SlideShare a Scribd company logo
Integrated Cache Training –
Netscaler Webinar




                   Mark Hillick
Agenda of Cash, sorry Cache
 •  Goals of Caching

    q Why & What

 •  Cache Policies

 •  How long to cache

 •  Memory for Cache

 •  IC configuration
   example

 •  Cache Statistics

 •  Troubleshooting IC
                 © 2007 Citrix Systems, Inc. — All rights reserved   2
Presentation Goal


 Please be aware that this a technical presentation with lots of detail
 and it is intended that it can be used as a reference guide at a later
 date (e.g. when you're on-site).

 Sadly, it s not like my usual Zen presentation with lots of funny
 pictures and jokes, sorry L




                 © 2007 Citrix Systems, Inc. — All rights reserved        3
Caching Goals


 •  Caching would be useless if it did not significantly improve
   performance.

 •  Goal => to eliminate the need to send requests in many cases.

    q Reduces the number of network round-trips required for many
      operations - we use an "expiration" mechanism for this
      purpose

 •  Goal => remove the need to send full responses in many other
   cases.

    q  The latter reduces network bandwidth requirements - we use
      a "validation" mechanism for this purpose
                  © 2007 Citrix Systems, Inc. — All rights reserved   4
Caching is Used Everywhere


 •  Local cache in your browser

 •  Cache in the office (Forward Proxy or Transparent)

 •  Cache at the ISP (Transparent)

 •  Cache at the origin (Reverse Proxy or Transparent)

 •  Cache integrated inside a traffic manager – much better J




                © 2007 Citrix Systems, Inc. — All rights reserved   5
Caching Benefits.


  1.  Saves Bandwidth


  2.  Reduces traffic to back-end server & so saves processing
        resources


  3.  Protects back-end servers from flash crowds


  4.    Improves the response time & Increases site capacity


   P.S. Even more benefits when integrated within a LB J


                © 2007 Citrix Systems, Inc. — All rights reserved   6
IC in Packet-Processing
                              TCP Processing


                                 SSL Decrypt


                                HTTP Parsing


                               AAA Processing


                             Cache Redirection


                              Content Switching


                             Application Firewall


                             Responder Action?


                                   Cache Hit?


                         HTTP Cache Req Policies


                              Rewrite Policy Eval


                                 Load Balancing


                                Content Filtering



          © 2007 Citrix Systems, Inc. — All rights reserved   7
Non-Caching Proxy



GET /foo/index.html HTTP/1.1                                         GET /foo/index.html HTTP/1.1
    Host: www.example.com                                                Host: www.example.com

                                                     Proxy	




     HTTP/1.1 200 OK                                                      HTTP/1.1 200 OK
 Last-Modified: Thu, ...                                              Last-Modified: Thu, ...
  Content-Length: 3688                                                 Content-Length: 3688
 Content-Type: text/html                                              Content-Type: text/html




                 © 2007 Citrix Systems, Inc. — All rights reserved                                  8
Caching Proxy: Miss



GET /foo/index.html HTTP/1.1                                         GET /foo/index.html HTTP/1.1
    Host: www.example.com                                                Host: www.example.com

                                                     Proxy	




     HTTP/1.1 200 OK                                                      HTTP/1.1 200 OK
 Last-Modified: Thu, ...                                              Last-Modified: Thu, ...
  Content-Length: 3688                                                 Content-Length: 3688
 Content-Type: text/html                                              Content-Type: text/html


                                              Proxy  Cache	
                                              (Saves  copy)	

                 © 2007 Citrix Systems, Inc. — All rights reserved                                  9
Caching Proxy: Hit



GET /foo/index.html HTTP/1.1
    Host: www.example.com

                                                     Proxy	




     HTTP/1.1 200 OK
 Last-Modified: Thu, ...
  Content-Length: 3688
 Content-Type: text/html


                                             Proxy  Cache	
                                             (Fresh  copy!)	

                 © 2007 Citrix Systems, Inc. — All rights reserved   10
HTTP Response after a hit
•  wget -S --header="If-None-Match:23834-b1-4951a45768b8d" -U
  Mozilla http://10.90.196.68/index.html

•  HTTP/1.1 200 OK
………

•  Via: NS-CACHE-9.2: 65
•  ETag: "23834-b1-4951a45768b8d"
•  Server: Apache/2.2.14 (Ubuntu)
......... OR .........

•  ETag: "23834-b1-4951a45768b8d"
•  2011-04-26 18:22:56 ERROR 304: Not Modified.
………

                         © 2007 Citrix Systems, Inc. — All rights reserved   11
HTTP Response after a miss

•  $ wget -S --header="If-None-Match:23834-b1-4951a45768b8d" -U
  Mozilla http://10.90.196.68/index.html
……….
•  HTTP/1.1 200 OK
•  Date: Wed, 27 Apr 2011 09:30:59 GMT
•  Server: Apache/2.2.14 (Ubuntu)
•  Last-Modified: Mon, 15 Nov 2010 16:52:53 GMT
………..
•  Saving to: `index.html.41


                  © 2007 Citrix Systems, Inc. — All rights reserved   12
What Not to Cache

•  Cache-Control: no-store                                   =>applies to entire message (req/resp)
•  Cache-Control: no-cache =>server cannot respond with cached
  response
•  Cache-Control: Private => not by shared cache
    q More info see -
      http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html
•  POST request.
•  Don t cache if set-cookie exists
•  Don t cache all 5xx response codes, example 503 (Gateway time out)

•  By default, NS ignores cache-control headers in requests -> CG
  Settings
                   © 2007 Citrix Systems, Inc. — All rights reserved                                  13
Freshness

•  Describes how long the associated representation is fresh for.

   q No need to send a request to server if object has not expired

   q Saves time


•  Expires: Fri, 30 Oct 1998 14:19:41 GMT


•  Cache-Control: max-age=3600



                   © 2007 Citrix Systems, Inc. — All rights reserved   14
Validation

•  Validation – once expired, validator can be used to check with the
  server if the object is still valid.


   q  Send conditional request and get a short “304 Not Modified”
     response
   q  Saves bandwidth

•  If-Modified-Since <Date>


•  If-None-Match <Etag>


                    © 2007 Citrix Systems, Inc. — All rights reserved   15
Caching Proxy: Validation



GET /foo/index.html HTTP/1.1                                         GET /foo/index.html HTTP/1.1
    Host: www.example.com                                                Host: www.example.com
                                                                     If-Modified-Since: Thu, ...
                                                     Proxy	




     HTTP/1.1 200 OK                                                  HTTP/1.1 304 Not Modified
 Last-Modified: Thu, ...                                                   Date: Fri, ...
  Content-Length: 3688
 Content-Type: text/html


                                              Proxy  Cache	
                                              (Saves  copy)	

