Pound
*****

This edition of the 'Pound Manual', last updated 15 July 2025, documents
'pound' version 4.16.90.

   Copyright (C) 2024-2025 Sergey Poznyakoff

     Permission is granted to copy, distribute and/or modify this
     document under the terms of the GNU Free Documentation License,
     Version 1.3 or any later version published by the Free Software
     Foundation; with no Invariant Sections, no Front-Cover Texts, and
     no Back-Cover Texts.  A copy of the license is included in the
     section entitled "GNU Free Documentation License."
Pound
1 Overview
2 Introduction
3 Usage
4 Simple Proxy
  4.1 Service Selection
    4.1.1 Regular Expressions
    4.1.2 ACL
  4.2 Request modifications
  4.3 Conditional branches
  4.4 Modifying responses
  4.5 Authentication
  4.6 Redirects
  4.7 Error responses
5 HTTPS
  5.1 ACME
  5.2 Redirect HTTP to HTTPS
  5.3 HTTPS backends
6 Request balancing
  6.1 Sessions
  6.2 Balancer groups
  6.3 Dynamic backends
7 Worker model
8 Logging
9 Configuration
  9.1 Lexical structure
  9.2 Syntax
  9.3 String Expansions
    9.3.1 Backreference expansion
    9.3.2 Request Accessor Interpretation
  9.4 Global directives
    9.4.1 Runtime directives
    9.4.2 Worker Settings
    9.4.3 Proxy Tuning Directives
    9.4.4 SSL Settings
    9.4.5 Regular Expression Settings
    9.4.6 ACL Definition
  9.5 File inclusion
  9.6 Logging configuration
  9.7 Management Interface
    9.7.1 Remote Access to Management Interface
  9.8 Timeouts
  9.9 ListenHTTP
    9.9.1 Listener address
    9.9.2 Listener-specific limits
    9.9.3 Error definitions
    9.9.4 Listener logging
    9.9.5 Request Modification
      9.9.5.1 The 'rewrite' statement
    9.9.6 Response Modification
      9.9.6.1 The 'Rewrite response' statement.
    9.9.7 Rewriting error responses
    9.9.8 Service definitions
  9.10 ListenHTTPS
  9.11 Service
    9.11.1 Service Selection Statements
    9.11.2 Request and Response Modification
    9.11.3 Service Logging
    9.11.4 Backends
      9.11.4.1 Backend
      9.11.4.2 Globally Defined Backends
      9.11.4.3 Special Backends
    9.11.5 Session
    9.11.6 Other Statements
  9.12 Resolver
10 poundctl
  10.1 'poundctl' commands
  10.2 Using 'poundctl' for remote access
  10.3 Configuring 'poundctl'
    10.3.1 Multiple Servers Configuration
  10.4 'poundctl' options
  10.5 'poundctl' template
    10.5.1 Template syntax
      10.5.1.1 Actions
      10.5.1.2 Arguments
    10.5.2 Pipelines
    10.5.3 Variables
    10.5.4 Input object
      10.5.4.1 Full listing
      10.5.4.2 Listener
      10.5.4.3 Service
      10.5.4.4 Backend
Appendix A Metric Families
Appendix B Time and Date Formats
Appendix C GNU Free Documentation License
Index

1 Overview
**********

'Pound' is a reverse proxy, load balancer and HTTPS front-end for Web
servers.  It was developed to provide for even distribution of load
between backend httpd servers and to allow for a convenient SSL wrapper
for those servers that do not offer it natively.

   The core principles of its design are simplicity and safety.  'Pound'
is a very small program, easily audited for security problems.  Normally
it runs as a non-privileged user, and can optionally be run in a
chrooted environment.  With several exceptions, it does not access the
hard disk during its runtime.  In short, it should pose no security
threat to the server it runs at.

   The original version of 'pound' was written by Robert Segall at Apsis
GmbH(1). In 2018, I added support for newer OpenSSL to the then current
version of the program (2.8).  This version of 'pound', hosted on
'github' was further modified by Rick O'Sullivan and Frank Schmirler,
who added WebSocket support.

   On April 2020, Apsis started development of 'pound' 3.0 - essentially
an attempt to rewrite program from scratch, introducing dependencies on
some third-party software.

   On 2022-09-19, the development and maintenance of 'pound' was
officially discontinued and Apsis GmbH was dissolved.  Following that, I
decided to continue development of the program taking my fork as a base.
I considered the branch 3.0, which emerged for a short time before the
original project was abandoned, to be a failed experiment.  To ensure
consistent versioning and avoid confusion, my versioning of 'pound'
started at number 4.0.

   ---------- Footnotes ----------

   (1) <https://web.archive.org/web/20221202094441/https://apsis.ch/>

2 Introduction
**************

The job of a proxy server is to receive incoming HTTP or HTTPS requests,
route them to the corresponding web server ("backend"), wait for it to
reply and forward the response back to the querying party.  If more than
one backend is configured to serve requests, the proxy should distribute
requests evenly between them, so that each backend gets a share of
requests proportional to its capacity.

   'Pound' gets information about backends and instructions on HTTP
request routing from its configuration file 'pound.cfg'.  It is located
in the "system configuration directory", which is normally '/etc'(1).
Syntactically, the configuration file is a sequence of "statements" and
"sections", separated by arbitrary amount of empty lines and comments.
A "simple statement" occupies a single line and consists of a keyword
("directive") and one or more values separated by whitespace.  A
"section" is a compound statement that encloses other statements and
sections.  Sections begin with a keyword, optionally followed by
arguments, and end with a word 'End' on a line by itself.  All keywords
are case-insensitive.

   The configuration file defines three kinds of objects: "listeners",
"services", and "backends".  These are defined as configuration
sections.

   A "listener" defines IP address (and optionally port), 'pound' will
be listening on for incoming requests.  It can also be regarded as a
frontend definition.  Listener declarations start with 'ListenHTTP' (for
plaintext HTTP frontends) or 'ListenHTTPS' (for HTTPS frontends)
keywords.

   "Service" sections define rules that decide to which backend to route
requests received by the listeners.  These rules normally involve
analysis of the requested URL or HTTP headers.  A service may also
contain statements that modify requests or responses.

   Services are normally declared inside listeners.  Thus, when a
listener receives a request, it iterates over its services (in the order
of their appearance in the configuration file) to find the one that
matches the request.  If such a service is found, it receives the
request and eventually passes it on to a backend.

   Services may also be declared outside any listeners, in the global
scope.  Such services are shared between all listeners.  They are tried
if none of the services declared within a listener match the incoming
request.

   Service declarations start with the 'Service' keyword.

   "Backends" are objects that actually handle requests and produce
responses.  Most often these are "regular backends", which declare IP
addresses and ports of servers that are to handle the requests.
Backends are defined inside of services, so that the service that
matched the request routes it to its backend.  If more than one backend
is defined within a service, incoming requests will be distributed so
that each backend gets its share of the load.

   Several special backend types are provided, such as emergency
backends, redirects, etc.  Only one special backend can be declared for
a service, and it cannot be used together with other backend types.

   Thus, an average request processing looks as follows.  First, a
request is received by one of the listeners.  The listener then iterates
over its services, until it finds one that matches the request.  If no
such service was found, the listener retries the process with the
services defined in the global scope.  If no matching service is found,
a 503 error ('Service Unavailable') is returned.  Otherwise, if the
matching service was found, that service passes the request to one of
its backends.  It may modify the request before that, if it is
instructed so by the configuration.  Once the backend responds, the
service passes the response back to the listener (again, optionally
modifying it, if needed), which finally passes it back to the querying
party.

   ---------- Footnotes ----------

   (1) The exact location depends on compilation options.  When in
doubt, examine the output of 'pound -V'.

3 Usage
*******

When started, 'pound' first parses its configuration file.  If any
errors are detected at this stage, it prints the appropriate diagnostics
on the standard error and exits with code 1.  Otherwise, if the
configuration file is OK, 'pound' opens sockets declared in the listener
sections, detaches itself from the controlling terminal and starts
serving incoming requests.  From that moment on, all diagnostic messages
are reported via 'syslog' (*note Logging::).

   To check whether the configuration file is correct, run 'pound' with
the '-c' (for "check") configuration option:

     pound -c

   Started this way, 'pound' will check the configuration file, report
any errors, if found, and exit with status 0 if there are no errors or 1
otherwise.  The option '-v' can be used to increase the verbosity level.
In particular, it instructs 'pound' to print a confirmation message on
standard error, if no errors have been encountered (by default it would
exit silently in this case).

   To use alternative configuration file, supply its full pathname with
the '-f' option, e.g.:

     pound -f /etc/pound/test.cfg

   If you are experimenting with new configurations, you might want to
run 'pound' in foreground mode and have it print its diagnostics on the
standard error.  This is done by the '-e' option.  So, for testing
purposes, it is quite common to start it this way:

     pound -e

   Another option, '-F', has similar effect, except that it honors
logging settings from the configuration file (*note Logging::), i.e.
when used with this option, 'pound' will remain in foreground, but will
report its messages in accordance with its configuration file.

   The following table summarizes all command line options:

'-c'
     Check configuration file for syntax error and exit.  Exit code
     indicates whether the configuration is OK (0) or not (1).

'-e'
     Start in foreground mode and log to standard error (or standard
     output, for messages with LOG_DEBUG and LOG_INFO severity levels).
     This option ignores the 'LogLevel' configuration setting (*note
     Logging::).

'-F'
     Foreground mode.  Do not detach from the controlling terminal after
     startup, but remain in the foreground instead.  This overrides the
     'Daemon' configuration setting (*note Daemon::).  The log stream
     (syslog facility or stderr) requested in the configuration file
     remains in effect.

'-f FILE'
     Read configuration from the supplied FILE, instead of from the
     default location.

'-h'
     Print short command line usage summary and exit.

