Hello team
Is there any php/apache directive that cut the apache response after a certain usage like maxconnection?
Asking because we have performed a load test on a RVS S14 and after 150 user no one was able to navigate the website even is the load on the server was more than normal between 24 and 25.
Any clue?
keyhelp and php/apache directive
- info@eurhosting.net
- KeyHelp Translator
- Posts: 45
- Joined: Tue 24. May 2016, 15:17
- Location: Brno
- Contact:
keyhelp and php/apache directive
Stop stop stop
If hosting is not your main focus, I can be of help to mantain your servers
If hosting is not your main focus, I can be of help to mantain your servers
Re: keyhelp and php/apache directive
Hello,
check the Error Log of the Webserver /var/log/apache2/error.log if the server reaches MaxRequestWorkers limit
check the Error Log of the Webserver /var/log/apache2/error.log if the server reaches MaxRequestWorkers limit
Mit freundlichen Grüßen / Best regards
Florian Cheno
**************************************************************
Keyweb AG - Die Hosting Marke
Neuwerkstr. 45/46, 99084 Erfurt / Germany
http://www.keyweb.de - http://www.keyhelp.de
**************************************************************
Florian Cheno
**************************************************************
Keyweb AG - Die Hosting Marke
Neuwerkstr. 45/46, 99084 Erfurt / Germany
http://www.keyweb.de - http://www.keyhelp.de
**************************************************************
-
- Posts: 579
- Joined: Tue 9. Feb 2016, 16:44
Re: keyhelp and php/apache directive
I think this load is pretty high.info@eurhosting.net wrote: ↑Wed 6. Jan 2021, 12:39 ... even is the load on the server was more than normal between 24 and 25.
Use this command on the shell:info@eurhosting.net wrote: ↑Wed 6. Jan 2021, 12:39 Is there any php/apache directive that cut the apache response after a certain usage like maxconnection?
Code: Select all
apache2ctl status
We had this problem due to massiv access from a bot via https://IP.of.the.server.
The solution was to block the bot on the firewall.
Viele Grüße, Christian