Em Sexta, Junho de 7 de 2013 11:59 WEST, Amos Jeffries <squid3@xxxxxxxxxxxxx> escreveu: > On 7/06/2013 10:55 p.m., Nuno Fernandes wrote: > >> Good. That should be preventing loops. > >> > >> The ALL,2 will include the details from 11,2 I mentioned. So your log > >> should contain the outgoing request details. > >> > >> Amos > >> > > > > Argg... i will have to check 4G of logfile :( > > I will try to replicate with a devel machine and post back later. > > If it helps the info contains the text "Server HTTP Request" and also > the 10.10.10.4 IP address. From there you can get the URL and outbound > headers, then find them when they enter Squid (earlier, or next in the loop) > > Amos Ok.. cleaned up the cache.log to the event. Still have a logfile: $ ls -lah cache.log -rw-rw-r--. 1 npf npf 898M Jun 7 13:17 cache.log Found a weird pattern: $ grep "Found sources for" cache.log 2013/06/06 09:14:06.187 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for 'http://a0.twimg.com/profile_images/1672051105/devops_jesus_normal.gif' 2013/06/06 09:14:06.209 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for 'http://a0.twimg.com/profile_images/3306882991/17ea8b2a795798d831878ec3eaed6367_normal.jpeg' 2013/06/06 09:14:06.463 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for '://131.253.61.84:443' 2013/06/06 09:14:06.932 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for 'http://bit.ly/pGGUtf' 2013/06/06 09:14:06.934 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for 'http://bit.ly/pamFoM' 2013/06/06 09:14:06.935 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for 'http://bit.ly/qgXFnn' 2013/06/06 09:14:07.111 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for 'http://truetwit.com/vy84394311' 2013/06/06 09:14:07.377 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for '://157.56.123.82:443' 2013/06/06 09:14:07.379 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for 'http://t.co/276oPoN' 2013/06/06 09:14:07.380 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for '://199.16.156.11:443' 2013/06/06 09:14:07.432 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for 'http://truetwit.com/truetwit/validate/index.form?id=84394311' 2013/06/06 09:14:07.487 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for 'http://t.co/M75a3wq' 2013/06/06 09:14:07.669 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for '://10.10.10.254:3126' 2013/06/06 09:14:07.669 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for '://10.10.10.254:3126' 2013/06/06 09:14:07.670 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for '://10.10.10.254:3126' 2013/06/06 09:14:07.671 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for '://10.10.10.254:3126' 2013/06/06 09:14:07.671 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for '://10.10.10.254:3126' 2013/06/06 09:14:07.672 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for '://10.10.10.254:3126' 2013/06/06 09:14:07.673 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for '://10.10.10.254:3126' 2013/06/06 09:14:07.674 kid1| peer_select.cc(289) peerSelectDnsPaths: Found sources for '://10.10.10.254:3126' ... and it goes on this All the https request are truncated in the log. This maybe a different problem altogether. Still working on this. Best regards, Nuno Fernandes