'-p FILE'
     Sets location of the "PID file".  This is the file where 'pound'
     will write its PID after startup.  This option overrides the value
     set by the 'PIDFile' configuration setting (*note PIDFile::).

'-v'
     Verbose mode.  During startup, error messages will be sent to
     stderr (stdout, for 'LOG_DEBUG' and 'LOG_INFO' severities).  If
     'pound' is configured to log to syslog, error diagnostics will be
     duplicated there as well.  After startup the configuration settings
     take effect.

     When used with '-c' this option also instructs 'pound' to print an
     extra confirmation message on standard error, if there are no
     errors in the configuration file.

'-V'
     Print program version, licensing terms, and configuration flags and
     exit with status 0.  You can use this option, in particular, to get
     the default values 'pound' was built with, such as e.g.
     configuration file location.

'-W FEATURE'
'-W no-FEATURE'
     Enable or disable (if prefixed with 'no-') additional 'pound'
     features.  As of version 4.16.90, the following features are
     implemented:

      -- Feature: warn-deprecated
          When parsing the configuration file, warn if it uses any
          deprecated statements.  This is the default.  To suppress
          deprecation messages, use '-W no-warn-deprecated'.

      -- Feature: dns
          Resolve host names found in configuration file and returned in
          the 'Location:' header.  This is the default.

          You can use '-W no-dns' to disable it, in order to suppress
          potentially lengthy network host address lookups.  Make sure
          if your configuration file refers to backends only by their IP
          addresses in this case.

          This setting affects also redirection location rewriting:
          *Note RewriteLocation: Response Modification.

      -- Feature: include-dir=DIR
      -- Feature: no-include-dir
          This controls the "include directory", i.e.  the directory
          where 'pound' looks for relative file names referred to in its
          configuration file.  *Note include directory::, for a detailed
          discussion of this feature.

          Using '-W include-dir=DIR' sets the new value of the include
          directory.

          By default, the system configuration directory is used as
          include directory, so that any relative file names are looked
          up there.  To disable this, use the '-W no-include-dir'
          option.  This means that each relative filename used in
          arguments to the directives in the configuration file will be
          looked up in the current working directory.  This is useful
          mainly in testsuite.

4 Simple Proxy
**************

In this chapter we will deploy several simplest proxying configurations
to illustrate the concepts introduced above.

   Suppose you have an HTTP server running on localhost port 8080, and
want to make it accessible from outside.  This is achieved by the
following configuration file:

     ListenHTTP
         Address 0.0.0.0
         Port 80
         Service
             Backend
                 Address 127.0.0.1
                 Port 8080
             End
         End
     End

   This configuration consists of three nested sections: 'ListenHTTP',
'Service', and 'Backend'.  Each section ends with a keyword 'End' on a
line by itself.

   The first thing that draws attention are 'Address' and 'Port'
statements appearing in both listener and backend sections.  In
'ListenHTTP' they specify the IP address and port to listen on for
incoming requests.  Address '0.0.0.0' stands for all available IP
addresses(1).  In 'Backend' section, these keywords specify the address
and port of the remote server, where incoming requests are to be
forwarded.

   The 'Service' section has no matching conditions, so it will match
all requests.

   ---------- Footnotes ----------

   (1) Strictly speaking, for all available _IPv4_ addresses.  To bind
to all available IPv4 and IPv6 addresses, use '::0'.

4.1 Service Selection
=====================

To route requests to different servers, multiple services are used.  In
this case, each service has one or more "matching rules", i.e.
statements that define conditions that a request must match in order to
be routed to that particular service.  Syntactically, such rules have
the form:

     KW [OPTIONS] "PATTERN"

where KW is a keyword specifying what part of the request is used in
comparison, PATTERN is a textual pattern which that part is matched
against, and OPTIONS are zero or more flags starting with a dash sign,
which define matching algorithm.

   Perhaps the most often used condition is 'Host', which compares the
value of the HTTP 'Host' header with the given pattern.  By default it
uses exact case-insensitive match:

     Host "example.com"

   To treat the pattern as a regular expression, use the '-re' option,
as in:

     Host -re ".*\\.example\\.com"

   Whenever we speak about regular expression we usually mean POSIX
extended regular expressions (*note POSIX extended regular expressions:
(sed)Extended regexps.).  However, other regex types can also be used.
This is covered in *note Regular Expressions::.

   Notice the use of double backslashes in the above example.  The
backslash before each dot is needed to match it literally, while another
one protects the first one from being interpreted as an escape character
in string (*note Strings::).

   Other useful options are '-beg' and '-end', which enable exact
matching at the beginning and end of the value, correspondingly.  Thus,
the 'Host' statement above can be rewritten as:

     Host -end ".example.com"

   The set of options available for use in matching statements is
uniform.  *Note Table 9.2: conditional-option, for a detailed discussion
of available options.

   The following configuration snippet illustrates the use of matching
rules to select appropriate service (and, correspondingly, backend).  It
will route all requests for 'www.example.com' to backend
'192.0.2.1:8080', and requests for 'admin.example.com' to
'192.0.2.4:8080':

     ListenHTTP
         Address 0.0.0.0
         Port 80

         Service
             Host "www.example.com"
             Backend
                 Address 192.0.2.1
                 Port 8080
             End
         End

         Service
             Host "admin.example.com"
             Backend
                 Address 192.0.2.4
                 Port 8080
             End
         End
     End

   Other matching statements use POSIX regexp matching by default.
These are:

'Header'
     Compare HTTP header against a pattern.  E.g.

          Header "Content-Type:[[:space:]]*text/.*"

'URL'
     Match URL:

          URL "/login/.*&name=.*"

'Path'
     Match the path part of the URL:

          Path -beg "/login"

'Query'
     Match the query part of the URL.

'QueryParam'
     Match the value of a query parameter.  This statement takes two
     arguments: parameter name and pattern, e.g.:

          QueryParam "type" "(int)|(bool)"

   *Note Service Selection Statements::, for a detailed description of
these and other matching statements.

   Multiple matching rules can be used.  Unless expressly specified
otherwise, they are joined by logical 'and' operation.  For example:

     Service
         Host "www.example.com"
         URL "^/admin(/.*)?"
         Backend
             Address 192.0.2.4
             Port 8080
         End
     End

   This service will be used for requests directed to host name
'www.example.com' whose URL begins with '/admin', optionally followed by
more path components (such as, e.g.
'http://www.example.com/admin/login').

   To select a service that matches one of defined rules (i.e.  combine
the rules using logical 'or'), enclose them in 'Match OR' block, as in:

     Match OR
         Host "example.com"
         Host "www.example.com"
     End

   The argument to 'Match' can be 'OR' or 'AND', specifying logical
operation to be used to join the enclosed statements.  The argument can
be omitted, in which case 'AND' is implied.  'Match' statements can be
nested to arbitrary depth, which allows for defining criteria of
arbitrary complexity.  For example:

     Service
         Match OR
             Host "admin.example.com"
             Match AND
                 Host "www.example.com"
                 URL "^/admin(/.*)?"
             End
         End
         Backend
             Address 192.0.2.4
             Port 8080
         End
     End

4.1.1 Regular Expressions
-------------------------

Request matching directives use POSIX extended regular expressions by
default.  If 'pound' was compiled with 'PCRE' or 'PCRE2' library,
"Perl-compatible regular expressions" can be used instead.  This can be
done either globally or individually for a given directive.

   To change regular expression type globally, use the following
directive:

     RegexType pcre

   It affects all request matching directives that appear after it in
the configuration file, until next 'RegexType' directive or end of file,
whichever occurs first.  To change back to POSIX regular expressions,
use 'posix' argument:

     RegexType posix

   Argument to the 'RegexType' directive is case-insensitive.

   Regular expression type can also be selected individually for a
directive, using '-posix' or '-pcre' flags.  For example:

     Host -pcre -icase "(?<!www\\.)example.org"

4.1.2 ACL
---------

Access control lists, or "ACLs", are special request matching statements
that evaluate to true for requests originating from one of the
predefined IP addresses.  Access control lists are defined using the
'ACL' section statement, which has three forms: anonymous, file
reference, and ACL reference.

   In "anonymous" form, the 'ACL' is a section statement: the keyword is
followed by a newline and a list of CIDRs, terminated with 'End' on a
separate line.  Each line in the list defines a single CIDR enclosed in
double quotes.  A "CIDR" consists of a "network address" (IPv4 or IPv6),
optionally followed by slash and "network mask length", a decimal number
in the range [0,32] for IPv4 and [0,64] for IPv6.  For example:

     ACL
         "127.0.0.1/8"
         "192.0.2.0/25"
     End

   For convenience, 'Include' statements can also be used between 'ACL'
and 'End'.

   In "file reference" form, the ACL syntax is:

     ACL -file "NAME"

or

     ACL -filewatch "NAME"

   Here, NAME is the name of a disk file with the ACL definition.  Its
syntax is similar to the contents of anonymous ACL definition, except
that CIDRs need not be quoted, and 'Include' statements are not allowed.
If the file name is relative, it is looked up in the *note include
directory::.

   If the '-file' keyword is used, the file is read at startup and its
contents is remembered for the lifetime of the program.  It is an error
if the file does not exist.  Any errors in the file are treated as
configuration file errors and cause immediate program termination.

   If the '-filewatch' keyword is used, the file is read at startup and
is being monitored for changes during the runtime.  Once the file
changes, it is re-read and the ACL is reconstructed from its new
contents.  If the file is removed, the ACL is cleared (which means that
it will evaluate to false during request matching), and a file creation
monitor is installed.  Once the file is re-created, the monitor will
wake up, the file will be rescanned and the ACL updated accordingly.

   Consequently, when '-filewatch' form is used, it is OK if the file
does not exist at startup.  Furthermore, any errors in the file contents
are reported, but don't cause program termination.

