User Details
- User Since
- May 15 2023, 9:41 AM (152 w, 4 d)
- Availability
- Available
- IRC Nick
- fabfur
- LDAP User
- Fabfur
- MediaWiki User
- FFurnari-WMF [ Global Accounts ]
Yesterday
Thanks, this should've been closed long long time ago...
Thu, Apr 9
Wed, Apr 8
Wed, Apr 1
[[ https://gerrit.wikimedia.org/r/c/operations/puppet/+/1266301 | The patch ]]has been applied to all impacted hosts, thanks @JAllemandou for spotting this!
This is most probably due to a deprecation in haproxy configuration directives https://www.haproxy.com/blog/reviewing-every-new-feature-in-haproxy-3-1#deprecation, especially
This could be related to upgrade to HAProxy 3.2 (T421402) that started on the drmrs datacenter, we'll investigate if the sequence-id is now generated differently
Mon, Mar 30
Had to partially revert https://gerrit.wikimedia.org/r/c/operations/puppet/+/1261484 because configuration gets applied before upgrading HAProxy package (with the cookbook) so it would break the HAProxy reload and hence puppet run. This patch will be reverted at the very end to enable that configuration.
Thu, Mar 26
Mar 17 2026
Procedure from the traffic perspective should be roughly
Mar 12 2026
Mar 10 2026
Mar 5 2026
Hi @daniel I can confirm I see the x_is_browser, trusted_req and rl_class fields in webrequest (text), good job!
Mar 4 2026
The patch has been merged and will be propagated shortly to all cache hosts. This means that the headers X-WMF-Ratelimit-Class and X-Trusted-Request will soon be present in X-Analytics
Mar 2 2026
Thanks to the @JAllemandou summary, I've wrote down some simple notes to understand the amount of work and the missing pieces, please have a look and eventually comment/fix:
Feb 26 2026
Good for me! Just let me know as soon as you have the "official" header name so I can make the relevant changes in HAProxy logging and HaproxyKafka configuration
Feb 25 2026
@daniel it could be helpful to have some (also fake) example of values for X-WMF-Ratelimit-Class headers, to do some optimization in the pipeline, do you have some ?
Feb 12 2026
Feb 11 2026
Feb 5 2026
Jan 23 2026
Jan 13 2026
@Xqt we're rolling out a change that should lift the current ratelimiting and impact Pywikibot too, could you please check in ~30 minutes if you still see the same amount of errors?
Thanks
Jan 9 2026
We're now allowing this new type of contact information in User-Agent string, this change should be propagated shortly. Please notify us on this ticket if the situation remains unchanged
Dec 23 2025
Dec 22 2025
The entry has been added with https://gerrit.wikimedia.org/r/c/operations/dns/+/1220380 and should be propagated shortly
Dec 16 2025
Update: we've tested this on cp7009 but apparently this isn't setting the TOS as expected. I've rolled it back with https://gerrit.wikimedia.org/r/c/operations/puppet/+/1218788 to try again tomorrow morning and check if this could be an issue on the haproxy side (configuration, capabilities should be ok).
Dec 3 2025
Ranked bots paste has been superseded by the shared doc: https://docs.google.com/spreadsheets/d/1PKfAhcc2jXl72CbF73JXTeZMTbw_RtQnYJ6YZ4Fozyk/edit?gid=0#gid=0
Dec 2 2025
Nov 5 2025
I don't think regexes should be automatically escaped: the user must always be in charge of deciding that (and automatically parsing what's a regex and what not in a input box could be a pain). I agree that a big bold warning about escaped/unescaped regex could be added to some fields.
Nov 4 2025
haproxy configuration deployed everywhere
Oct 27 2025
Oct 24 2025
Password has been reset by @ssingh for me, thanks anyway
A not-so-refined search on Turnilo produced this paste: P84293
We can even refine it later
Oct 23 2025
@Joe so, just have a better vision over some points: some of these steps must be performed manually, while other should happen in an automated fashion, like:
Oct 1 2025
This has been superseded by more refined actions to exclude a broader class of "invalid" requests. As HTTP/1.0 requests are not per-se invalid we can consider this declined.
Sep 30 2025
Problem is that PyBal (twisted) defaults to a HTTP1.0 client so healthchecks in eqiad|codfw will fail after this. Or we patch PyBal to support HTTP1.1 requests or we have to wait for Liberica being deployed here too (or we make an exception in HAProxy configuration for healthcheck requests but it doesn't seem a good long-term solution to me),
Sep 29 2025
This has been migrated to Gitlab in the meantime
Yep, definitely, thanks for reminding
Sep 25 2025
This has been reverted due to issues with load balancers checks
Done rejecting all HTTP_1.0 requests
Sep 22 2025
Hi @BTullis sorry for the late answer, I think this fired correctly because being depooled the host produced no haproxykafka messages so, IMHO is the right thing to do. In this case we usually both depool and silence the affected host (if the depool lasts longer than some minutes). IIRC varnishkafka had the same behavior
Sep 16 2025
We deployed a change in HAProxy logging (see T403176) to avoid sending non-utf8 encoded headers to DLQ, this *could* also affect this issue as we're now logging these messages to Kafka (through the usual HaproxyKafka pipeline).
@Antoine_Quhen could you check all is good on your side?
Sep 11 2025
Sep 9 2025
I'm also taking care of this with some experiments to check when actually HAProxy (or HaproxyKafka) skips these messages
Sep 1 2025
With https://gerrit.wikimedia.org/r/c/operations/puppet/+/1183081 I think we can consider this as closed. New cache hosts reimaged won't have varnishkafka references (except for statsv)
Aug 29 2025
Aug 28 2025
Aug 22 2025
Aug 14 2025
Abandoned for T400244
Aug 13 2025
Aug 12 2025
Declined. Better upgrade purged to golang-1.23
