DragonFly On-Line Manual Pages

Search: Section:  


VARNISH-CLI(7)                                                  VARNISH-CLI(7)

NAME

varnish-cli - Varnish Command Line Interface

DESCRIPTION

Varnish as a command line interface (CLI) which can control and change most of the operational parameters and the configuration of Varnish, without interrupting the running service. The CLI can be used for the following tasks: configuration You can upload, change and delete VCL files from the CLI. parameters You can inspect and change the various parameters Varnish has available through the CLI. The individual parameters are documented in the varnishd(1) man page. bans Bans are filters that are applied to keep Varnish from serving stale content. When you issue a ban Varnish will not serve any banned object from cache, but rather re-fetch it from its backend servers. process management You can stop and start the cache (child) process though the CLI. You can also retrieve the latest stack trace if the child process has crashed. If you invoke varnishd(1) with -T, -M or -d the CLI will be available. In debug mode (-d) the CLI will be in the foreground, with -T you can connect to it with varnishadm or telnet and with -M varnishd will connect back to a listening service pushing the CLI to that service. Please see varnishd(1) for details. Syntax Commands are usually terminated with a newline. Long command can be entered using sh style here documents. The format of here-documents is: << word here document word word can be any continuous string chosen to make sure it doesn't appear naturally in the following here document. When using the here document style of input there are no restrictions on length. When using newline-terminated commands maximum length is limited by the varnishd parameter cli_buffer. When commands are newline terminated they get tokenized before parsing so if you have significant spaces enclose your strings in double quotes. Within the quotes you can escape characters with \. The n, r and t get translated to newlines, carriage returns and tabs. Double quotes themselves can be escaped with a backslash. To enter characters in octals use the \nnn syntax. Hexadecimals can be entered with the \xnn syntax. Commands help [<command>] Show command/protocol help. ping [<timestamp>] Keep connection alive. auth <response> Authenticate. quit Close connection. banner Print welcome banner. status Check status of Varnish cache process. start Start the Varnish cache process. stop Stop the Varnish cache process. vcl.load <configname> <filename> [auto|cold|warm] Compile and load the VCL file under the name provided. vcl.inline <configname> <quoted_VCLstring> [auto|cold|warm] Compile and load the VCL data under the name provided. vcl.use <configname> Switch to the named configuration immediately. vcl.discard <configname> Unload the named configuration (when possible). vcl.list List all loaded configuration. vcl.show [-v] <configname> Display the source code for the specified configuration. vcl.state <configname> <state> Force the state of the specified configuration. State is any of auto, warm or cold values. param.show [-l] [<param>] Show parameters and their values. param.set <param> <value> Set parameter value. panic.show Return the last panic, if any. panic.clear [-z] Clear the last panic, if any. -z will clear related varnishstat counter(s). storage.list List storage devices. backend.list [-p] [<backend_expression>] List backends. backend.set_health <backend_expression> <state> Set health status on the backends. State is any of auto, healthy or sick values. ban <field> <operator> <arg> [&& <field> <oper> <arg> ...] Mark obsolete all objects where all the conditions match. ban.list List the active bans. Backend Expression A backend expression can be a backend name or a combination of backend name, IP address and port in "name(IP address:port)" format. All fields are optional. If no exact matching backend is found, partial matching will be attempted based on the provided name, IP address and port fields. Examples: backend.list def* backend.set_health default sick backend.set_health def* healthy backend.set_health * auto Ban Expressions A ban expression consists of one or more conditions. A condition consists of a field, an operator, and an argument. Conditions can be ANDed together with "&&". A field can be any of the variables from VCL, for instance req.url, req.http.host or obj.http.set-cookie. Operators are "==" for direct comparison, "~" for a regular expression match, and ">" or "<" for