   On GNU/Linux systems, 'pound' uses 'inotify' kernel API (1), which
allows it to react immediately on the file system changes.  On systems
where 'inotify' is not available, 'pound' falls back to periodic
checking for changes in file modification time.  The interval between
two succeeding checks is defined by the 'WatcherTTL' statement (*note
WatcherTTL: Timeouts.).

   The third syntax form for 'ACL' statements is "ACL reference".  As
its name implies, the ACL in this form refers to another "named ACL",
defined elsewhere in the configuration files.  Syntactically, it is

     ACL "NAME"

where NAME is the name of the ACL to refer to.  This syntax makes it
possible to use a single ACL in multiple places of the configuration
file.

   Named access control lists are defined at the top level of a
configuration file.  Syntactically, the definition is similar to
anonymous or file reference forms of ACLs as discussed above, except
that the keyword 'ACL' is followed on the same line by the name to be
assigned to that ACL, in double quotes.  Thus the following are valid
named ACL declarations:

     ACL "secure" -file "aclfile"

     ACL "secure" -filewatch "aclfile"

     ACL "secure"
         "127.0.0.1/8"
         "192.0.2.0/25"
     End

   All three examples define a named ACL 'secure'.  The former two read
its contents from the disk file 'aclfile'.  The latter one provides its
definition in the form of a section.  This ACL can then be used in any
'Service' appearing after its definition by using the following
construct:

     ACL "secure"

   Consider for example the following service declaration:

     Service
         ACL "secure"
         Path -beg "/stat"
         Backend
             ...
         End
     End

   This service will handle requests whose URL starts with '/stat', if
they came from one of the IP addresses mentioned in the access control
list with the name 'secure'.  Effectively, this means that the access to
that URL is limited to these IP addresses.

   ---------- Footnotes ----------

   (1) *Note monitoring file system events: (inotify(7))inotify.  To
check, if your 'pound' binary is compiled with the support for inotify
API, examine the output of 'pound -V'.

4.2 Request modifications
=========================

A service can modify requests before forwarding them to backends.
Several statements are provided for that purpose:

SetHeader
     Set a HTTP header.

DeleteHeader
     Delete a HTTP header.

SetURL
     Rewrite the request URL.

SetPath
     Rewrite the path part of the URL.

SetQuery
     Rewrite the query part of the URL.

SetQueryParam
     Set a single query parameter.

   For example, the following service declaration will add the header
'X-Resent-By: pound' to each request:

     Service
         SetHeader "X-Resent-By: pound"
         Backend
            ...
         End
     End

   Arguments to request modification statements are expanded before
actual use.  During expansion, references to "parenthesized
subexpressions" in matching rules are replaced with their actual values.
"Parenthesized subexpression" is a part of a regular expression enclosed
in parentheses.  It can be referred to in string arguments as '$N',
where N is its ordinal number.  Numbers start at one, '$0' referring to
the entire string that matched.

   The process of expanding parenthesized subexpressions is called
"backreference expansion".

   For example, the following condition:

     Header "Content-Type: ([^/]+)/(.+)$"

has two subexpressions: '$1' and '$2'.  The following fragment uses
these values to add two query parameters to the URL:

     SetQueryParam "type" "$1"
     SetQueryParam "subtype" "$2"

   As a more practical example, the following service rewrites the path
to JPEG and GIF images:

     Service
         Path "/([^/]+\\.(jpg|gif))$"
         SetPath "/images/$1"
         ...
     End

   When several matching statements are used, these forms refer to the
last one that matched.  Subexpressions in prior statements can be
referred to using the '$I(J)' construct.  Here, J is the 0-based number
of the statement, counted from the last one upwards.  For example, given
the following statements:

     Host -re "www\.(.+)"
     Header -icase "^Content-Type: *(.*)"
     Path "^/static(/.*)?"

'$1' refers to the subexpression of 'Path', '$1(1)' to that of 'Header',
and '$1(2)' to that of 'Host'.

   String arguments to 'Set' statements can also contain "request
accessors" - special constructs that are expanded to particular values
from the request.  Syntactically, a request accessor is '%[NAME]', where
NAME denotes the request part to access.  For example, '%[url]' expands
to entire URL, '%[path]' to the path part of the URL, etc.

   Using request accessors, the above example of path modification can
be rewritten as:

     Path "\\.(jpg|gif)$"
     SetPath "/images%[path]"

   *Note Request Accessors::, for a detailed discussions of available
accessors.

4.3 Conditional branches
========================

Conditional request modifications can be organized in logical branches,
each branch being applied only if the request matches certain condition.
The 'Rewrite' section encloses a set of request matching rules followed
by one or more request modification statements, which will be applied if
the former match the request.  Optional 'Else' sub-section, which in
turn contains request matching rules and modification statements, will
be tried if those rules don't match.  Any number of 'Else' sub-sections
is allowed, each one being tried if the previous ones don't match.

   The example below illustrates this concept.  This configuration
snippet sets different paths depending on the file type and URL used:

     Service
         Rewrite
             Header "Content-Type:[[:space:]]+image/.*"
             SetPath "/images%[path]"
         Else
             Match AND
                 Host "example.org"
                 Path "\\.[^.]+$"
             End
             SetPath "/static%[path]"
         Else
             Path "\\.[^.]+$"
             SetPath "/assets%[path]"
         End
         ...
     End

4.4 Modifying responses
=======================

The 'rewrite' statement can also be used to modify responses received
from backends before passing them back to the querying party.  To
indicate this intent, the 'Rewrite' statement must be followed by the
'response' keyword:

     Rewrite response
         SetHeader "X-Been-There: pound"
     End

   When modifying responses, only two request modification statements
are allowed: 'SetHeader' and 'DeleteHeader'.  The list of request
matching rules is limited as well: 'Header' and 'StringMatch', plus
'Match' and 'Not' conditionals.  Notice that these conditionals operate
on the response, and not on the request, as in previous chapters.  For
example:

     Rewrite response
         Header "Content-Type:[[:space:]]+text/(.*)"
         SetHeader "X-Text-Type: $1"
     End

   This will insert an additional 'X-Text-Type' header into the
response.  It will contain the subtype value from the 'Content-Type'
header of the original response.

4.5 Authentication
==================

Along with access control lists, introduced above (*note ACL::),
authentication provides another way to limit access to certain services.
'Pound' supports "basic authentication", as defined in RFC 7617.

   This authentication method relies on the presence of the
'Authorization' header in the HTTP request.  If the header is present,
its value specifies the 'Basic' authorization method and contains
credentials (username and password) that match one of the users from the
server user database, the request is accepted.  Otherwise a 401
('Authentication Required') or 407 ('Proxy Authentication Required')
response is returned with the 'WWW-Authenticate' header requesting basic
authentication.

   The 'BasicAuth' request matching statement verifies if the
'Authorization' header is present and provides correct credentials.  The
statement matches the request if so.

   The 'BasicAuth' statement takes a single argument, specifying the
name of a file containing "user database".  This is a plain-text file
created with 'htpasswd' or similar utility, i.e.  each non-empty line of
it must contain username and password hash separated by a colon.
Password hash can be one of:

   * Password in plain text.
   * Hash created by the system 'crypt'(3) function.
   * Password hashed using SHA1 algorithm and encoded in BASE64.  This
     hash must be prefixed by '{SHA}'.
   * 'Apache'-style 'APR1' hash.

   Password file is read on the first authorization attempt, after which
its contents is stored in memory.  'Pound' will re-read it if it notices
that the file's modification file has changed, so you need not restart
the daemon if you do any changes to the file.

   Thus, if you put the 'BasicAuth' statement in each service that must
be accessible to authorized users only, that would do the first and
principal part of the basic authentication scheme: access control.
There remains second part: returning properly formatted 401 response if
the request did not pass authorization.  That can be done using a
combination of the 'Error' internal backend (*note Error responses::)
and response modification techniques described in the previous section.

   However, instead of using 'BasicAuth' in each service requiring
limited access and placing a service generating the 401 response in the
end, it is simpler and less error-prone to use the following approach:

   Create a service with the following content:

     Service
         Not BasicAuth "pound/htpasswd"
         Rewrite response
             SetHeader "WWW-Authenticate: Basic realm=\"Restricted access\""
         End
         Error 401
     End

   Replace the file name ('pound/htpasswd') and realm name ('Restricted
access') with the actual values.

   Make sure that all services that need to be protected by basic
authentication are declared after that service.  This way, any request
that does not convey an 'Authentication' header with credentials
matching an entry from your password file will match this service, and
will be replied to with a properly formatted 401 response, which will
prompt the remote user to authenticate themselves.  On the other hand,
authorized requests will not match this service and will eventually be
handled by one of the services declared after it.

4.6 Redirects
=============

Apart from regular backends introduced in previous sections, 'pound'
provides also several "special" or "internal" backends.  As their name
implies, such backends handle requests and generate responses
internally, without forwarding them to any external entities.

   One of such internal backends is 'Redirect'.  It generates responses
redirecting the client to another location.  The statement takes two
arguments: a three-digit HTTP status code to return, and the URL to
redirect to:

     Service
         Redirect 301 "https://www.gnu.org"
     End

   Allowed values for the status code are 301, 302, 303, 307 and 308.
This argument is optional: if omitted, 302 is used.

   If the URL argument has no path component (as in the example above),
then the path (and query, if present) components from the original
request will be appended to it.  For example, if the original URL were
'http://example.com/software', the service above would redirect it
'https://www.gnu.org/software'.

   Otherwise, if the path component is present in the URL argument (even
if it is a mere '/'), then the URL is used as is.  For example, the
following will drop any path and query components from the URL when
redirecting:

     Redirect 301 "https://www.gnu.org/"

   The URL argument is subject to backreference expansion and request
accessor interpretation (*note Request modifications::).  If any of
these are actually used, the above logic is disabled.