                 © 2007 Citrix Systems, Inc. — All rights reserved                                  16
Cacheability Policies
•  Specifies if response is cacheable.
    q  Request or Response-based policy
•  CG is DEFAULT by default J but can be changed.
•  Action types
     q  CACHE: Transaction is cacheable. Store the object
     q  NOCACHE: Transaction is non-cacheable.
     q  MAY_NOCACHE
        o  For request based policies only
        o  The response may be cacheable. The default if no response
          cacheability policy matches is to not cache the response.
    q  MAY_CACHE
      o  For request based policies only
      o  The response may be cacheable. The default if no response
          cacheability policy matches is to cache the response.
    q  INVAL
      o  Mark the object as invalid
                   © 2007 Citrix Systems, Inc. — All rights reserved   17
Cache Decision Time

•  Cache, Nocache, Inval
    q  Cache decision @ request time & unless something that prevents decision
      like CL mistmatch, no policy eval @ response time



•  MAY_CACHE, MAY_NOCACHE
    q  Cache decision @ response time




                  © 2007 Citrix Systems, Inc. — All rights reserved         18
Invalidate versus Expire

•  Invalidate
    q  Invalidate will invalidate the object/"all objects in contentgroup".
    q  But the way it is done is it is optimized such a way that we don't look at
       each object and remove it but when you run expire command or when new
       request comes for the invalid object, it is then removed.

    q  We serve a full response (200) to client regardless of cache hit.

•  Expire
    q  Only mark the object as expired
    q  Request comes in & instead of getting full response (i.e what we do for
       invalid object) we will send if-modified-since/if-none-match conditional
       request to back-end server. i.e can receive a 304.


                   © 2007 Citrix Systems, Inc. — All rights reserved                 19
Content Group
•  Every cached object => member of CG
    q  No CG, object => Default
    q  minhit – no. of hits before store
•  Properties of objects can be controlled per contentgroup
•  Dynamic versus Static - parametised
•  Configurations per content-group are
    q  Expiry settings
    q  Portions of object considered for caching as well as Invalidation
       [Parameterized Caching]
    q  Pre-fetch objects before it gets expired (event-driven)
    q  Inserting headers (e.g. Via header)
    q  Memory related configuration for the objects and for this whole groups


                   © 2007 Citrix Systems, Inc. — All rights reserved             20
Flash Cache (FC)
•  FC
    q Improves performance –> 1 req to back-end server
    q Concurrent requests queued on NS & single response served
    q set/add cache contentgroup <group_name> -flashCache YES


    q POWERFUL




    q Cannot enable with PET (ensures IC polls origin before serving)



                 © 2007 Citrix Systems, Inc. — All rights reserved       21
Some Other CG settings
•  Expiry settings (blank by default)
q Relexpiry – relative -> overrides server response settings
q heurexpiryParam - %
q Expire after complete response received
•  If no expiry settings & none in response => cache miss but can do
  validation (non-fc)

•  Cache controls
q No cache depending on size or hits
q Mem limit usage per group
•  Works with FC J but probably not wise on significant groupsExpire
  after complete response received


                  © 2007 Citrix Systems, Inc. — All rights reserved     22
Cache Policies

•  Built-In (begin with “__” & “ctx_”)
    q Greatly enhanced in 9.3 – should be sufficient for most


•  Bound globally or per vServer
    q Easy-To-Administer & View within Global Policy Manager


•  PI-based expression engine like other NS features




                  © 2007 Citrix Systems, Inc. — All rights reserved   23
Cache

•  Built-In (begin with “__” )
    q Greatly enhanced in 9.3 – should be sufficient for most


•  Bound globally or per vServer
    q Easy-To-Administer & View within Global Policy Manager


•  PI-based expression engine like other NS features




                   © 2007 Citrix Systems, Inc. — All rights reserved   24
Verification

•  Three Verification Options (again sh cache pa)


    q Hostname (Sufficient for Most Companies)


    q Hostname & IP (Default)


    q DNS (Most Secure)




                 © 2007 Citrix Systems, Inc. — All rights reserved   25
Flushing the Cache
•  Flush Cache
   q Remove stale content manually
   q Troubleshooting (preferred flush, disable, enable)
   q CLI – either CG or Object
       o  flush cache contentGroup content_group_html
       o  flush cache contentGroup ALL
       o  flush cache object –locator <0x….>
   q GUI – IC > Cache Objects


•  Automatic CG flush once CG configuration is modified

                 © 2007 Citrix Systems, Inc. — All rights reserved   26
Cache Memory Management (1)
•  BSD & PPE First
•  7500 with 8gb RAM & 3 PE
    q 2gb for kernel, 3gb for PE & max 3gb for IC
    q Each PE has minimum of 1gb


•  17500 – 48gb mem & 11 PE
    q 2gb for kernel, 23gb to PE & IC can take up to 23gb
    q Each PE cannot exceed 3.2gb address space


•  IC takes up what’s left (!>0.5)

                     © 2007 Citrix Systems, Inc. — All rights reserved   27
Cache Memory Management (2)
•  > set cache pa –memLimit 254
•  > sh cache pa | grep -i mem
      Memory usage limit: 10000 MBytes

      Memory usage limit (active value): 10000 Mbytes                                 => reboot

      Maximum value for Memory usage limit: 15662 MBytes

•  > sh cache contentgroup
•  Memory Allocation Issues
q cli> stat cache –detail | grep alloc

    Memory allocation failures                                           5741   => cache misses



                     © 2007 Citrix Systems, Inc. — All rights reserved                             28
Cache Selectors
•  Best practice to configure selectors (preferred over parameters)
    •  Named filter – locates particular objects in CG, not exact match
    •  Associate selector based on the request, not with responses
    •  Sample selectors
        •  http.req.url; http.req.method; client.ip.dst etc
•  Use cases
    q One file only cached once regardless of hostname
    q Two copies of same file – compressed & uncompressed
    q Same file, same hostname but different VIPs & CGs



                  © 2007 Citrix Systems, Inc. — All rights reserved       29
“Not Cache” Best Practice
•  Not Cache policies first
    q Once IC is turned on, it will begin to cache as per the default
       policies.

        o  This may cause confidential content to be cached by
           accidentThen cache known, good content

    q Start with images – jpegs, gifs
    q Check statistics for
        o  Memory allocation errors
        o  Hits
        o  Misses
        o  Expiries

                   © 2007 Citrix Systems, Inc. — All rights reserved     30
Cache HTTP Callout
•  Callouts to external servers
    q Cache saves multiple requests


•  add cache policy pol_callout -rule "CLIENT.IP.SRC.EQ
  (127.128.129.130 )" -action CACHE –storeInGroup

•  bind cache global pol_callout –priority 100 –gotoPriorityExpression END
  –type REQ_DEFAULT

•  sh cache object –locator <0x…>
   HTTP callout cell: YES
    HTTP callout name: callout1
    HTTP callout type: TEXT
    HTTP callout response: NO



                  © 2007 Citrix Systems, Inc. — All rights reserved    31
Soft-Cache Expiry
•  When a back-end server does not respond quickly to requests, an
  upstream NetScaler can serve responses from the cache.

