varnish-cli(7)

NAME

   varnish-cli - Varnish Command Line Interface

DESCRIPTION

   Varnish has a command line interface (CLI) which can control and change
   most of the operational parameters and the  configuration  of  Varnish,
   without interrupting the running service.

   The CLI can be used for the following tasks:

   configuration
          You can upload, change and delete VCL files from the CLI.

   parameters
          You  can  inspect  and change the various parameters Varnish has
          available  through  the  CLI.  The  individual  parameters   are
          documented in the varnishd(1) man page.

   bans   Bans  are  filters that are applied to keep Varnish from serving
          stale content. When you issue a ban Varnish will not  serve  any
          banned  object  from  cache,  but  rather  re-fetch  it from its
          backend servers.

   process management
          You can stop and start the cache (child) process though the CLI.
          You  can  also  retrieve  the  latest  stack  trace if the child
          process has crashed.

   If you invoke varnishd(1) with -T, -M or -d the CLI will be  available.
   In  debug  mode (-d) the CLI will be in the foreground, with -T you can
   connect to it with varnishadm or  telnet  and  with  -M  varnishd  will
   connect  back  to  a listening service pushing the CLI to that service.
   Please see varnishd(1) for details.

   Syntax
   Commands are usually terminated with a newline.  Long  command  can  be
   entered  using  shell-style  here  document (here-document or heredoc).
   The format of here document is:

      << word
           here document
      word

   word can be any continuous string chosen to make sure it doesn't appear
   naturally in the following here document. Often EOF or END is used.

   When  using  the here document style of input there are no restrictions
   on length. When using newline-terminated  commands  maximum  length  is
   limited by the varnishd parameter cli_buffer.

   When  commands are newline terminated they get tokenized before parsing
   so if you have  significant  spaces  enclose  your  strings  in  double
   quotes.  Within  the  quotes you can escape characters with \. The n, r
   and t get translated to newlines, carriage  returns  and  tabs.  Double
   quotes themselves can be escaped with a backslash.

   To  enter characters in octals use the \nnn syntax. Hexadecimals can be
   entered with the \xnn syntax.

   Commands
   auth <response>
      Authenticate.

   backend.list [-p] [<backend_pattern>]
      List backends.  -p also shows probe status.

   backend.set_health <backend_pattern> [auto|healthy|sick]
      Set health status on the backends.

   ban <field> <operator> <arg> [&& <field> <oper> <arg> ...]
      Mark obsolete all objects where all the conditions match.

   ban.list
      List the active bans.

      The output format is:

      * Time the ban was issued.

      * Objects referencing this ban.

      * C if ban is completed = no further testing against it.

      * if lurker debugging is enabled:

        * R for req.* tests

        * O for obj.* tests

        * Pointer to ban object

      * Ban specification

   banner
      Print welcome banner.

   help [<command>]
      Show command/protocol help.

   panic.clear [-z]
      Clear the last panic, if any,  -z  will  clear  related  varnishstat
      counter(s)

   panic.show
      Return the last panic, if any.

   param.set <param> <value>
      Set parameter value.

   param.show [-l] [<param>]
      Show parameters and their values.

   ping [<timestamp>]
      Keep connection alive.

   quit
      Close connection.

   start
      Start the Varnish cache process.

   status
      Check status of Varnish cache process.

   stop
      Stop the Varnish cache process.

   storage.list
      List storage devices.

   vcl.discard <configname|label>
      Unload the named configuration (when possible).

   vcl.inline <configname> <quoted_VCLstring> [auto|cold|warm]
      Compile and load the VCL data under the name provided.

      Multi-line VCL can be input using the here document ref_syntax.

   vcl.label <label> <configname>
      Apply label to configuration.

   vcl.list
      List all loaded configuration.

   vcl.load <configname> <filename> [auto|cold|warm]
      Compile and load the VCL file under the name provided.

   vcl.show [-v] <configname>
      Display the source code for the specified configuration.

   vcl.state <configname> [auto|cold|warm]
      Force the state of the named configuration.

   vcl.use <configname|label>
      Switch to the named configuration immediately.