   String expansions make it possible to implement complex redirects.
For example, the following redirect swaps the first two path components
of the original URL:

     Service
         URL "^/([^/]+)/([^/]+)(/.*)?"
         Redirect "http://%[host]/$2/$1$3"
     End

   The following is a standard paradigm for redirecting requests from
HTTP to HTTPS:

     Service
         Redirect 301 "https://%[host]%[url]"
     End

4.7 Error responses
===================

Another type of internal backends is 'Error', a backend that generates
error responses.  It is useful, for instance, to provide a custom error
status and/or message when no service matches the request.  Normally,
for such cases 'pound' generates a standard 503 response ('Service
Unavailable') with the built-in error page.  You can customize this
behavior by using as the last service a 'Service' section with 'Error'
backend.  For example:

     Service
         Error 404 "pound/404.html"
     End

   The first argument specifies the HTTP status code to return.  *Note
Error backend::, for more info.

   The second argument is optional.  It supplies the name of a file with
the error page to return along with the response.  The name may be
absolute or relative.  In the latter case, the file will be looked up in
the "include directory", a special directory for storing pound-specific
files.  *Note include directory::.  The file will be read only once, at
program startup.  If you modify the file and want 'pound' to notice
changes, you will have to restart it.

   Unless the file begins with a newline or '<' character, its initial
portion up to first empty line (inclusive) supplies headers that will be
sent with the response.  The following defaults will be used, unless
already defined in the file:

     Content-Type: text/html
     Expires: now
     Pragma: no-cache
     Cache-control: no-cache,no-store

   If the second argument is not supplied, the error text is determined
by the 'ErrorFile CODE' statement in the enclosing listener (where CODE
is the HTTP code in question).  If it is not supplied, the built-in
default text is used.  *Note Error definitions::.

5 HTTPS
*******

In the previous chapter we have described basic proxying techniques
using plain HTTP listener as an example.  Now we will discuss how to use
HTTPS both for listeners and backends.

   To accept HTTPS requests you need to declare 'ListenerHTTPS'
listener.  It is similar to plain 'ListenerHTTP' described above, except
that it requires a "certificate" to be declared.  For example:

     ListenHTTPS
         Address 0.0.0.0
         Port 443
         Cert "/etc/ssl/priv/example.pem"
         Disable TLSv1
         Ciphers "HIGH:@STRENGTH:!RSA"
     End

   The 'Cert' statement supplies the name of the certificate file in PEM
format.  The file must contain the certificate, intermediate
certificates (if necessary), and certificate private key, in that order.

   The 'Cert' argument can also specify a directory, in which case
'pound' will scan that directory, trying to read the certificate from
each regular file encountered.  It will report an error if unable to
load the file, so this directory should contain only certificate files.
The order in which certificate files are read is not specified.

   Multiple 'Cert' statements are allowed.  When trying to find the
matching certificate, 'pound' will stop at the first one whose 'CN'
matches the requested host name.  Thus, the ordering of 'Cert'
statements is important.  Normally they should be placed in
most-specific to least-specific order, with wildcard certificates
appearing after host-specific ones.

   'Cert' directives must precede all other SSL-specific directives.

   Another important directive is 'Disable'.  It disables the use of the
specified TLS protocol as well as all protocols older than it.  Usually
it is used to disable obsolete protocols.  For example, the 'Disable'
statement in the example above disables 'TLSv1', 'SSLv3', and 'SSLv2'.

   To further tune the strength of your encryption use the 'Ciphers'
directive.  Its argument is a colon-delimited list of OpenSSL ciphers,
as described in *Note (ciphers(1))ciphers::.  The cipher selection shown
in the example above provides for excellent encryption strength.

5.1 ACME
========

Automatic Certificate Management Environment ("ACME"), is a protocol for
automated deployment of HTTPS certificates.  It is perhaps the most
often used method for obtaining SSL certificates nowadays.  In order to
issue certificate for a domain or domains, the protocol verifies that
the web server that is requesting a certificate actually owns these
domains.  This process is based on various "challenge types".

   'Pound' supports HTTP-01(1) challenge type.  When issuing a
certificate using this challenge type, the ACME client (a program
responsible for periodic certificate re-issuing) obtains from the
authority a challenge file, and stores it in a predefined "challenge
directory".  The authority will then request this file from the
webserver using a predefined URL. It is supposed that the server will
serve it from the file that has been just written by the agent.  If the
server returns the file, its claim to own the domain is proved and the
certificate is issued.

   Configuring 'pound' to reply to challenge requests is as simple as
putting an 'ACME' statement to the 'ListenHTTP' section of its
configuration file.  The statement takes a single argument - name of the
challenge directory:

     ListenHTTP
         Address 0.0.0.0
         Port 80
         ACME "/var/lib/pound/.well-known/acme-challenge"
     End

   Needless to say, your ACME agent and 'pound' must agree on this
directory location.  Configuration of various ACME agents is beyond the
scope of this document.  Please refer to the documentation of your agent
for further details.

   ---------- Footnotes ----------

   (1) <https://letsencrypt.org/docs/challenge-types/#http-01-challenge>

5.2 Redirect HTTP to HTTPS
==========================

Nowadays it is common to redirect all plain HTTP requests to HTTPS on
the same URL. The method of doing so was described in *note HTTP to
HTTPS: Redirects.  As an example, this section shows a working HTTPS
configuration with such redirect.

     ListenHTTP
         Address 0.0.0.0
         Port 80
         Service
             Redirect 301 "https://%[host]%[url]"
         End
     End

     ListenHTTPS
         Address 0.0.0.0
         Port 443
         Cert "/etc/ssl/priv/example.pem"
         Disable TLSv1
         Service
             Backend
                 Address 127.0.0.1
                 Port 8080
             End
         End
     End

5.3 HTTPS backends
==================

Backends can use HTTPS as well.  To inform 'pound' that communication
with the backend goes over an encrypted channel, use the 'HTTPS'
keyword.  The typical usage is:

     Backend
         Address 192.0.2.1
         Port 443
         HTTPS
     End

   Notice, that unlike other statements, 'HTTPS' is used without
arguments.

   Additional directives are available for fine-tuning the connection.
If used, they must appear after the 'HTTPS' directive,

   The 'Cert' directive specify the client certificate to use when
connecting.  Use it if the backend requires client authentication.

   The 'Disable' and 'Ciphers' directives are similar to those described
when discussing 'ListenHTTPS': the former disables the given TLS
protocol and all protocols prior to it, and the latter configures the
list of OpenSSL ciphers which the client wishes to use.  The actual
cipher to use will be selected from this list during negotiation with
the backend.

   The example below illustrates the use of these directives:

     Backend
         Address 192.0.2.1
         Port 443
         HTTPS
         Disable TLSv1_1
         Cert "/etc/pound/crt/b1.pem"
         Ciphers "HIGH:!RSA"
     End

6 Request balancing
*******************

When several backends are defined in a service, incoming requests will
be distributed among them.  This process is called "balancing".  By
default, requests are distributed equally.  This can be changed by
assigning them a "priority" - a positive integer which assigns a
relative weight of the given backend in the distribution algorithm.  The
greater the priority is, the more requests this backend gets from the
total flow.

   The distribution algorithm is defined by "balancing strategy".  As of
version 4.16.90, 'pound' supports two strategies: "weighted random
balancing" and "interleaved weighted round robin balancing".

"Weighted Random Balancing"

     This is the default strategy.  The backend to use for each request
     is determined at random, taking into account backend priorities, so
     that backends with numerically greater priorities have
     proportionally greater chances of being selected than the ones with
     lesser priorities.

"Interleaved Weighted Round Robin Balancing"

     This strategy cycles over all active backends, considering each one
     in its turn.  An integer ordinal number is assigned to each round,
     which is incremented (modulo number of backends) each time a new
     round is started.  A backend is assigned a request only if its
     priority is greater than the round number.

     This strategy offers several advantages compared with the previous
     one.  First, it results in a more even distribution of the
     requests.  Secondly, the resulting distribution is predictable.

   Overall, the share of requests a given backend receives can be
estimated as:

     P_{i} / S(P)

where P_{i} is the priority of the backend with index i, and S(P) is the
sum of all priorities.

   Weighted random balancing is used by default.  Each backend gets the
default priority 5, unless another value is expressly assigned using the
'Priority' statement, e.g.:

     Service
         Backend
             Address 192.168.0.1
             Port 80
             Priority 1
         End
         Backend
             Address 192.168.0.2
             Port 80
             Priority 9
         End
     End

   In this example, backend '192.168.0.2' will receive roughly 9 times
more requests than backend '192.168.0.1'.

   The balancing strategy to use is defined by the 'Balancer' keyword,
which can appear either in the global scope or within a 'Service'
section.  Its argument can be one of:

'random'
     Use weighted random balancing (default).

'iwrr'
     Use interleaved weighted round robin balancing.

   The 'Balancer' statement appearing in the global scope defines
balancing strategy for all services that don't have 'Balancer' statement
on their own.

6.1 Sessions
============

Some web applications attempt to introduce state persistence into the
stateless HTTP protocol, by defining "sessions" using various
mechanisms, such as specially defined headers, cookies, etc.  For such
applications it is critical that all requests that belong to a single
"session" be directed to the same server, i.e.  backend.  Clearly, this
disrupts the balancer logic, and requires that the proxy be able to
understand the backend's notion of session.

   'Pound' is able to detect and track sessions identified by client
address, Basic authentication (user id/password), URL parameter, cookie,
HTTP parameter, and HTTP header value.

   Session tracking is enabled on a per-service basis by a 'Session'
section.  The section must contain at least the 'Type' directive, which
specifies what type of session tracking to use, and the 'TTL' directive,
supplying session idle timeout in seconds.

   Session types are case-insensitive.  They are summarized in the table
below:

'IP'
     The 'IP' session tracking type instructs 'pound' to forward all
     requests from the same client IP address to the same backend
     server:

          Session
              Type IP
              TTL  300
          End

'Basic'
     Using this session tracking type, 'pound' parses the
     'Authentication' header of each request.  If the header is present,
     and specifies the 'Basic' authentication type, user ID is extracted
     from it.  Requests with the same user ID are forwarded to the same
     backend server.

