[OpenSIPS-Users] group_radius , radiusclient problem

Alex Massover alex at jajah.com
Tue Jan 13 14:17:09 CET 2009


Hi!

It's a really dirty hack to radiusclient-ng's /src/lib/buildreq.c that just avoids serializing radius request IDs via .seq file. By default radiusclient-ng tries to serialize it by locking .seq file and after 10 unsuccessful tries makes it random. This patch makes it going directly to random.

I'm not sure for what purpose radius requests IDs should be serialized, for my system it's not crucial, I prefer it random over locking .seq file.

--
Best Regards,
Alex Massover

-----Original Message-----
From: Bogdan-Andrei Iancu [mailto:bogdan at voice-system.ro]
Sent: Tuesday, January 13, 2009 2:05 PM
To: Alex Massover
Cc: users at lists.opensips.org
Subject: Re: [OpenSIPS-Users] group_radius , radiusclient problem

Hi Alex,

can you provide the patch or a link to it? maybe posting somewhere will
help other people in the future.

Regards,
Bogdan

Alex Massover wrote:
> Hi!
>
> Yes, we experienced it too. We just hacked radiusclient-ng to avoid using .seq file at all.
>
> --
> Best Regards,
> Alex Massover
>
> -----Original Message-----
> From: users-bounces at lists.opensips.org [mailto:users-bounces at lists.opensips.org] On Behalf Of Adrian Georgescu
> Sent: Saturday, January 10, 2009 7:23 PM
> To: sobolewski at gmail.com
> Cc: users at lists.opensips.org
> Subject: [OpenSIPS-Users] group_radius , radiusclient problem
>
> The interfaces and backend used by OpenSIPS for functions like DNS,
> SQL and Radius impose much more relevant limits in scalability then
> OpenSIPS modules themselves.
>
>  From your example, in my experience the limitation is most likely
> located in the Radius server rather than the client.
>
> Did you check the server if it can handle the amount of requests sent
> by OpenSIPS?
>
> Adrian
>
>
>  >>>>>>>
> I have tried group_radius on system with 35K users.
> Check is being done for REGISTER and INVITE mgs. After enabling check
> with gflag, registered cound falls by 10K.
> In logs message below start appearing.
>
> Jan  9 02:18:46 aster20 /usr/sbin/openser[31418]: rc_get_seqnbr:
> couldn't get lock after 10 tries: /var/run/radius.seq
> Jan  9 02:18:46 aster20 /usr/sbin/openser[31395]: rc_get_seqnbr:
> couldn't get lock after 10 tries: /var/run/radius.seq
> Jan  9 02:18:46 aster20 /usr/sbin/openser[31417]: rc_get_seqnbr:
> couldn't get lock after 10 tries: /var/run/radius.seq
>
> Looks like it's readiusclient problem. Has anyone experience something
> similar?
>
>
> openser -V
> version: openser 1.2.2-notls (i386/linux)
> flags: STATS: Off, USE_IPV6, USE_TCP, DISABLE_NAGLE, USE_MCAST,
> SHM_MEM, SHM_MMAP, PKG_MALLOC, F_MALLOC, FAST_LOCK-ADAPTIVE_WAIT
> ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16,
> MAX_URI_SIZE 1024, BUF_SIZE 65535
> poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
> svnrevision: unknown
> @(#) $Id: main.c 2304 2007-05-25 16:36:07Z bogdan_iancu $
> main.c compiled on 01:12:52 Nov  5 2007 with gcc 4.1.2
>
> --
> Piotr Sobolewski
> sobolewski at gmail.com
>
>
>
> _______________________________________________
> Users mailing list
> Users at lists.opensips.org
> http://lists.opensips.org/cgi-bin/mailman/listinfo/users
>
>
>
> ******************************************************************************
>
>  This footnote confirms that this email message has been scanned by Jajah Inc. Mail system for the presence of malicious code, vandals & computer viruses.
>
> ******************************************************************************
>
>
>
>
> ******************************************************************************
>  This footnote confirms that this email message has been scanned by Jajah Inc. Mail system for the presence of malicious code, vandals & computer viruses.
> ******************************************************************************
>
> _______________________________________________
> Users mailing list
> Users at lists.opensips.org
> http://lists.opensips.org/cgi-bin/mailman/listinfo/users
>
>




******************************************************************************

 This footnote confirms that this email message has been scanned by Jajah Inc. Mail system for the presence of malicious code, vandals & computer viruses.

******************************************************************************




******************************************************************************
 This footnote confirms that this email message has been scanned by Jajah Inc. Mail system for the presence of malicious code, vandals & computer viruses.
******************************************************************************
-------------- next part --------------
A non-text attachment was scrubbed...
Name: buildreq.c.patch
Type: application/octet-stream
Size: 282 bytes
Desc: buildreq.c.patch
Url : http://lists.opensips.org/pipermail/users/attachments/20090113/0ffaeb1d/attachment.obj 


More information about the Users mailing list