   Backend Pattern
   A  backend pattern can be a backend name or a combination of a VCL name
   and backend name in "VCL.backend" format.  If the VCL name is  omitted,
   the  active  VCL  is  assumed.  Partial matching on the backend and VCL
   names is supported using shell-style wilcards, e.g. asterisk (*).

   Examples:

      backend.list def*
      backend.list b*.def*
      backend.set_health default sick
      backend.set_health def* healthy
      backend.set_health * auto

   Ban Expressions
   A ban expression consists of  one  or  more  conditions.   A  condition
   consists  of  a field, an operator, and an argument.  Conditions can be
   ANDed together with "&&".

   A field can be any of the variables from  VCL,  for  instance  req.url,
   req.http.host or obj.http.set-cookie.

   Operators  are "==" for direct comparison, "~" for a regular expression
   match, and ">" or "<" for size  comparisons.   Prepending  an  operator
   with "!" negates the expression.

   The  argument  could  be  a  quoted  string,  a  regexp, or an integer.
   Integers can have "KB", "MB", "GB" or "TB" appended  for  size  related
   fields.

   VCL Temperature
   A  VCL  program  goes  through  several states related to the different
   commands: it can be loaded, used, and later  discarded.  You  can  load
   several  VCL programs and switch at any time from one to another. There
   is only one active VCL, but the previous active VCL will be  maintained
   active until all its transactions are over.

   Over time, if you often refresh your VCL and keep the previous versions
   around, resource consumption will  increase,  you  can't  escape  that.
   However,  most  of the time you want only one to pay the price only for
   the active VCL and keep older VCLs in case you'd need to rollback to  a
   previous version.

   The  VCL  temperature  allows you to minimize the footprint of inactive
   VCLs. Once a VCL becomes cold, Varnish will release all  the  resources
   that  can  be be later reacquired. You can manually set the temperature
   of a VCL or let varnish automatically handle it.

   Scripting
   If you are going to write a script that  talks  CLI  to  varnishd,  the
   include/cli.h contains the relevant magic numbers.

   One  particular  magic number to know, is that the line with the status
   code and length field always is exactly 13 characters  long,  including
   the NL character.

   The  varnishapi  library  contains functions to implement the basics of
   the CLI protocol, see the vcli.h include file.

   Authentication with -S
   If the -S secret-file is given as argument to varnishd, all network CLI
   connections  must  authenticate,  by  proving they know the contents of
   that file.

   The file is read at the  time  the  auth  command  is  issued  and  the
   contents  is  not  cached  in varnishd, so it is possible to update the
   file on the fly.

   Use the unix file permissions to control access to the file.

   An authenticated session looks like this:

      critter phk> telnet localhost 1234
      Trying ::1...
      Trying 127.0.0.1...
      Connected to localhost.
      Escape character is '^]'.
      107 59
      ixslvvxrgkjptxmcgnnsdxsvdmvfympg

      Authentication required.

      auth 455ce847f0073c7ab3b1465f74507b75d3dc064c1e7de3b71e00de9092fdc89a
      200 279
      -----------------------------
      Varnish Cache CLI 1.0
      -----------------------------
      Linux,4.4.0-1-amd64,x86_64,-jnone,-smalloc,-smalloc,-hcritbit
      varnish-trunk revision dc360a4

      Type 'help' for command list.
      Type 'quit' to close CLI session.
      Type 'start' to launch worker process.

   The CLI status of 107 indicates that authentication is  necessary.  The
   first 32 characters of the response text is the challenge "ixsl...mpg".
   The challenge is  randomly  generated  for  each  CLI  connection,  and
   changes each time a 107 is emitted.

   The  most  recently  emitted challenge must be used for calculating the
   authenticator "455c...c89a".

   The authenticator is calculated by applying the SHA256 function to  the
   following byte sequence:

   * Challenge string

   * Newline (0x0a) character.

   * Contents of the secret file

   * Challenge string

   * Newline (0x0a) character.

   and dumping the resulting digest in lower-case hex.