          Session
              Type Basic
              TTL  300
          End

'URL'
     This tracking scheme uses the value of URL query parameter to
     define a session.  The parameter name is supplied using the 'ID'
     directive:

          Session
              Type URL
              TTL  300
              ID   "sess"
          End

     In this example, sessions are identified by the 'sess' parameter,
     The request URL might look like 'http://example.org?sess=123'.

'Cookie'
     The 'Cookie' tracking type use a certain cookie to identify
     sessions.  The cookie name is given by the 'ID' directive:

          Session
              Type Cookie
              TTL  300
              ID   "sess"
          End

'Header'
     Sessions are identified by the value of HTTP header whose name is
     given by the 'ID' directive, e.g.:

          Session
              Type Header
              ID   "X-Session"
              TTL  300
          End

'Parm'
     This is the least useful scheme.  Sessions are identified by HTTP
     parameter - a string that appears after a semicolon in the URL,
     such as 'bar' in 'http://foo.com;bar'

          Session
              Type PARM
              TTL  300
          End

6.2 Balancer groups
===================

Backends within each service are grouped in "balancer groups".  Each
such group is assigned a unique integer "priority", which defines the
order in which the groups are tried.  When selecting a backend, a group
with the numerically lesser priority is selected and a suitable backend
is looked up among backends defined in the group, using one of the
balancing strategies discussed above.  If no backend can be selected
(e.g.  all backends are unavailable), next group is tried.  The process
continues until either a backend is chosen or the list of balancer
groups is exhausted.

   By default, backends declared using the 'Backend' keyword are
assigned to the balancer group 0.  These are backends used during normal
operation.  Backends declared using the 'Emergency' keyword (*note
Emergency::) are assigned to the balancer group 65535.  These backends
form a pull of "high availability" backends, which will be used if all
of the normal backends fail.

   More backend groups can be added using dynamic backends, discussed in
the next section.

6.3 Dynamic backends
====================

Normally, when a backend is declared in configuration file, the value
supplied with its 'Address' statement is resolved at once and the
resulting IP is associated with the backend.  Such backends are
"static".  You can also instruct 'pound' to resolve the hostname and
create as many backends as are the IP addresses it resolves to.  Such
backends are called "dynamic".(1)  When a dynamic backend is requested,
the 'Backend' statement defines a "matrix" which will be used as a
template to generate actual backends from the data in DNS. The TTL value
of the DNS record (or records) defines minimum time to live of the
generated backends.  When it expires, DNS will be queried again and
backends recreated according to the changes in its responses(2).

   In the simplest case, a dynamic backend can be created using 'A' or
'AAAA' DNS records.  If several records correspond to the hostname
defined in the 'Address' statement, 'pound' can either create a single
backend for each of them, or select one of them in round-robin fashion
and use it to create a backend.  Rest of backend parameters (port value,
priority, etc.)  will be taken from its matrix declaration.

   A more advanced way to create dynamic backends is using 'SRV'
records.  Each 'SRV' record has four associated parameters: priority,
weight, target and port.  The "priority" value defines the 'pound'
balancer group where to put generated backends.  "Weight" is assigned as
the priority for each generated backend(3).  Finally, "target" is used
as hostname to obtain IP addresses for the backends.  For example,
suppose the following DNS records are defined:

     $ORIGIN _tcp.example.org.
     ; _srv  TTL     SRV     prio    weight  port target.
     _proxy  60      SRV     10      40      8081 be0.example.org.
     _proxy  60      SRV     10      70      8082 be1.example.org.
     _proxy  60      SRV     20      10      8081 ha1.example.org.
     _proxy  60      SRV     20      10      8081 ha2.example.org.

   Assuming each of the target hostnames resolves to one IP address,
these records will produce two balancer groups of two backends each, and
will be roughly equivalent to the following statements:

     Backend
             Address "be0.example.org"
             Port 8081
             Priority 40
     End
     Backend
             Address "be1.example.org"
             Port 8082
             Priority 70
     End

     Emergency
             Address "ha1.example.org"
             Port 8081
             Priority 10
     End
     Emergency
             Address "ha2.example.org"
             Port 8081
             Priority 10
     End

   _Notice_, that an SRV record can have a weight of 0.  This will
translate to 'pound' backend priority 0, which is normally not allowed
(*note Balancer::).  According to RFC 2782, this is the preferred way of
defining weights where "there isn't any server selection to do", whereas
"[i]n the presence of records containing weights greater than 0, records
with weight 0 should have a very small chance of being selected".
'Pound' handles this as follows: if all 'SRV' records have zero weight,
priority of the resulting backends is set to 1.  This makes sure the
backend selection algorithm works and gives each backend equal chance of
being selected.  This translation does not take place, however, if at
least one of 'SRV' records has a weight greater than 0.  Another way to
handle such records is using the 'IgnoreSRVWeight' configuration
statement, which is discussed below.

   To declare backend as dynamic, use a symbolic host name in its
'Address' statement and add the 'Resolve' statement with one of the
following values:

 -- Dynamic Resolve: first
     Resolve the symbolic host name and use first IP from the DNS
     response as the address of the created dynamic backend.  Thus, this
     type will produce at most one dynamic backend.

 -- Dynamic Resolve: all
     Resolve the symbolic host name and create one backend for each
     address from the DNS response.  This enables load balancing between
     created backends.  Each backend will be assigned the same priority.

 -- Dynamic Resolve: srv
     Obtain 'SRV' records for the host name and use them to generate
     dynamic backends.  Each record produces new dynamic backend of
     'Resolve all' type, which creates regular backends as described
     above.  The weight field of the 'SRV' record is mapped to the
     priority field of each generated backend.  The priority field
     determines the balancer group where the backend will be hosted.

   When resolving hostnames, both IPv4 and IPv6 addresses are looked
for.  You can select the specific address family using the 'Family'
statement.  Its allowed values are:

'any'
     Use all address families available.  This is the default.

'inet'
     Use only IPv4 addresses ('A' DNS records).

'inet6'
     Use only IPv6 addresses ('AAAA' DNS records).

   For example:

     Backend
             Address "_proxy._tcp.example.org"
             Resolve srv
             Family any
     End

   Notice, that you need not supply 'Port' statement for dynamic
backends of 'srv' resolve type.  Normally, you don't need to supply
'Priority', either.  However, you may do so, if you wish to override the
weight settings from 'SRV' records.  In that case, inform 'pound' about
your decision using the following statement in 'Backend' section:

     IgnoreSRVWeight true

   There are several possible scenarios when this may be needed.  One of
them is when all 'SRV' records have weight of 0 (see above) and your
configuration defines one or more regular backends in the same balancer
group as backends generated by those records.  In that case, the default
priority assigned by 'pound' to those generated backends (1) may prove
to be too low for adequate balancing.  Using 'IgnoreSRVWeight' allows
you to fix that.  For example:

     Service
             Backend
                     Address 192.0.2.15
                     Port 80
                     Priority 8
             End
             Backend
                     Address "_proxy._tcp.example.org"
                     Resolve srv
                     Family any
                     IgnoreSRVWeight true
                     Priority 5
             End
     End

   In this example, backends generated by 'SRV' records for domain
'_proxy._tcp.example.org' will be assigned priority 5, no matter what
the actual value of 'SRV' weight field.

   Dynamic backends will be updated periodically, when the TTL of the
corresponding DNS records expires.  If the hostname cannot be resolved
or a DNS failure occurs, next update will be scheduled in 600 seconds
after the failure.  This interval can be configured using the
'RetryInterval' statement in the 'Backend' section, or globally, in the
'Resolver' section (*note resolver::).

   ---------- Footnotes ----------

   (1) Support for dynamic backends is enabled at compile time and
requires the GNU adns library (http://www.gnu.org/software/adns).  If
unsure whether your 'pound' binary includes it, inspect the 'pound -V'
output.

   (2) If necessary, the TTL value can be changed using the
'OverrideTTL' configuration directive.  *Note OverrideTTL: Backend.

   (3) Notice, that the 'SRV' terminology differs from what 'pound'
uses.  What is called priority in 'SRV' defines the "weight" of the
backend group for 'pound', whereas what is called weight in 'SRV'
defines the "priority" of a backend within a group.  This confusion is
due to historical reasons, and it would be hard to avoid it without
breaking backward compatibility.

7 Worker model
**************

Each incoming request is processed by a specific "worker", i.e.  a
thread in the running program.  Total number of running workers is
controlled by three configuration parameters.  'WorkerMinCount' defines
the minimum number of workers that should always be running (5, by
default).  Another parameter, 'WorkerMaxCount' sets the upper limit on
the number of running workers (it defaults to 128).

   At each given moment, a worker can be in one of two states: "idle" or
"active" (processing a request).  If an incoming request arrives when
all running workers are active, and total number of workers is less than
'WorkerMaxCount', a new thread is started and the new request is handed
to it.  If the number of active workers has already reached maximum, the
new request is added to the "request queue", where it will wait for a
worker to become available to process it.

   The third parameter, 'WorkerIdleTimeout', specifies maximum time a
thread is allowed to spend in the idle state.  If a worker remains idle
longer than that and total number of workers is greater than the
allotted minimum ('WorkerMinCount'), this idle worker is terminated.

8 Logging
*********

'Pound' can send its diagnostic messages to standard error, syslog, or
to both.

   Upon startup, while the configuration file is being parsed, the
diagnostics goes to the standard error.  Once it switches to the
operation mode and starts serving requests, diagnostic output is
switched to syslog.  The syslog facility to use is configured via the
'LogFacility' configuration directive.  By default, 'daemon' is used.

   When running in foreground mode, the '-e' command line option
instructs 'pound' to use standard error for logging, thus overriding the
settings from the configuration file.