size comparisons. Prepending an operator with "!" negates the expression. The argument could be a quoted string, a regexp, or an integer. Integers can have "KB", "MB", "GB" or "TB" appended for size related fields. VCL Temperature A VCL program goes through several states related to the different commands: it can be loaded, used, and later discarded. You can load several VCL programs and switch at any time from one to another. There is only one active VCL, but the previous active VCL will be maintained active until all its transactions are over. Over time, if you often refresh your VCL and keep the previous versions around, resource consumption will increase, you can't escape that. However, most of the time you want only one to pay the price only for the active VCL and keep older VCLs in case you'd need to rollback to a previous version. The VCL temperature allows you to minimize the footprint of inactive VCLs. Once a VCL becomes cold, Varnish will release all the resources that can be be later reacquired. You can manually set the temperature of a VCL or let varnish automatically handle it. Scripting If you are going to write a script that talks CLI to varnishd, the include/cli.h contains the relevant magic numbers. One particular magic number to know, is that the line with the status code and length field always is exactly 13 characters long, including the NL character. For your reference the sourcefile lib/libvarnish/cli_common.h contains the functions Varnish code uses to read and write CLI response. How -S/PSK Authentication Works If the -S secret-file is given as argument to varnishd, all network CLI connections must authenticate, by proving they know the contents of that file. The file is read at the time the auth command is issued and the contents is not cached in varnishd, so it is possible to update the file on the fly. Use the unix file permissions to control access to the file. An authenticated session looks like this: critter phk> telnet localhost 1234 Trying ::1... Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. 107 59 ixslvvxrgkjptxmcgnnsdxsvdmvfympg Authentication required. auth 455ce847f0073c7ab3b1465f74507b75d3dc064c1e7de3b71e00de9092fdc89a 200 193 ----------------------------- Varnish HTTP accelerator CLI. ----------------------------- Type 'help' for command list. Type 'quit' to close CLI session. Type 'start' to launch worker process. The CLI status of 107 indicates that authentication is necessary. The first 32 characters of the response text is the challenge "ixsl...mpg". The challenge is randomly generated for each CLI connection, and changes each time a 107 is emitted. The most recently emitted challenge must be used for calculating the authenticator "455c...c89a". The authenticator is calculated by applying the SHA256 function to the following byte sequence: o Challenge string o Newline (0x0a) character. o Contents of the secret file o Challenge string o Newline (0x0a) character. and dumping the resulting digest in lower-case hex. In the above example, the secret file contained foon and thus: critter phk> cat > _ ixslvvxrgkjptxmcgnnsdxsvdmvfympg foo ixslvvxrgkjptxmcgnnsdxsvdmvfympg ^D critter phk> hexdump -C _ 00000000 69 78 73 6c 76 76 78 72 67 6b 6a 70 74 78 6d 63 |ixslvvxrgkjptxmc| 00000010 67 6e 6e 73 64 78 73 76 64 6d 76 66 79 6d 70 67 |gnnsdxsvdmvfympg| 00000020 0a 66 6f 6f 0a 69 78 73 6c 76 76 78 72 67 6b 6a |.foo.ixslvvxrgkj| 00000030 70 74 78 6d 63 67 6e 6e 73 64 78 73 76 64 6d 76 |ptxmcgnnsdxsvdmv| 00000040 66 79 6d 70 67 0a |fympg.| 00000046 critter phk> sha256 _ SHA256 (_) = 455ce847f0073c7ab3b1465f74507b75d3dc064c1e7de3b71e00de9092fdc89a critter phk> openssl dgst -sha256 < _ 455ce847f0073c7ab3b1465f74507b75d3dc064c1e7de3b71e00de9092fdc89a The sourcefile lib/libvarnish/cli_auth.c contains a useful function which calculates the response, given an open filedescriptor to the secret file, and the challenge string.

EXAMPLES

Simple example: All requests where req.url exactly matches the string /news are banned from the cache: req.url == "/news" Example: Ban all documents where the serving host is "example.com" or "www.example.com", and where the Set-Cookie header received from the backend contains "USERID=1663": req.http.host ~ "^(?i)(www\.)example.com$" && obj.http.set-cookie ~ "USERID=1663"

AUTHORS

This manual page was originally written by Per Buer and later modified by Federico G. Schwindt, Dridi Boukelmoune, Lasse Karstensen and Poul-Henning Kamp.

SEE ALSO

o varnishadm(1) o varnishd(1) o vcl(7) VARNISH-CLI(7)

Search: Section: