[Dovecot] Cache details
Hi All,
Is there any specific details we can extract from dovecots authentication cache (besides Authentication cache hits)? Reason i am asking is because we had a mysql user account which was returning a unknown user account. Fixing the one value in the sql result didnt have any affect and Dovecot was still returning an auth failure for the user after 24 hours had elapsed, even though auth_cache_negative_ttl was set to 120.
Restarting Dovecot or a SIGHUP on dovecot-auth sorted out the problem. It would be useful if we could interrogate the cache somehow to see what cache entry is been hit.
Auth cache settings are as follows:
auth_cache_size = 51200 auth_cache_ttl = 2100 auth_cache_negative_ttl = 120
Any suggestions appreciated.
Thanks, Warren
On Tue, 2008-11-25 at 13:57 +0200, Warren Baker wrote:
Hi All,
Is there any specific details we can extract from dovecots authentication cache (besides Authentication cache hits)? Reason i am asking is because we had a mysql user account which was returning a unknown user account. Fixing the one value in the sql result didnt have any affect and Dovecot was still returning an auth failure for the user after 24 hours had elapsed, even though auth_cache_negative_ttl was set to 120.
Restarting Dovecot or a SIGHUP on dovecot-auth sorted out the problem. It would be useful if we could interrogate the cache somehow to see what cache entry is been hit.
auth_debug=yes would help debugging this. Seems to work correctly with me:
dovecot: Nov 30 04:40:56 Info: auth(default): cache(test,127.0.0.1): hit: dovecot: Nov 30 04:40:56 Info: auth(default): cache(test,127.0.0.1): User unknown .. dovecot: Nov 30 04:41:11 Info: auth(default): cache(test,127.0.0.1): expired dovecot: Nov 30 04:41:11 Info: auth-worker(default): sql(test,127.0.0.1): query: select password from users where username = 'test'
participants (2)
-
Timo Sirainen
-
Warren Baker