traefik.entrypoint.request.duration
Request duration at entrypointDimensions:None
Interface Metrics (3)
Dimensions:None
Dimensions:None
Sources
Technical Annotations (58)
Configuration Parameters (16)
ADVERTISE_IPrecommended: Internal IP address (e.g., https://192.168.0.100:32400/) rather than external domainaccessLog.filters.minDurationrecommended: 10mstraefik.http.routers.*.middlewaresrecommended: authelia@file (single middleware, not chained with CrowdSec)entrypoints.<name>.transport.lifecycle.gracetimeoutrecommended: 30-60entrypoints.<name>.http2.maxconcurrentstreamsrecommended: 250-1000respondingTimeouts.readTimeoutrecommended: p90-p99 percentilerespondingTimeouts.writeTimeoutrecommended: p90-p99 percentilerespondingTimeouts.idleTimeoutrecommended: p90-p99 percentileentryPoints.name.transport.respondingTimeouts.readTimeoutrecommended: 60entryPoints.name.transport.respondingTimeouts.writeTimeoutrecommended: 0readTimeoutentryPoints.{name}.transport.respondingTimeouts.readTimeoutrecommended: 15s in example; increase for services with large request bodies (>1MiB)experimental.fastProxyrecommended: enabled in exampleentryPoints.*.transport.respondingTimeouts.readTimeoutrecommended: 600sentryPoints.*.transport.respondingTimeouts.idleTimeoutrecommended: 600sentryPoints.*.transport.respondingTimeouts.writeTimeoutrecommended: 600sError Signatures (7)
499http status499 Client Closed Requestlog patterncontext canceledlog pattern504http status504 Gateway Timeoutlog patternError while writing request error="read tcplog patterni/o timeoutlog patternCLI Commands (4)
apt install crowdsec-firewall-bouncer-iptablesremediationdocker run --name swiss-army-knife --net=container:traefik -itd leodotcloud/swiss-army-knifediagnostictime curl -svL http://whoami.mydomain.com |& ts '[%Y-%m-%d %H:%M:%.S]'diagnostictcpdump -n -i eth1diagnosticTechnical References (31)
cronjobcomponentlog rotationconceptresource constraintsconceptworkloadconceptdisk I/OcomponentPuma 6 chipsetcomponenthairpin NATconceptloopback functionalityconceptlatencyconceptrequest durationconcepterror ratiosconceptForwardAuthcomponentTraefik v3componentmiddleware chainconceptgraceful shutdownconceptHTTP/2protocolHTTP/2 streamsconceptp50conceptp90conceptp99conceptreadTimeoutcomponentwriteTimeoutcomponentContent-LengthprotocolentryPointcomponentrespondingTimeoutsconceptfastProxycomponentmacvlancomponentbridge networkcomponentARPprotocolTCP retransmissionconceptentryPointscomponentRelated Insights (20)
Log rotation background jobs cause periodic response time spikeswarning
▸
Resource saturation causes request response time degradationcritical
▸
Disk I/O bottleneck delays all requests globallycritical
▸
User expectation of 2-second response time thresholdinfo
▸
Router loopback bug causes 100x latency increase when accessing Traefik via external domain from internal networkcritical
▸
High request latency at p99 degrading user experiencewarning
▸
Uptime-based alerts waste debugging time compared to latency spike alertsinfo
▸
Monitoring raw traffic totals delays detection of production health issuesinfo
▸
Chained ForwardAuth middlewares cause request timeouts and silent failurescritical
▸
Graceful shutdown timeout too short terminates in-flight requestswarning
▸
HTTP/2 concurrent stream limit causes request queueingwarning
▸
Timeout configuration should be based on request duration percentilesinfo
▸
Read timeout too low causes rejection of legitimate slow requestswarning
▸
Write timeout terminates response transmission before completionwarning
▸
Content-Length header on GET requests causes indefinite hangcritical
▸
Slow client request bodies exceeding readTimeout logged as HTTP 499 Client Closed Requestwarning
▸
fastProxy enabled changes readTimeout violations to HTTP 504 Gateway Timeoutwarning
▸
Multi-network Docker configuration causes 5-second connection delayswarning
▸
Routed traffic through gateway causes TCP retransmissions and delayswarning
▸
Large file uploads fail due to default Traefik timeout valueswarning
▸