        q Liberal interpretation of RFC
        q Protects back-end server further (e.g. lash-type event)
        q Serves stale data for a minimal amount of time


•  Applies to 9.2.52.3 & above




                  © 2007 Citrix Systems, Inc. — All rights reserved   32
Configuration through Wizard (1)
  •  Easy-to-use J




                © 2007 Citrix Systems, Inc. — All rights reserved   33
Configuration through Wizard (2)




          © 2007 Citrix Systems, Inc. — All rights reserved   34
Configuration through Wizard (3)




          © 2007 Citrix Systems, Inc. — All rights reserved   35
Example Configuration
  •  enable feature IC

  •  set cache parameter –memlimit 512

  •  add cache contentgroup cg_image –relExpiry 600 –memLimit 100 –
    maxResSize 512


  •  add cache policy cp1 –rule http.req.url.contains(“jpeg”) –action cache
    –storeingroup cg_image


  •  bind cache global cp1 –priority 1 –type REQ_DEFAULT

  cli> sh cache object
  0x000000078b4200000004 cg_image //10.102.30.16:80/abc.jpeg

                © 2007 Citrix Systems, Inc. — All rights reserved       36
Statistics via the CLI (1)

  •  cli> sh cache object
  0x000000078b4200000004 cg_image //10.102.30.16:80/abc.jpeg


  •  cli> sh cache object –locator 0x000000078b4200000004
        q  Address in Memory

  •  nscachemgr –a/-g <contentgroup>
       q  Shell Equivalent

  •  Use grep – POWERFUL for parsing output for hits, misses etc.



                 © 2007 Citrix Systems, Inc. — All rights reserved   37
Statistics via the CLI (2)




            © 2007 Citrix Systems, Inc. — All rights reserved   38
Statistics via the GUI (1)




           © 2007 Citrix Systems, Inc. — All rights reserved   39
Statistics via the GUI (2)




           © 2007 Citrix Systems, Inc. — All rights reserved   40
Statistics via the GUI (3)




           © 2007 Citrix Systems, Inc. — All rights reserved   41
Troubleshooting Tools1

•  Browser -> inconsistencies & can be very frustrating L
    q FF (HTTP Fox & Tamper Data Extensions but FF4 issues)
    q IE (7, 8, 9) -> Fiddler
    q Opera & Chrome -> as standard, no extensions


•  Tracing & PCAP ->
    q Nstrace & Wireshark as usual J




                  © 2007 Citrix Systems, Inc. — All rights reserved   42
Troubleshooting Tools2

•  Paros (as a proxy in the middle) -> I now use Zap (Owasp project fork of
  Paros)

•  CLI -> no user-cache to worry about J
    q wget
    •  wget –S –header=“If-None-Match:etag_value” http://test.com/file.jpg
    q curl
    o  curl –header “If-None-Match: etag_value” test.com/index.html




                 © 2007 Citrix Systems, Inc. — All rights reserved      43
Troubleshooting

 •  Cache turned on but no cache objects
     q  sh cache pa != Memory usage limit: 0 bytes
     q  Zero memory = cache misses
          o  Warning msg in 9.2 when sh cache object
     q  Check expiry settings? NS? Server?

 •  Blank entries in nscachemgr output?
     q  //10.90.196.76/
     q  //10.90.196.76/citrix_logo.jpg
     q  Default caching properties of GET / HTTP/1.1



               © 2007 Citrix Systems, Inc. — All rights reserved   44
CTX Articles (just a snapshot)

   •  http://support.citrix.com/article/CTX124553 - how to IC
   •  http://support.citrix.com/article/CTX123753 - compressed
      content to unadvertised clients
   •  http://support.citrix.com/article/CTX126557 - caching
      uncompressed & compressed content of same file
   •  http://support.citrix.com/article/CTX128801 - same
      hostname/object but different vip twice
   •  http://support.citrix.com/article/CTX129118 - has my HTTP
      callout been cached
   •  http://support.citrix.com/article/CTX124718 - cache callout
      response
   •  http://support.citrix.com/article/CTX129734 - Soft Cache
      Expiry



               © 2007 Citrix Systems, Inc. — All rights reserved    45
Extra Reading

  •  You can use perl, curl, wget, browser add-ons but I like wget –
       q  http://www.cyberciti.biz/tips/linux-wget-your-ultimate-
         command-line-downloader.html
      q  http://www.computerhope.com/unix/wget.htm
      q  Google “wget site:www.linuxquestions.org”
      q  Easy to write a basic shell script around it & doesn’t need
         to be too complicated


  •  RFC 2616 (HTTP) VERY IMPORTANT
      q  Section 13 (Caching)
      q  Section 14 (Headers)



                © 2007 Citrix Systems, Inc. — All rights reserved       46
So with IC you can, take over….




          © 2007 Citrix Systems, Inc. — All rights reserved   47
Sláinte




          © 2007 Citrix Systems, Inc. — All rights reserved   48
© 2007 Citrix Systems, Inc. — All rights reserved   49

More Related Content

What's hot

What’s Mule 4.3? How Does Anytime RTF Help? Our insights explain.
What’s Mule 4.3? How Does Anytime RTF Help? Our insights explain. What’s Mule 4.3? How Does Anytime RTF Help? Our insights explain.
What’s Mule 4.3? How Does Anytime RTF Help? Our insights explain.
Kellton Tech Solutions Ltd
 
Oracle Service Bus vs. Oracle Enterprise Service Bus vs. BPEL
Oracle Service Bus vs. Oracle Enterprise Service Bus vs. BPELOracle Service Bus vs. Oracle Enterprise Service Bus vs. BPEL
Oracle Service Bus vs. Oracle Enterprise Service Bus vs. BPEL
Guido Schmutz
 
Putty
PuttyPutty
Putty
rajpreet
 
Scaling Prometheus Metrics in Kubernetes with Telegraf | Chris Goller | Influ...
Scaling Prometheus Metrics in Kubernetes with Telegraf | Chris Goller | Influ...Scaling Prometheus Metrics in Kubernetes with Telegraf | Chris Goller | Influ...
Scaling Prometheus Metrics in Kubernetes with Telegraf | Chris Goller | Influ...
InfluxData
 
Best Practices with CA Workload Automation AutoSys (AE)
Best Practices with CA Workload Automation AutoSys (AE)Best Practices with CA Workload Automation AutoSys (AE)
Best Practices with CA Workload Automation AutoSys (AE)
CA Technologies
 
Bgp
BgpBgp
VSS_Final
VSS_FinalVSS_Final
VSS_Final
Pratik Bhide
 
Programming smart contracts in solidity
Programming smart contracts in solidityProgramming smart contracts in solidity
Programming smart contracts in solidity
Emanuel Mota
 
MuleSoft Online Meetup a Guide to RTF application deployment - October 2020
MuleSoft Online Meetup   a Guide to RTF application deployment  - October 2020MuleSoft Online Meetup   a Guide to RTF application deployment  - October 2020
MuleSoft Online Meetup a Guide to RTF application deployment - October 2020
Royston Lobo
 