   Normally, 'pound' is not very loquacious in logging: only errors are
reported.  Logging of each incoming request can be configured using the
'LogLevel' directive.  It can be used either in listener scope, in which
case it affects only this particular listener, or in global scope, where
it affects all listeners that don't configure it on their own.  The
value of this directive can be either an integer number in range 0
through 5 (inclusive), or a quoted string.  Numeric value requests one
of the "built-in log formats".  String value refers either to a built-in
format name, or to a user-defined format name.

   The built-in formats are:

0
null
     No request logging at all.

1
regular
     For each request, its source address, request line and response
     status are logged.

2
extended
     In addition to the above, the selected service and backend are
     shown.

3
vhost_combined
     Detailed request logging using Apache-style "Combined" log format.

4
combined
     Same as above, but without virtual host information.

5
detailed
     Same as 'combined', with additional information about the selected
     service and backend.

   If the string argument to 'LogLevel' is not one of the above, it must
refer to the name of a "custom format", defined earlier using the
'LogFormat' statement.  This statement takes two string arguments: the
name to be assigned to the new format, and its definition.

   "Format definition" is a character string composed of ordinary
characters (not '%'), which are copied unchanged to the resulting log
message, and conversion specifications, each of which are replaced by a
corresponding piece of information about the request or reply.

   Conversion specifications are single characters prefixed with a
percent sign.  Depending on the specification, an optional "conversion
argument" in curly brackets may appear between '%' and conversion
character.

   The following conversion characters are defined:

 -- Format specifier: %%
     Replaced with the percent sign.

 -- Format specifier: %a
     Originator IP address of the request.  If the request contains
     'X-Forwarded-For' header and 'TrustedIP' ACL is defined, the value
     of the header is consulted to obtain the IP address.  The value
     must be a comma-delimited list of intermediate user-agent IP
     addresses.  To determine the actual user-agent IP, the list is
     traversed from right to left, until an IP is found that is not
     listed in 'TrustedIP' ACL.

     If 'X-Forwarded-For' is not present, or 'TrustedIP' is not defined,
     or the above algorithm does not return an IP address, '%a' expands
     to the actual remote IP address the request came from (same as
     '%h').

     The 'TrustedIP' ACL can be defined in global scope, or in
     'ListenHTTP' ('ListenHTTPS') section, or in 'Service' section.
     Most-specific ACL overrides least-specific ones, that is a
     'TrustedIP' defined in 'Service' will be used, if it is defined.
     If not, the one defined in listener will be used, etc.  The syntax
     of the 'TrustedIP' statement is the same as that of 'ACL', i.e.

          TrustedIP "NAME"

     refers to the named ACL NAME (which must be defined earlier, *note
     ACL::),

          TrustedIP
            "CIDR0"
            "CIDR1"
            ...
          End

     defines the list of trusted IPs in place, and

          TrustedIP -file "FILENAME"
          TrustedIP -filewatch "FILENAME"

     reads CIDR definitions from file FILENAME.

     If needed, the 'ForwardedHeader' statement may be used to declare
     the name of the header to use instead of 'X-Forwarded-For'.  As
     'TrustedIP', this statement can appear in global, listener, or in
     service scope.

 -- Format specifier: %A
     Local IP address of the listener.

 -- Format specifier: %B
     Size of response in bytes, excluding headers.

 -- Format specifier: %b
     Same as '%B', but in "CLF" format, i.e.  a dash is used when
     response size is zero.

 -- Format specifier: %D
     The time taken to serve the request, in microseconds.

 -- Format specifier: %h
     Client IP address of the request.

 -- Format specifier: %H
     The request protocol.

 -- Format specifier: %{HDR}i
     The contents of 'HDR:' header line in the request.  Changes made by
     header modification directives affect this.

 -- Format specifier: %{HDR}I
     Same as '%i', except that if no such header is present in the
     request, a dash is substituted.

 -- Format specifier: %{OBJ}L
     Location of the 'pound' object that is involved in handling the
     request.  Valid values for OBJ are: 'listener', 'service', and
     'backend'.

     The location gives position in the configuration file where the
     object was defined, and is formatted as

          NAME:LN1.COL1-LN2.COL2

     where NAME is the configuration file name, LN1 and COL1 are line
     and column where the object definition begins, LN2 and COL2 are
     line and column where it ends.  Line and column numbers start with
     1.

 -- Format specifier: %m
     The request method.

 -- Format specifier: %{OBJ}N
     Name of 'pound' object that is involved in handling the request.
     Valid values for OBJ are: 'listener', 'service', and 'backend'.

 -- Format specifier: %P
     Thread ID of the serving thread.

 -- Format specifier: %q
     The query string (prepended with a '?') if it exists, otherwise an
     empty string.

 -- Format specifier: %r
     First line of request.

 -- Format specifier: %s
     Response status code.

 -- Format specifier: %>s
     First line of the response.

 -- Format specifier: %t
     Time the request was received, in the format '[18/Sep/2011:19:18:28
     -0400]'.  The last number indicates the timezone offset from UTC.

 -- Format specifier: %{FORMAT}t
     Time the request was received, in the format specified by the
     argument (*note Time and Date Formats::).  If the format starts
     with 'begin:' (default) the time is taken at the beginning of the
     request processing.  If it starts with 'end:', it is the time after
     the response from the backend has been sent back to the requester.
     In addition to 'strftime' formats, the following specifications are
     recognized:

     sec
          Number of seconds since the Epoch.
     msec
          Number of milliseconds since the Epoch.
     usec
          Number of microseconds since the Epoch.
     msec_frac
          Millisecond fraction of the time.
     usec_frac
          Microsecond fraction of the time.

 -- Format specifier: %T
     The time taken to process the request, in seconds.

 -- Format specifier: %{UNIT}T
     The time taken to process the request, in a time unit given by
     UNIT.  Valid units are 'ms' for milliseconds, 'us' for
     microseconds, 's' for seconds, and 'f' for seconds with fractional
     part.  Using 's' gives the same result as '%T' without any format;
     using 'us' gives the same result as '%D'.

 -- Format specifier: %u
     Remote user if the request was authenticated.

 -- Format specifier: %U
     The URL path requested.  This is affected by request modification
     directives.

 -- Format specifier: %v
     The listener name.

   The table below describes the built-in formats in terms of format
definitions:

0
null
          ""

1
regular
          "%a %r - %>s"

2
extended
          "%a %r - %>s (%{Host}i/%{service}N -> %{backend}N) %{f}T sec"

3
vhost_combined
          "%{Host}I %a - %u %t \"%r\" %s %b \"%{Referer}i\" \"%{User-Agent}i\""

4
combined
          "%a - %u %t \"%r\" %s %b \"%{Referer}i\" \"%{User-Agent}i\""

5
detailed
     (Split in two lines for readability)
          "%{Host}I %a - %u %t \"%r\" %s %b \"%{Referer}i\" \"%{User-Agent}i\"
          (%{service}N -> %{backend}N) %{f}T sec"

9 Configuration
***************

A configuration file provides 'pound' with the information necessary for
performing its tasks.  Some configuration file statements can be
overridden from the command line.

9.1 Lexical structure
=====================

Lexically, the file contains tokens of three types: keywords, values,
and separators.  Blanks, tabs, newlines and comments, collectively
called "white space" are ignored except as they serve to separate
tokens.  Some white space is required to separate otherwise adjacent
keywords and values.

   "Comments" may appear anywhere where white space may appear in the
configuration file.  A comment begins with a hash sign ('#') and
continues to the end of the line.

   A "keyword" is a sequence of ASCII letters, digits and underscores
that begins with an ASCII letter or underscore.  Keywords are always
case-insensitive.

   There are three kinds of "values": numeric values (or "numbers"),
boolean values, quoted strings, and IP addresses.

"Numbers"
     A "numeric value" is a sequence of decimal digits.

"Booleans"
     A "boolean" is one of the following: 'yes', 'true', 'on' or '1',
     meaning "true", and 'no', 'false', 'off', '0' meaning "false".

"Strings"
     A "quoted string" or "string", for short, is a sequence of
     characters enclosed in a pair of double quotes.  A backslash ('\')
     appearing within a string acts as an "escape character": if it is
     followed by a double-quote or another backslash, it forces the
     character that follows it to be treated as an ordinary one.  For
     example:

          "string with \" character"

     A backslash followed by any character other than '"' or '\' is
     removed and a warning to that effect is output.  For example, the
     following statement:

          user "r\oot"

     appearing at line 1 of file 'pound.cfg' will result in the
     following message:

          pound.cfg:1.8: unrecognized escape character

     and will be treated as

          user "root"

"IP addresses"
     IP addresses are IPv4 or IPv6 addresses in numeric form, or
     hostnames.

9.2 Syntax
==========

Syntactically, 'pound' configuration is a sequence of statements of two
kinds: simple and compound.

   A "simple statement" or "directive" consists of a keyword followed by
a value, located on a single line.  For example:

     user "proxy"

   There are some simple statements that don't take any value and thus
consist only of a keyword, e.g.

     HTTPS

   A "compound statement" or "section" encloses one or more other
statements (both simple or compound).  It begins with a keyword,
optionally followed by a value, both located on a single line (similar
to simple directives), followed by any number of subordinate statements,
and ends with a keyword 'End' on a line by itself.  For example:

     Control
         Socket "/run/pound.sock"
         Mode 660
         ChangeOwner true
     End

   Unless specified otherwise, directives may appear in any order.

9.3 String Expansions
=====================

String arguments to some configuration statements undergo several
"expansions" before use.  The "backreference expansion" replaces special
notations in the string called "backreferences" with corresponding parts
of the request recently matched against a regular expression.  The
"request accessor interpretation" inserts some fragments of the request
URL into the string.

   These expansions are discussed in detail below.

9.3.1 Backreference expansion
-----------------------------

Backreference is a construct that refers to a "parenthesized group"
within a regular expression matched by one of service matching
directives (*note Service Selection Statements::).  During backreference
expansion, each occurrence of such construct is replaced with the actual
value of that parenthesized group.

   Syntactically, backreferences can take two forms.  The construct
'$N', where N is a decimal number, refers to Nth parenthesized
subexpression of the most recently matched statement, and the construct
'$N(M)' refers to Nth parenthesized subexpression in the Mth recently
matched statement.  Numbering of subexpressions starts at 1 ('$0' refers
to entire matching string).  Numbering of matches starts at 0.

   For example, given the following statements

     Host -re "www\\.(.+)"
     Header -re -icase "^Content-Type: *(.*)"
     Path "^/static(/.*)?"

   '$1' refers to the subgroup of 'Path', '$1(1)' refers to that of
'Header', and '$1(2)' to that of 'Host'.

   Curly braces may be used to avoid incorrectly parsing text fragment
that follows the reference as being its part.  This is useful if the
reference is immediately followed by a decimal digit or opening
parenthesis, as in: '${1}(text)'.

   To insert a literal dollar or percent sign in the string, use '$$' or
'$%', correspondingly.

9.3.2 Request Accessor Interpretation
-------------------------------------

"Request accessor" is a syntactical construct of the form:

     %[NAME]

where NAME denotes a part of the incoming request to access and square
brackets are part of the construct.  Accessors are interpreted and
replaced with the value of the corresponding part of the request.  Some
accessors take an argument, which is specified after accessor name and
is delimited from it by one or more whitespace characters.

   The following accessors are defined:

 -- Accessor: url
     Request URL.

 -- Accessor: path
     Request path.

 -- Accessor: query
     Query part.

 -- Accessor: param NAME
     The value of the query parameter NAME.

 -- Accessor: header NAME
     The value of HTTP header NAME.

 -- Accessor: host
     Hostname part of the HOST header.  If the latter does not include
     port number, it is equivalent to '%[header host]'.

 -- Accessor: port
     If the value of the 'Host' header includes port number, '%[port]'
     expands to port number with the leading colon character.
     Otherwise, it expands to empty string.

9.4 Global directives
=====================

Global directives configure the program operation as a whole.  They may
appear anywhere at the global scope of the configuration file, although
it is customary for them to be at its start.

9.4.1 Runtime directives
------------------------

 -- Global directive: Daemon BOOL
     When set to 'true' (the default), 'pound' will detach itself from
     the controlling terminal after successful parsing of the
     configuration file and continue operating in the background.

     When set to 'false', 'pound' will continue operating in the
     foreground.

     This setting can be overridden by the '-F' and '-e' command line
     options.

 -- Global directive: Group "GROUP_NAME"
     Sets the group 'pound' will run as.  If not set, the primary group
     of the user (as set by the 'User' directive) will be used.

 -- Global directive: PIDFile "FILENAME"
     Sets the name of the file where to store program PID. This can be
     also be set from command line, using '-p' command line option
     (*note Usage::).

     Notice the following:

       1. When running with a supervisor, this file holds PID of the
          supervisor process.  Otherwise, it holds PID of the main This
          means it is always suitable for signalling the program using
          the traditional 'kill `cat filename`' technique.

       2. Before shutting down, 'pound' removes this file.  However, it
          may fail to do so if it switches to privileges of another user
          after startup (at least one of 'User' or 'Group' are set in
          the configuration file) and the file is stored in a directory
          whose permissions forbid write access for that user.

 -- Global directive: Supervisor BOOL
     When running in daemon mode, start a "supervisor" process.  This
     process, in turn, will start main 'pound' process and will further
     monitor it, restarting it if it fails.

     The default is 'true'.

 -- Global directive: RootJail "DIRECTORY"
     If this directive is present, 'pound' will use the system 'chroot'
     call to set the root directory of the process to that specified by
     DIRECTORY.  After that, the program won't be able to access any
     files outside that directory.

     Before chrooting, 'pound' makes the necessary preparations to be
     able to access the files it needs during operation, in particular
     user databases supplied with the 'BasicAuth' statements (*note
     Authentication::), and static file directories (*Note ACME::, and
     *note SendFile::).

 -- Global directive: User "USER_NAME"
     Configures the user 'pound' will run as.

9.4.2 Worker Settings
---------------------

 -- Global directive: WorkerMinCount N
     Sets minimum number of worker threads that must always be running.
     The default is 5.  *Note Worker model::.

 -- Global directive: WorkerMaxCount N
     Sets maximum number of worker threads.  The default is 128.  *Note
     Worker model::.

 -- Global directive: WorkerIdleTimeout N
     Sets idle timeout for a worker thread, in seconds.  Default is 30
     seconds.  *Note Worker model::.

 -- Global directive: Threads N
     This statement, retained for backward compatibility with previous
     versions of pound, is equivalent to:

          WorkerMinCount N
          WorkerMaxCount N

9.4.3 Proxy Tuning Directives
-----------------------------

 -- Global directive: BackendStats BOOL
     Whether to enable backend statistics collection.  Backend
     statistics consists of the following values:

       1. Total number of requests processed by this backend.
       2. Average time per request.
       3. Standard deviation of the average time per request.

     If enabled, these values are made available via 'poundctl' (*note
     poundctl list::) and telemetry output (*note Metrics::).

 -- Global directive: Balancer ALGO
     Sets the request balancing algorithm to use.  Allowed values for
     ALGO are:

     random
          Use weighted random balancing algorithm.

     iwrr
          Use interleaved weighted round robin balancing.

     *Note Balancer::, for a detailed discussion of these algorithms.

     The 'Balancer' statement in global scope applies to all 'Service'
     definitions in the file that don't contain 'Balancer' definitions
     of their own.

 -- Global directive: HeaderOption OPT ...
     Sets default header addition options.  One or more arguments are
     allowed, each being one of:

     'off'
          Disable additional headers.

     'forwarded'
          Add 'X-For-warded-For', 'X-Forwarded-Proto', and
          'X-Forwarded-Port' headers.

     'ssl'
          Pass information about SSL certificates in a set of 'X-SSL-*'
          headers.  This will add the following headers:

          X-SSL-Cipher
               SSL version followed by a slash and active cipher
               algorithm.

          X-SSL-Certificate
               The full client certificate (multi-line).

          X-SSL-Issuer
               Information about the certificate issuer (CA).

          X-SSL-Subject
               Information about the certificate owner.

          X-SSL-notAfter
               End of validity date for the certificate.

          X-SSL-notBefore
               Start of validity date for the certificate.

          X-SSL-serial
               Certificate serial number (in decimal).

     The default is:

          HeaderOption forwarded ssl

     This setting can be overridden for a particular listener using the
     'HeadOption' within it.

 -- Global directive: CombineHeaders
     HTTP protocol allows for certain headers to appear in the message
     multiple times.  Namely, multiple headers with the same header name
     are permitted if that header field is defined as a comma-separated
     list.

     The standard specifies that such fields can be combined in a single
     header line, by appending each subsequent field value to the
     combined field value in order, separated by a comma.

     The 'CombineHeaders' statement declares names of the headers to
     which 'pound' is to apply this operation.  Each header name should
     be listed on a separate line, enclosed in double-quotes.  The
     keyword 'End' on a line by itself ends the statement.  E.g.:

          CombineHeaders
              "Accept"
              "Allow"
              "Cache-Control"
          End

     The 'include' statement (*note File inclusion::) can be used in
     'CombineHeaders' statement.

     'Pound' distribution includes file 'mvh.inc', which declares all
     known multiple-value headers in a form suitable for inclusion to
     'pound.cfg'.  This file is installed in the package data directory,
     so that in order to use it, it suffices to add the following to the
     configuration file:

          CombineHeaders
              Include "mvh.inc"
          End

9.4.4 SSL Settings
------------------

 -- Global directive: SSLEngine "NAME"
     Use an OpenSSL hardware acceleration card called NAME.  Available
     only if OpenSSL-engine is installed on your system.

 -- Global directive: ECDHcurve "NAME"
     Use the named curve for elliptical curve encryption.

9.4.5 Regular Expression Settings
---------------------------------

 -- Global directive: RegexType TYPE
     Sets the type of regular expressions to use in request matching
     statements.  Allowed values for TYPE are: 'posix' and 'pcre' (or
     'perl'), case-insensitive.  The latter requires compilation time
     support.

     The selected regular expression type remains in effect for all
     request matching directives that follow this statement, until next
     'RegexType' statement or end of the configuration file, whichever
     occurs first.

     Regular expression type can be set individually for a directive,
     using the '-pcre' or '-posix' option (*note Table 9.2:
     conditional-option.).

     *Note Regular Expressions::, for a detailed discussion.

 -- Global directive: IgnoreCase BOOL
     Ignore case when doing regex matching (default: 'false').  This
     directive sets the default for the following service matching
     directives: 'URL', 'Path', 'QueryParam', 'Query', 'StringMatch', as
     well as for the 'DeleteHeader' modification directive.  Its value
     can be overridden for specific services.

     This statement is deprecated and will be removed in future
     versions.  Please, use the '-icase' option to the matching
     directive instead (*note Table 9.2: conditional-option.).

9.4.6 ACL Definition
--------------------

 -- Global directive: ACL "NAME"
     Define a "named access control list".  An "ACL" is a list of
     network addresses in CIDR notation.  Once defined, the ACL can be
     used in 'Service' statements to limit access to resources (*note
     ACL reference::).

