_backend be_api_1.1 if is_api is_api_1.0
	use_backend be_api_1.1 if is_api is_api_1.1
	use_backend be_api if is_api_2
	use_backend be_api_1.1 if is_api is_api_static
	use_backend be_api_1.1 if is_api is_api_root
	use_backend be_bad_api if is_api
	use_backend be_sstatic if is_sstatic
	use_backend be_sstatic if is_akamai
	use_backend be_mobile if is_mobile
	use_backend be_area51_stackexchange_com if is_area51
	use_backend be_area51_stackexchange_com if is_stackexchange_com
	use_backend be_meta_so if is_meta_so
	use_backend be_careers if is_careers
	use_backend be_so_crawler if is_so is_crawler
	use_backend be_so_crawler if is_so is_crawler_ua
	use_backend be_so if is_so
	use_backend be_stackauth if is_stackauth
	use_backend be_openid if is_openid
 
	default_backend be_others
backend be_api_only
	mode http
	errorfile 503 /etc/haproxy-shared/errors/503apionly.http

backend be_bad_api
	mode http
	errorfile 403 /etc/haproxy-shared/errors/403.http

backend be_go-away
	mode http
	errorfile 503 /etc/haproxy-shared/errors/503rate.http

backend be_no_ssl
	mode http
	errorfile 503 /etc/haproxy-shared/errors/503nossl.http

listen t1_internal_stats
	bind 203.0.113.15:7001
	


	mode http
	balance roundrobin

 
	


        stats enable
        stats uri /ilovestats
        acl AUTH http_auth(stats-auth)
        acl AUTH_ADMIN http_auth_group(stats-auth) admin
        stats http-request auth unless AUTH
        stats admin if AUTH_ADMIN

ini 自定义Rancher负载均衡器haproxy.cfg

backend www-redirect
    http-request redirect prefix https://%[hdr(host),regsub(^www\.,,i)] code 302 if { hdr_beg(host) -i www. }
    
backend https-redirect
    http-request redirect scheme https code 302 if !{ ssl_fc }

以上是关于ini haproxy.cfg的主要内容,如果未能解决你的问题,请参考以下文章

ini haproxy.cfg

ini haproxy.cfg

ini 自定义Rancher负载均衡器haproxy.cfg

ini 自定义Rancher负载均衡器haproxy.cfg

ini haproxy.cfg节将启用Perfect Forward Secrecy和HTTP严格传输安全性。需要OpenSSL 1.0.1g左右。

Haproxy配置文件(haproxy.cfg)