Distributed tracing 101
Distributed tracing 101Distributed tracing 101
Distributed tracing 101
Itiel Shwartz
 
WebRTC presentation
WebRTC presentationWebRTC presentation
WebRTC presentation
Veselin Pizurica
 
FreeSWITCH as a Kickass SBC
FreeSWITCH as a Kickass SBCFreeSWITCH as a Kickass SBC
FreeSWITCH as a Kickass SBC
Moises Silva
 
Advanced Topics on the Mirth Connect Interface Engine
Advanced Topics on the Mirth Connect Interface EngineAdvanced Topics on the Mirth Connect Interface Engine
Advanced Topics on the Mirth Connect Interface Engine
Julie Champagne
 
Comparison of existing cni plugins for kubernetes
Comparison of existing cni plugins for kubernetesComparison of existing cni plugins for kubernetes
Comparison of existing cni plugins for kubernetes
Adam Hamsik
 
EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)
Netwax Lab
 
WebRTC
WebRTCWebRTC
WebRTC
Vijay Dhama
 
WebRTC Real time media P2P, Server, Infrastructure, and Platform
WebRTC Real time media P2P, Server, Infrastructure, and PlatformWebRTC Real time media P2P, Server, Infrastructure, and Platform
WebRTC Real time media P2P, Server, Infrastructure, and Platform
Ryan Jespersen
 
Oracle Service Bus 12c (12.2.1) What You Always Wanted to Know
Oracle Service Bus 12c (12.2.1) What You Always Wanted to KnowOracle Service Bus 12c (12.2.1) What You Always Wanted to Know
Oracle Service Bus 12c (12.2.1) What You Always Wanted to Know
Frank Munz
 
Rabbitmq
RabbitmqRabbitmq
Rabbitmq
Zakaria HACHAD
 
RTI DDS Intro with DDS Secure
RTI DDS Intro with DDS SecureRTI DDS Intro with DDS Secure
RTI DDS Intro with DDS Secure
John Breitenbach
 

What's hot (20)

What’s Mule 4.3? How Does Anytime RTF Help? Our insights explain.
What’s Mule 4.3? How Does Anytime RTF Help? Our insights explain. What’s Mule 4.3? How Does Anytime RTF Help? Our insights explain.
What’s Mule 4.3? How Does Anytime RTF Help? Our insights explain.
 
Oracle Service Bus vs. Oracle Enterprise Service Bus vs. BPEL
Oracle Service Bus vs. Oracle Enterprise Service Bus vs. BPELOracle Service Bus vs. Oracle Enterprise Service Bus vs. BPEL
Oracle Service Bus vs. Oracle Enterprise Service Bus vs. BPEL
 
Putty
PuttyPutty
Putty
 
Scaling Prometheus Metrics in Kubernetes with Telegraf | Chris Goller | Influ...
Scaling Prometheus Metrics in Kubernetes with Telegraf | Chris Goller | Influ...Scaling Prometheus Metrics in Kubernetes with Telegraf | Chris Goller | Influ...
Scaling Prometheus Metrics in Kubernetes with Telegraf | Chris Goller | Influ...
 
Best Practices with CA Workload Automation AutoSys (AE)
Best Practices with CA Workload Automation AutoSys (AE)Best Practices with CA Workload Automation AutoSys (AE)
Best Practices with CA Workload Automation AutoSys (AE)
 
Bgp
BgpBgp
Bgp
 
VSS_Final
VSS_FinalVSS_Final
VSS_Final
 
Programming smart contracts in solidity
Programming smart contracts in solidityProgramming smart contracts in solidity
Programming smart contracts in solidity
 
MuleSoft Online Meetup a Guide to RTF application deployment - October 2020
MuleSoft Online Meetup   a Guide to RTF application deployment  - October 2020MuleSoft Online Meetup   a Guide to RTF application deployment  - October 2020
MuleSoft Online Meetup a Guide to RTF application deployment - October 2020
 
Distributed tracing 101
Distributed tracing 101Distributed tracing 101
Distributed tracing 101
 
WebRTC presentation
WebRTC presentationWebRTC presentation
WebRTC presentation
 
FreeSWITCH as a Kickass SBC
FreeSWITCH as a Kickass SBCFreeSWITCH as a Kickass SBC
FreeSWITCH as a Kickass SBC
 
Advanced Topics on the Mirth Connect Interface Engine
Advanced Topics on the Mirth Connect Interface EngineAdvanced Topics on the Mirth Connect Interface Engine
Advanced Topics on the Mirth Connect Interface Engine
 
Comparison of existing cni plugins for kubernetes
Comparison of existing cni plugins for kubernetesComparison of existing cni plugins for kubernetes
Comparison of existing cni plugins for kubernetes
 
EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)
 
WebRTC
WebRTCWebRTC
WebRTC
 
WebRTC Real time media P2P, Server, Infrastructure, and Platform
WebRTC Real time media P2P, Server, Infrastructure, and PlatformWebRTC Real time media P2P, Server, Infrastructure, and Platform
WebRTC Real time media P2P, Server, Infrastructure, and Platform
 
Oracle Service Bus 12c (12.2.1) What You Always Wanted to Know
Oracle Service Bus 12c (12.2.1) What You Always Wanted to KnowOracle Service Bus 12c (12.2.1) What You Always Wanted to Know
Oracle Service Bus 12c (12.2.1) What You Always Wanted to Know
 
Rabbitmq
RabbitmqRabbitmq
Rabbitmq
 
RTI DDS Intro with DDS Secure
RTI DDS Intro with DDS SecureRTI DDS Intro with DDS Secure
RTI DDS Intro with DDS Secure
 

Viewers also liked

Troubleshooting Common Network Related Issues with NetScaler
Troubleshooting Common Network Related Issues with NetScalerTroubleshooting Common Network Related Issues with NetScaler
Troubleshooting Common Network Related Issues with NetScaler
David McGeough
 
NetScaler TCP Performance Tuning
NetScaler TCP Performance TuningNetScaler TCP Performance Tuning
NetScaler TCP Performance Tuning
Kevin Mason
 
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance IssuesUsing NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
David McGeough
 
In-depth Troubleshooting on NetScaler using Command Line Tools
In-depth Troubleshooting on NetScaler using Command Line ToolsIn-depth Troubleshooting on NetScaler using Command Line Tools
In-depth Troubleshooting on NetScaler using Command Line Tools
David McGeough
 
NetScaler 11 Update
NetScaler 11 UpdateNetScaler 11 Update
NetScaler 11 Update
MarketingArrowECS_CZ
 
Advanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler AppliancesAdvanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler Appliances
David McGeough
 
The Real Life Social Network v2
The Real Life Social Network v2The Real Life Social Network v2
The Real Life Social Network v2
Paul Adams
 

Viewers also liked (7)