   In the above example, the secret file contained foon and thus:

      critter phk> cat > _
      ixslvvxrgkjptxmcgnnsdxsvdmvfympg
      foo
      ixslvvxrgkjptxmcgnnsdxsvdmvfympg
      ^D
      critter phk> hexdump -C _
      00000000  69 78 73 6c 76 76 78 72  67 6b 6a 70 74 78 6d 63  |ixslvvxrgkjptxmc|
      00000010  67 6e 6e 73 64 78 73 76  64 6d 76 66 79 6d 70 67  |gnnsdxsvdmvfympg|
      00000020  0a 66 6f 6f 0a 69 78 73  6c 76 76 78 72 67 6b 6a  |.foo.ixslvvxrgkj|
      00000030  70 74 78 6d 63 67 6e 6e  73 64 78 73 76 64 6d 76  |ptxmcgnnsdxsvdmv|
      00000040  66 79 6d 70 67 0a                                 |fympg.|
      00000046
      critter phk> sha256 _
      SHA256 (_) = 455ce847f0073c7ab3b1465f74507b75d3dc064c1e7de3b71e00de9092fdc89a
      critter phk> openssl dgst -sha256 < _
      455ce847f0073c7ab3b1465f74507b75d3dc064c1e7de3b71e00de9092fdc89a

   The  sourcefile  lib/libvarnish/cli_auth.c  contains  a useful function
   which calculates the response, given  an  open  filedescriptor  to  the
   secret file, and the challenge string.

EXAMPLES

   Load a multi-line VCL using shell-style here document:

      vcl.inline example << EOF
      vcl 4.0;

      backend www {
          .host = "127.0.0.1";
          .port = "8080";
      }
      EOF

   Ban all requests where req.url exactly matches the string /news:

      ban req.url == "/news"

   Ban   all   documents  where  the  serving  host  is  "example.com"  or
   "www.example.com", and where the Set-Cookie header  received  from  the
   backend contains "USERID=1663":

      ban req.http.host ~ "^(?i)(www\\.)example.com$" && obj.http.set-cookie ~ "USERID=1663"

AUTHORS

   This  manual page was originally written by Per Buer and later modified
   by Federico  G.  Schwindt,  Dridi  Boukelmoune,  Lasse  Karstensen  and
   Poul-Henning Kamp.

SEE ALSO

   * varnishadm(1)

   * varnishd(1)

   * vcl(7)

                                                            VARNISH-CLI(7)



Opportunity


Personal Opportunity - Free software gives you access to billions of dollars of software at no cost. Use this software for your business, personal use or to develop a profitable skill. Access to source code provides access to a level of capabilities/information that companies protect though copyrights. Open source is a core component of the Internet and it is available to you. Leverage the billions of dollars in resources and capabilities to build a career, establish a business or change the world. The potential is endless for those who understand the opportunity.

Business Opportunity - Goldman Sachs, IBM and countless large corporations are leveraging open source to reduce costs, develop products and increase their bottom lines. Learn what these companies know about open source and how open source can give you the advantage.


Free Software


Free Software provides computer programs and capabilities at no cost but more importantly, it provides the freedom to run, edit, contribute to, and share the software. The importance of free software is a matter of access, not price. Software at no cost is a benefit but ownership rights to the software and source code is far more significant.

Free Office Software - The Libre Office suite provides top desktop productivity tools for free. This includes, a word processor, spreadsheet, presentation engine, drawing and flowcharting, database and math applications. Libre Office is available for Linux or Windows.


Free Books


The Free Books Library is a collection of thousands of the most popular public domain books in an online readable format. The collection includes great classical literature and more recent works where the U.S. copyright has expired. These books are yours to read and use without restrictions.

Source Code - Want to change a program or know how it works? Open Source provides the source code for its programs so that anyone can use, modify or learn how to write those programs themselves. Visit the GNU source code repositories to download the source.


Education


Study at Harvard, Stanford or MIT - Open edX provides free online courses from Harvard, MIT, Columbia, UC Berkeley and other top Universities. Hundreds of courses for almost all major subjects and course levels. Open edx also offers some paid courses and selected certifications.

Linux Manual Pages - A man or manual page is a form of software documentation found on Linux/Unix operating systems. Topics covered include computer programs (including library and system calls), formal standards and conventions, and even abstract concepts.