On Wed, 2003-09-03 at 15:29, Henrik Nordstrom wrote:
> On Wednesday 03 September 2003 06.09, harrylucs@optusnet.com.au wrote:
>
> > I hope my deductions make sense,
>
> It does. The only complications is how to find a good way of merging
> the access logs from two or more proxies to build the request graphs.
> It is not always trivial to identify which requests on a upstream
> proxy belongs to the downstream request, but by keeping the time in
> synch (i.e. NTP) and sorting on time you can most likely make it
> without to much fuzz.
One could use external ACL tags to tag requests that don't have ID's,
and assign them an id specific to the first cache that recieves it.
Not much use for extant infrastructure, but worth considering...
Rob
-- GPG key available at: <http://members.aardvark.net.au/lifeless/keys.txt>.
This archive was generated by hypermail pre-2.1.9 : Tue Dec 09 2003 - 17:19:30 MST