Troubleshooting Common Network Related Issues with NetScaler
Troubleshooting Common Network Related Issues with NetScalerTroubleshooting Common Network Related Issues with NetScaler
Troubleshooting Common Network Related Issues with NetScaler
 
NetScaler TCP Performance Tuning
NetScaler TCP Performance TuningNetScaler TCP Performance Tuning
NetScaler TCP Performance Tuning
 
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance IssuesUsing NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
 
In-depth Troubleshooting on NetScaler using Command Line Tools
In-depth Troubleshooting on NetScaler using Command Line ToolsIn-depth Troubleshooting on NetScaler using Command Line Tools
In-depth Troubleshooting on NetScaler using Command Line Tools
 
NetScaler 11 Update
NetScaler 11 UpdateNetScaler 11 Update
NetScaler 11 Update
 
Advanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler AppliancesAdvanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler Appliances
 
The Real Life Social Network v2
The Real Life Social Network v2The Real Life Social Network v2
The Real Life Social Network v2
 

Similar to Integrated Cache on Netscaler

Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014
bryan_call
 
Interactive web. O rly?
Interactive web. O rly?Interactive web. O rly?
Interactive web. O rly?
timbc
 
Architecting &Building Scalable Secure Web API
Architecting &Building Scalable Secure Web APIArchitecting &Building Scalable Secure Web API
Architecting &Building Scalable Secure Web API
SHAKIL AKHTAR
 
20190516 web security-basic
20190516 web security-basic20190516 web security-basic
20190516 web security-basic
MksYi
 
DEF CON 27- ALBINOWAX - http desync attacks
DEF CON 27- ALBINOWAX - http desync attacksDEF CON 27- ALBINOWAX - http desync attacks
DEF CON 27- ALBINOWAX - http desync attacks
Felipe Prado
 
computer networking
computer networkingcomputer networking
computer networking
seyvan rahimi
 
Http - All you need to know
Http - All you need to knowHttp - All you need to know
Http - All you need to know
Gökhan Şengün
 
Hidden Gems in HTTP
Hidden Gems in HTTPHidden Gems in HTTP
Hidden Gems in HTTP
Ben Ramsey
 
Optimising Web Application Frontend
Optimising Web Application FrontendOptimising Web Application Frontend
Optimising Web Application Frontend
tkramar
 
Server architecture
Server architectureServer architecture
Server architecture
Masters Academy
 
Leverage HTTP to deliver cacheable websites - Thijs Feryn - Codemotion Rome 2018
Leverage HTTP to deliver cacheable websites - Thijs Feryn - Codemotion Rome 2018Leverage HTTP to deliver cacheable websites - Thijs Feryn - Codemotion Rome 2018
Leverage HTTP to deliver cacheable websites - Thijs Feryn - Codemotion Rome 2018
Codemotion
 
Leverage HTTP to deliver cacheable websites - Codemotion Rome 2018
Leverage HTTP to deliver cacheable websites - Codemotion Rome 2018Leverage HTTP to deliver cacheable websites - Codemotion Rome 2018
Leverage HTTP to deliver cacheable websites - Codemotion Rome 2018
Thijs Feryn
 
Type URL, Enter, and Then …
Type URL, Enter, and Then …Type URL, Enter, and Then …
Type URL, Enter, and Then …
Jinglun Li
 
Computer network (10)
Computer network (10)Computer network (10)
Computer network (10)
NYversity
 
IBM dwLive, "Internet & HTTP - 잃어버린 패킷을 찾아서..."
IBM dwLive, "Internet & HTTP - 잃어버린 패킷을 찾아서..."IBM dwLive, "Internet & HTTP - 잃어버린 패킷을 찾아서..."
IBM dwLive, "Internet & HTTP - 잃어버린 패킷을 찾아서..."
Dongwook Lee
 
Life on the Edge with ESI
Life on the Edge with ESILife on the Edge with ESI
Life on the Edge with ESI
Kit Chan
 
Как Web-акселератор акселерирует ваш сайт / Александр Крижановский (Tempesta ...
Как Web-акселератор акселерирует ваш сайт / Александр Крижановский (Tempesta ...Как Web-акселератор акселерирует ваш сайт / Александр Крижановский (Tempesta ...
Как Web-акселератор акселерирует ваш сайт / Александр Крижановский (Tempesta ...
Ontico
 
Web performance across the HTTP to HTTPS transition
Web performance across the HTTP to HTTPS transitionWeb performance across the HTTP to HTTPS transition
Web performance across the HTTP to HTTPS transition
seanwalbran
 
Under the Covers with the Web
Under the Covers with the WebUnder the Covers with the Web
Under the Covers with the Web
Trevor Lohrbeer
 
Building Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EU
Building Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EUBuilding Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EU
Building Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EU
Yaron Haviv
 

Similar to Integrated Cache on Netscaler (20)

Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014
 
Interactive web. O rly?
Interactive web. O rly?Interactive web. O rly?
Interactive web. O rly?
 
Architecting &Building Scalable Secure Web API
Architecting &Building Scalable Secure Web APIArchitecting &Building Scalable Secure Web API
Architecting &Building Scalable Secure Web API
 
20190516 web security-basic
20190516 web security-basic20190516 web security-basic
20190516 web security-basic
 
DEF CON 27- ALBINOWAX - http desync attacks
DEF CON 27- ALBINOWAX - http desync attacksDEF CON 27- ALBINOWAX - http desync attacks
DEF CON 27- ALBINOWAX - http desync attacks
 
computer networking
computer networkingcomputer networking
computer networking
 
Http - All you need to know
Http - All you need to knowHttp - All you need to know
Http - All you need to know
 
Hidden Gems in HTTP
Hidden Gems in HTTPHidden Gems in HTTP
Hidden Gems in HTTP
 
Optimising Web Application Frontend
Optimising Web Application FrontendOptimising Web Application Frontend
Optimising Web Application Frontend
 
Server architecture
Server architectureServer architecture
Server architecture
 
Leverage HTTP to deliver cacheable websites - Thijs Feryn - Codemotion Rome 2018
Leverage HTTP to deliver cacheable websites - Thijs Feryn - Codemotion Rome 2018Leverage HTTP to deliver cacheable websites - Thijs Feryn - Codemotion Rome 2018
Leverage HTTP to deliver cacheable websites - Thijs Feryn - Codemotion Rome 2018
 
Leverage HTTP to deliver cacheable websites - Codemotion Rome 2018
Leverage HTTP to deliver cacheable websites - Codemotion Rome 2018Leverage HTTP to deliver cacheable websites - Codemotion Rome 2018
Leverage HTTP to deliver cacheable websites - Codemotion Rome 2018
 
Type URL, Enter, and Then …
Type URL, Enter, and Then …Type URL, Enter, and Then …
Type URL, Enter, and Then …
 
Computer network (10)
Computer network (10)Computer network (10)
Computer network (10)
 
IBM dwLive, "Internet & HTTP - 잃어버린 패킷을 찾아서..."
IBM dwLive, "Internet & HTTP - 잃어버린 패킷을 찾아서..."IBM dwLive, "Internet & HTTP - 잃어버린 패킷을 찾아서..."
IBM dwLive, "Internet & HTTP - 잃어버린 패킷을 찾아서..."
 
Life on the Edge with ESI
Life on the Edge with ESILife on the Edge with ESI
Life on the Edge with ESI
 
Как Web-акселератор акселерирует ваш сайт / Александр Крижановский (Tempesta ...
Как Web-акселератор акселерирует ваш сайт / Александр Крижановский (Tempesta ...Как Web-акселератор акселерирует ваш сайт / Александр Крижановский (Tempesta ...
Как Web-акселератор акселерирует ваш сайт / Александр Крижановский (Tempesta ...
 
Web performance across the HTTP to HTTPS transition
Web performance across the HTTP to HTTPS transitionWeb performance across the HTTP to HTTPS transition
Web performance across the HTTP to HTTPS transition
 
Under the Covers with the Web
Under the Covers with the WebUnder the Covers with the Web
Under the Covers with the Web
 
Building Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EU
Building Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EUBuilding Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EU
Building Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EU
 

More from Mark Hillick

Peeling back your Network Layers with Security Onion
Peeling back your Network Layers with Security OnionPeeling back your Network Layers with Security Onion
Peeling back your Network Layers with Security Onion
Mark Hillick
 
Introduction to MongoDB
Introduction to MongoDBIntroduction to MongoDB
Introduction to MongoDB
Mark Hillick
 
PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)
Mark Hillick
 
HackEire 2009
HackEire 2009HackEire 2009
HackEire 2009
Mark Hillick
 
Scareware - Irisscon 2009
Scareware - Irisscon 2009Scareware - Irisscon 2009
Scareware - Irisscon 2009
Mark Hillick
 
Scareware Traversing the World via Ireland
Scareware Traversing the World via IrelandScareware Traversing the World via Ireland
Scareware Traversing the World via Ireland
Mark Hillick
 
Implementing a WAF
Implementing a WAFImplementing a WAF
Implementing a WAF
Mark Hillick
 
CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!
Mark Hillick
 
MongoDB - Who, What & Where!
MongoDB - Who, What & Where!MongoDB - Who, What & Where!
MongoDB - Who, What & Where!
Mark Hillick
 

More from Mark Hillick (9)

Peeling back your Network Layers with Security Onion
Peeling back your Network Layers with Security OnionPeeling back your Network Layers with Security Onion
Peeling back your Network Layers with Security Onion
 
Introduction to MongoDB
Introduction to MongoDBIntroduction to MongoDB
Introduction to MongoDB
 
PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)
 
HackEire 2009
HackEire 2009HackEire 2009
HackEire 2009
 
Scareware - Irisscon 2009
Scareware - Irisscon 2009Scareware - Irisscon 2009
Scareware - Irisscon 2009
 
Scareware Traversing the World via Ireland
Scareware Traversing the World via IrelandScareware Traversing the World via Ireland
Scareware Traversing the World via Ireland
 
Implementing a WAF
Implementing a WAFImplementing a WAF
Implementing a WAF
 
CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!
 
MongoDB - Who, What & Where!
MongoDB - Who, What & Where!MongoDB - Who, What & Where!
MongoDB - Who, What & Where!
 

Recently uploaded

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 

Recently uploaded (20)

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 

Integrated Cache on Netscaler

  • 1. Integrated Cache Training – Netscaler Webinar Mark Hillick
  • 2. Agenda of Cash, sorry Cache •  Goals of Caching q Why & What •  Cache Policies •  How long to cache •  Memory for Cache •  IC configuration example •  Cache Statistics •  Troubleshooting IC © 2007 Citrix Systems, Inc. — All rights reserved 2
  • 3. Presentation Goal Please be aware that this a technical presentation with lots of detail and it is intended that it can be used as a reference guide at a later date (e.g. when you're on-site). Sadly, it s not like my usual Zen presentation with lots of funny pictures and jokes, sorry L © 2007 Citrix Systems, Inc. — All rights reserved 3
  • 4. Caching Goals •  Caching would be useless if it did not significantly improve performance. •  Goal => to eliminate the need to send requests in many cases. q Reduces the number of network round-trips required for many operations - we use an "expiration" mechanism for this purpose •  Goal => remove the need to send full responses in many other cases. q  The latter reduces network bandwidth requirements - we use a "validation" mechanism for this purpose © 2007 Citrix Systems, Inc. — All rights reserved 4
  • 5. Caching is Used Everywhere •  Local cache in your browser •  Cache in the office (Forward Proxy or Transparent) •  Cache at the ISP (Transparent) •  Cache at the origin (Reverse Proxy or Transparent) •  Cache integrated inside a traffic manager – much better J © 2007 Citrix Systems, Inc. — All rights reserved 5
  • 6. Caching Benefits. 1.  Saves Bandwidth 2.  Reduces traffic to back-end server & so saves processing resources 3.  Protects back-end servers from flash crowds 4.  Improves the response time & Increases site capacity P.S. Even more benefits when integrated within a LB J © 2007 Citrix Systems, Inc. — All rights reserved 6
  • 7. IC in Packet-Processing TCP Processing SSL Decrypt HTTP Parsing AAA Processing Cache Redirection Content Switching Application Firewall Responder Action? Cache Hit? HTTP Cache Req Policies Rewrite Policy Eval Load Balancing Content Filtering © 2007 Citrix Systems, Inc. — All rights reserved 7
  • 8. Non-Caching Proxy GET /foo/index.html HTTP/1.1 GET /foo/index.html HTTP/1.1 Host: www.example.com Host: www.example.com Proxy HTTP/1.1 200 OK HTTP/1.1 200 OK Last-Modified: Thu, ... Last-Modified: Thu, ... Content-Length: 3688 Content-Length: 3688 Content-Type: text/html Content-Type: text/html © 2007 Citrix Systems, Inc. — All rights reserved 8
  • 9. Caching Proxy: Miss GET /foo/index.html HTTP/1.1 GET /foo/index.html HTTP/1.1 Host: www.example.com Host: www.example.com Proxy HTTP/1.1 200 OK HTTP/1.1 200 OK Last-Modified: Thu, ... Last-Modified: Thu, ... Content-Length: 3688 Content-Length: 3688 Content-Type: text/html Content-Type: text/html Proxy  Cache (Saves  copy) © 2007 Citrix Systems, Inc. — All rights reserved 9
  • 10. Caching Proxy: Hit GET /foo/index.html HTTP/1.1 Host: www.example.com Proxy HTTP/1.1 200 OK Last-Modified: Thu, ... Content-Length: 3688 Content-Type: text/html Proxy  Cache (Fresh  copy!) © 2007 Citrix Systems, Inc. — All rights reserved 10
  • 11. HTTP Response after a hit •  wget -S --header="If-None-Match:23834-b1-4951a45768b8d" -U Mozilla http://10.90.196.68/index.html •  HTTP/1.1 200 OK ……… •  Via: NS-CACHE-9.2: 65 •  ETag: "23834-b1-4951a45768b8d" •  Server: Apache/2.2.14 (Ubuntu) ......... OR ......... •  ETag: "23834-b1-4951a45768b8d" •  2011-04-26 18:22:56 ERROR 304: Not Modified. ……… © 2007 Citrix Systems, Inc. — All rights reserved 11
  • 12. HTTP Response after a miss •  $ wget -S --header="If-None-Match:23834-b1-4951a45768b8d" -U Mozilla http://10.90.196.68/index.html ………. •  HTTP/1.1 200 OK •  Date: Wed, 27 Apr 2011 09:30:59 GMT •  Server: Apache/2.2.14 (Ubuntu) •  Last-Modified: Mon, 15 Nov 2010 16:52:53 GMT ……….. •  Saving to: `index.html.41 © 2007 Citrix Systems, Inc. — All rights reserved 12
  • 13. What Not to Cache •  Cache-Control: no-store =>applies to entire message (req/resp) •  Cache-Control: no-cache =>server cannot respond with cached response •  Cache-Control: Private => not by shared cache q More info see - http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html •  POST request. •  Don t cache if set-cookie exists •  Don t cache all 5xx response codes, example 503 (Gateway time out) •  By default, NS ignores cache-control headers in requests -> CG Settings © 2007 Citrix Systems, Inc. — All rights reserved 13
  • 14. Freshness •  Describes how long the associated representation is fresh for. q No need to send a request to server if object has not expired q Saves time •  Expires: Fri, 30 Oct 1998 14:19:41 GMT •  Cache-Control: max-age=3600 © 2007 Citrix Systems, Inc. — All rights reserved 14
  • 15. Validation •  Validation – once expired, validator can be used to check with the server if the object is still valid. q  Send conditional request and get a short “304 Not Modified” response q  Saves bandwidth •  If-Modified-Since <Date> •  If-None-Match <Etag> © 2007 Citrix Systems, Inc. — All rights reserved 15
  • 16. Caching Proxy: Validation GET /foo/index.html HTTP/1.1 GET /foo/index.html HTTP/1.1 Host: www.example.com Host: www.example.com If-Modified-Since: Thu, ... Proxy HTTP/1.1 200 OK HTTP/1.1 304 Not Modified Last-Modified: Thu, ... Date: Fri, ... Content-Length: 3688 Content-Type: text/html Proxy  Cache (Saves  copy) © 2007 Citrix Systems, Inc. — All rights reserved 16
  • 17. Cacheability Policies •  Specifies if response is cacheable. q  Request or Response-based policy •  CG is DEFAULT by default J but can be changed. •  Action types q  CACHE: Transaction is cacheable. Store the object q  NOCACHE: Transaction is non-cacheable. q  MAY_NOCACHE o  For request based policies only o  The response may be cacheable. The default if no response cacheability policy matches is to not cache the response. q  MAY_CACHE o  For request based policies only o  The response may be cacheable. The default if no response cacheability policy matches is to cache the response. q  INVAL o  Mark the object as invalid © 2007 Citrix Systems, Inc. — All rights reserved 17
  • 18. Cache Decision Time •  Cache, Nocache, Inval q  Cache decision @ request time & unless something that prevents decision like CL mistmatch, no policy eval @ response time •  MAY_CACHE, MAY_NOCACHE q  Cache decision @ response time © 2007 Citrix Systems, Inc. — All rights reserved 18
  • 19. Invalidate versus Expire •  Invalidate q  Invalidate will invalidate the object/"all objects in contentgroup". q  But the way it is done is it is optimized such a way that we don't look at each object and remove it but when you run expire command or when new request comes for the invalid object, it is then removed. q  We serve a full response (200) to client regardless of cache hit. •  Expire q  Only mark the object as expired q  Request comes in & instead of getting full response (i.e what we do for invalid object) we will send if-modified-since/if-none-match conditional request to back-end server. i.e can receive a 304. © 2007 Citrix Systems, Inc. — All rights reserved 19
  • 20. Content Group •  Every cached object => member of CG q  No CG, object => Default q  minhit – no. of hits before store •  Properties of objects can be controlled per contentgroup •  Dynamic versus Static - parametised •  Configurations per content-group are q  Expiry settings q  Portions of object considered for caching as well as Invalidation [Parameterized Caching] q  Pre-fetch objects before it gets expired (event-driven) q  Inserting headers (e.g. Via header) q  Memory related configuration for the objects and for this whole groups © 2007 Citrix Systems, Inc. — All rights reserved 20
  • 21. Flash Cache (FC) •  FC q Improves performance –> 1 req to back-end server q Concurrent requests queued on NS & single response served q set/add cache contentgroup <group_name> -flashCache YES q POWERFUL q Cannot enable with PET (ensures IC polls origin before serving) © 2007 Citrix Systems, Inc. — All rights reserved 21
  • 22. Some Other CG settings •  Expiry settings (blank by default) q Relexpiry – relative -> overrides server response settings q heurexpiryParam - % q Expire after complete response received •  If no expiry settings & none in response => cache miss but can do validation (non-fc) •  Cache controls q No cache depending on size or hits q Mem limit usage per group •  Works with FC J but probably not wise on significant groupsExpire after complete response received © 2007 Citrix Systems, Inc. — All rights reserved 22
  • 23. Cache Policies •  Built-In (begin with “__” & “ctx_”) q Greatly enhanced in 9.3 – should be sufficient for most •  Bound globally or per vServer q Easy-To-Administer & View within Global Policy Manager •  PI-based expression engine like other NS features © 2007 Citrix Systems, Inc. — All rights reserved 23
  • 24. Cache •  Built-In (begin with “__” ) q Greatly enhanced in 9.3 – should be sufficient for most •  Bound globally or per vServer q Easy-To-Administer & View within Global Policy Manager •  PI-based expression engine like other NS features © 2007 Citrix Systems, Inc. — All rights reserved 24
  • 25. Verification •  Three Verification Options (again sh cache pa) q Hostname (Sufficient for Most Companies) q Hostname & IP (Default) q DNS (Most Secure) © 2007 Citrix Systems, Inc. — All rights reserved 25
  • 26. Flushing the Cache •  Flush Cache q Remove stale content manually q Troubleshooting (preferred flush, disable, enable) q CLI – either CG or Object o  flush cache contentGroup content_group_html o  flush cache contentGroup ALL o  flush cache object –locator <0x….> q GUI – IC > Cache Objects •  Automatic CG flush once CG configuration is modified © 2007 Citrix Systems, Inc. — All rights reserved 26
  • 27. Cache Memory Management (1) •  BSD & PPE First •  7500 with 8gb RAM & 3 PE q 2gb for kernel, 3gb for PE & max 3gb for IC q Each PE has minimum of 1gb •  17500 – 48gb mem & 11 PE q 2gb for kernel, 23gb to PE & IC can take up to 23gb q Each PE cannot exceed 3.2gb address space •  IC takes up what’s left (!>0.5) © 2007 Citrix Systems, Inc. — All rights reserved 27
  • 28. Cache Memory Management (2) •  > set cache pa –memLimit 254 •  > sh cache pa | grep -i mem Memory usage limit: 10000 MBytes Memory usage limit (active value): 10000 Mbytes => reboot Maximum value for Memory usage limit: 15662 MBytes •  > sh cache contentgroup •  Memory Allocation Issues q cli> stat cache –detail | grep alloc Memory allocation failures 5741 => cache misses © 2007 Citrix Systems, Inc. — All rights reserved 28
  • 29. Cache Selectors •  Best practice to configure selectors (preferred over parameters) •  Named filter – locates particular objects in CG, not exact match •  Associate selector based on the request, not with responses •  Sample selectors •  http.req.url; http.req.method; client.ip.dst etc •  Use cases q One file only cached once regardless of hostname q Two copies of same file – compressed & uncompressed q Same file, same hostname but different VIPs & CGs © 2007 Citrix Systems, Inc. — All rights reserved 29
  • 30. “Not Cache” Best Practice •  Not Cache policies first q Once IC is turned on, it will begin to cache as per the default policies. o  This may cause confidential content to be cached by accidentThen cache known, good content q Start with images – jpegs, gifs q Check statistics for o  Memory allocation errors o  Hits o  Misses o  Expiries © 2007 Citrix Systems, Inc. — All rights reserved 30
  • 31. Cache HTTP Callout •  Callouts to external servers q Cache saves multiple requests •  add cache policy pol_callout -rule "CLIENT.IP.SRC.EQ (127.128.129.130 )" -action CACHE –storeInGroup •  bind cache global pol_callout –priority 100 –gotoPriorityExpression END –type REQ_DEFAULT •  sh cache object –locator <0x…> HTTP callout cell: YES HTTP callout name: callout1 HTTP callout type: TEXT HTTP callout response: NO © 2007 Citrix Systems, Inc. — All rights reserved 31
  • 32. Soft-Cache Expiry •  When a back-end server does not respond quickly to requests, an upstream NetScaler can serve responses from the cache. q Liberal interpretation of RFC q Protects back-end server further (e.g. lash-type event) q Serves stale data for a minimal amount of time •  Applies to 9.2.52.3 & above © 2007 Citrix Systems, Inc. — All rights reserved 32
  • 33. Configuration through Wizard (1) •  Easy-to-use J © 2007 Citrix Systems, Inc. — All rights reserved 33
  • 34. Configuration through Wizard (2) © 2007 Citrix Systems, Inc. — All rights reserved 34
  • 35. Configuration through Wizard (3) © 2007 Citrix Systems, Inc. — All rights reserved 35
  • 36. Example Configuration •  enable feature IC •  set cache parameter –memlimit 512 •  add cache contentgroup cg_image –relExpiry 600 –memLimit 100 – maxResSize 512 •  add cache policy cp1 –rule http.req.url.contains(“jpeg”) –action cache –storeingroup cg_image •  bind cache global cp1 –priority 1 –type REQ_DEFAULT cli> sh cache object 0x000000078b4200000004 cg_image //10.102.30.16:80/abc.jpeg © 2007 Citrix Systems, Inc. — All rights reserved 36
  • 37. Statistics via the CLI (1) •  cli> sh cache object 0x000000078b4200000004 cg_image //10.102.30.16:80/abc.jpeg •  cli> sh cache object –locator 0x000000078b4200000004 q  Address in Memory •  nscachemgr –a/-g <contentgroup> q  Shell Equivalent •  Use grep – POWERFUL for parsing output for hits, misses etc. © 2007 Citrix Systems, Inc. — All rights reserved 37
  • 38. Statistics via the CLI (2) © 2007 Citrix Systems, Inc. — All rights reserved 38
  • 39. Statistics via the GUI (1) © 2007 Citrix Systems, Inc. — All rights reserved 39
  • 40. Statistics via the GUI (2) © 2007 Citrix Systems, Inc. — All rights reserved 40
  • 41. Statistics via the GUI (3) © 2007 Citrix Systems, Inc. — All rights reserved 41
  • 42. Troubleshooting Tools1 •  Browser -> inconsistencies & can be very frustrating L q FF (HTTP Fox & Tamper Data Extensions but FF4 issues) q IE (7, 8, 9) -> Fiddler q Opera & Chrome -> as standard, no extensions •  Tracing & PCAP -> q Nstrace & Wireshark as usual J © 2007 Citrix Systems, Inc. — All rights reserved 42
  • 43. Troubleshooting Tools2 •  Paros (as a proxy in the middle) -> I now use Zap (Owasp project fork of Paros) •  CLI -> no user-cache to worry about J q wget •  wget –S –header=“If-None-Match:etag_value” http://test.com/file.jpg q curl o  curl –header “If-None-Match: etag_value” test.com/index.html © 2007 Citrix Systems, Inc. — All rights reserved 43
  • 44. Troubleshooting •  Cache turned on but no cache objects q  sh cache pa != Memory usage limit: 0 bytes q  Zero memory = cache misses o  Warning msg in 9.2 when sh cache object q  Check expiry settings? NS? Server? •  Blank entries in nscachemgr output? q  //10.90.196.76/ q  //10.90.196.76/citrix_logo.jpg q  Default caching properties of GET / HTTP/1.1 © 2007 Citrix Systems, Inc. — All rights reserved 44
  • 45. CTX Articles (just a snapshot) •  http://support.citrix.com/article/CTX124553 - how to IC •  http://support.citrix.com/article/CTX123753 - compressed content to unadvertised clients •  http://support.citrix.com/article/CTX126557 - caching uncompressed & compressed content of same file •  http://support.citrix.com/article/CTX128801 - same hostname/object but different vip twice •  http://support.citrix.com/article/CTX129118 - has my HTTP callout been cached •  http://support.citrix.com/article/CTX124718 - cache callout response •  http://support.citrix.com/article/CTX129734 - Soft Cache Expiry © 2007 Citrix Systems, Inc. — All rights reserved 45
  • 46. Extra Reading •  You can use perl, curl, wget, browser add-ons but I like wget – q  http://www.cyberciti.biz/tips/linux-wget-your-ultimate- command-line-downloader.html q  http://www.computerhope.com/unix/wget.htm q  Google “wget site:www.linuxquestions.org” q  Easy to write a basic shell script around it & doesn’t need to be too complicated •  RFC 2616 (HTTP) VERY IMPORTANT q  Section 13 (Caching) q  Section 14 (Headers) © 2007 Citrix Systems, Inc. — All rights reserved 46
  • 47. So with IC you can, take over…. © 2007 Citrix Systems, Inc. — All rights reserved 47
  • 48. Sláinte © 2007 Citrix Systems, Inc. — All rights reserved 48
  • 49. © 2007 Citrix Systems, Inc. — All rights reserved 49