     The statement has two forms: immediate and file reference ACL. In
     "immediate" form, the CIDR list follows the 'ACL' line and is
     terminated with an 'End' directive on a line by itself.  Each
     non-empty line contains a CIDR enclosed in double quotes.  Comments
     and 'Include' statements are allowed.  For example:

          ACL "secure"
             "192.0.2.0/26"
             "203.0.113.0/24"
          End

     The syntax of named "file reference" ACL is:

          ACL "NAME" -file "FILENAME"

     or

          ACL "NAME" -filewatch "FILENAME"

     If FILENAME is relative, it is looked up in the *note include
     directory::.  The syntax of the file is similar to the described
     above, except that CIDRs need not be quoted and 'Include'
     statements are not allowed.  The form with '-file' reads the file
     contents once, at the program startup.  The one with '-filewatch'
     reads it and then monitors that file for changes.  Any change to
     the file causes it to be read again, thus the ACLs are updated
     automatically without the need to restart the program.  *Note File
     reference ACL::, for a detailed discussion of this feature.

9.5 File inclusion
==================

 -- Global directive: Include "FILE"
     Include FILE as if it were part of the configuration file.  If FILE
     is a relative file name, it will be looked in the "include
     directory" (see below).

     This directive is allowed both at topmost level and in any
     subsections of the configuration file.

 -- Global directive: IncludeDir "DIR"
     Set the "include directory", i.e.  the directory where 'pound'
     looks for relative file names that appear in other configuration
     directives: 'Include', 'BasicAuth', 'ErrorFile' (or 'Err400'
     through 'Err503'), as well as in the argument to '-file' option in
     service matching directives (*note -file::).

     The default value is the system configuration directory as set at
     compile time (you can check its value in the output of 'pound -V').
     This initial value can be changed in the command line using the '-W
     include-dir=DIR' command line option or reset to the current
     working directory using the '-W no-include-dir' option (*note
     Usage::).

9.6 Logging configuration
=========================

 -- Global directive: LogFacility NAME
 -- Global directive: LogFacility -
     Sets the 'syslog' facility to use for logging.  Allowed names are:
     'auth', 'authpriv', 'cron', 'daemon', 'ftp', 'kern', 'lpr'.
     'mail', 'news', 'user'.  'uucp', and 'local0' through 'local7'.

     The second form configures "default log destination".  If 'pound'
     runs in foreground, log messages with priority 'LOG_DEBUG' and
     'LOG_INFO' go to stdout, and messages with the remaining priorities
     are printed to stderr.  If 'pound' runs as a daemon, log messages
     go to the syslog facility 'daemon'.

 -- Global directive: LogFormat "NAME" "FORMAT_DEF"
     Define request logging format.  NAME is a string uniquely
     identifying this format, and FORMAT_DEF is the format string
     definition.  *Note Logging::, for a detailed description of format
     definition syntax.

 -- Global directive: LogLevel "NAME"
 -- Global directive: LogLevel N
     Specify the format to use to log HTTP requests.  NAME is a name of
     a custom format, defined earlier using the 'LogFormat' directive,
     or one of six built-in format names.

     If numeric argument is used, it refers to a built-in format by its
     number (0 through 5).

     *Note Logging::, for a detailed description of HTTP request
     logging.

 -- Global directive: LogTag "STRING"
     Sets the string to tag syslog messages with.  By default, it is the
     name of the program (more precisely, the name which was used to
     start it).

 -- Global directive: ForwardedHeader "NAME"
     Defines the name of the HTTP header that carries the list of
     proxies the request has passed through.  Default value is
     'X-Forwarded-For'.  This header is used to determine the originator
     IP address for logging.  *Note %a::, for details.

 -- Global directive: TrustedIP
     Defines a list of "trusted proxy" IP addresses, which is used to
     determine the originator IP. *Note %a::, for details.

     This statement is a special form of 'ACL' statement, described in
     *note ACL::.  It can have in three forms: "anonymous ACL", "file
     reference", or "ACL reference".

     Examples:

       1.      TrustedIP
                 "127.0.0.1/8"
                 "10.16.0.0/16"
               End
       2.      TrustedIP -filewatch "/etc/pound/trustip.acl"
       3.      TrustedIP "proxy_addresses"

 -- Global directive: Anonymise
 -- Global directive: Anonymize
     When logging, replace the last byte of client IP addresses with 0.

     Default: log the client address in full.

9.7 Management Interface
========================

'Pound' provides a management interface, which allows one to obtain
information about the running instance, change state of configured
listeners, services, and backends, etc.  These requests are normally
issued by the poundctl utility (*note poundctl::).

   The management interface is usually made available via a UNIX socket.
Properties of this "control socket" are configured via the 'Control'
statement.  It has two forms: "directive" and "section".

 -- Global directive: Control "FILENAME"
     Create a UNIX socket FILENAME and listen on it for management
     requests.  The file will be owned by the user that started 'pound'
     (normally 'root') and have mode 0600.

   In section form, the 'Control' statement allows for specifying file
mode and, to certain extent, socket file ownership.  The section can
contain the following statements:

 -- Control statement: Socket "FILENAME"
     Specifies the name of the socket file to use.  This is the only
     mandatory statement in the section form.

 -- Control statement: Mode OCTAL
     Sets the mode of the socket file.

 -- Control statement: ChangeOwner BOOL
     This statement takes effect if at least one of 'User' or 'Group'
     global statements is used.  When set to 'true' it will change the
     owner of the socket file to that specified by those two statements.

   An example of using the 'Control' section:

     Control
         Socket "/run/pound.sock"
         Mode 660
         ChangeOwner true
     End

9.7.1 Remote Access to Management Interface
-------------------------------------------

To make the management interface available remotely, use the 'Control'
statement in a 'Service' section:

     ListenHTTP
         Address 192.0.2.1
         Port 80
         Service
             Control
         End
     End

   This configuration makes management interface accessible via
'http://192.0.2.1/'.  Due to obvious security implications, you'd be
better off protecting the 'Control' endpoint using HTTPS, ACLs and/or
basic authorization.  The example below illustrates all these
techniques:

     ListenHTTPS
         Address 192.0.2.1
         Port 443
         Cert "/etc/ssl/priv/example.pem"
         Disable TLSv1

         Service
             Not BasicAuth "pound/htpasswd"
             Rewrite response
                 SetHeader "WWW-Authenticate: Basic realm=\"Restricted access\""
             End
             Error 401
         End

         Service
             ACL "secure"
             Control
         End
     End

   *Note Authentication::, for a discussion of 'BasicAuth' statement,
and see *note ACL:: for a discussion of access control lists (this
example assumes that the ACL 'secure' is defined elsewhere in the
configuration file).

   If you wish to make management interface available under a special
path, make sure the path prefix is stripped off, e.g.:

     Service
         URL -re "^/control(/.+)"
         SetURL "$1"
         Control
     End

   *Note Service Request and Response Modification::, for details about
'SetURL' statement and request modification in general.

9.8 Timeouts
============

Directives discussed in this section set various timeout values.  Their
argument is an integer expressing the value in seconds.

 -- Global directive: Alive N
     Specify how often should 'pound' check for the status of backend
     servers marked as "dead" (i.e.  inaccessible).  It is a good idea
     to set this as low as possible - it will find resurrected hosts
     faster.  However, if you set it too low it will consume resources.

     Default is 30 seconds.

 -- Global directive: Client N
     Specify for how long 'pound' will wait for a client request
     (default: 10 seconds).  It will drop the connection if client
     doesn't send any data within this interval.

     This value can be overridden for specific listeners.

 -- Global directive: TimeOut N
     Specify for how long 'pound' will wait for the backend to respond
     (default: 15 seconds).

     This value can be overridden for specific backends.

 -- Global directive: ConnTO N
     Specify for how long 'pound' will wait for a connection to a
     backend to be established.  Default is the same as the 'TimeOut'
     value.

     This value can be overridden for specific backends.

 -- Global directive: WatcherTTL N
     If file reference ACLs are used on a system that doesn't support
     'inotify' API, this directive defines the interval between two
     successive checks of file modification times.  *Note ACL
     filewatch::, for a detailed discussion of this feature and
     situations when this setting might be useful.

     The default value is 180 seconds.

 -- Global directive: WSTimeOut N
     Specify for how long 'pound' will wait for data from either backend
     or client in a connection upgraded to WebSocket protocol.  Default
     is 600 seconds.

     This value can be overridden for specific backends.

 -- Global directive: Grace N
     How long should 'pound' continue to answer existing connections
     after a receiving a 'INT' or 'HUP' signal (default: 30 seconds).
     The configured listeners are closed immediately.  You can bypass
     this behaviour by stopping 'pound' with a 'TERM' or 'QUIT' signal,
     in which case the program exits without any delay.

9.9 ListenHTTP
==============

The 'ListenHTTP' section declares a listener operating in plaintext HTTP
mode.  The section declaration begins with the keyword 'ListenHTTP'
optionally followed by a string supplying symbolic name for that
listener, e.g.:

     ListenHTTP "main"
       ...
     End

   The symbolic name can be used in log messages (*note '%{OBJ}N': log
format.) and in 'poundctl' (*note poundctl::) requests to identify that
listener.  If the name is not supplied, the listener can be identified
by its ordinal number (0-based) in the configuration file.

9.9.1 Listener address
----------------------

 -- ListenHTTP directive: Address ADDRESS
     The IP address that 'pound' will listen on.  This can be a numeric
     IPv4 or IPv6 address, or a full pathname of a UNIX socket.  To
     listen on all available interfaces, use '0.0.0.0' (for IPv4), or
     '::0' (for both IPv4 and IPv6).

     If neither 'Address' or 'SocketFrom' are supplied, '::0' is
     assumed.

 -- ListenHTTP directive: Port N
     The port number or service name (as per '/etc/services' that this
     listener will listen on.

     If this directive is not given, the default port number is assumed
     (80 for 'ListenHTTP' and 443 for 'ListenHTTPS').

 -- ListenHTTP directive: SocketFrom "PATHNAME"
     Read the socket to listen on from the UNIX socket supplied by
     PATHNAME.  If this parameter is supplied, neither 'Address' nor
     'Port' may be used.  This parameter is intended for use in 'pound'
     testsuite.

9.9.2 Listener-specific limits
------------------------------

 -- ListenHTTP directive: Client N
     Specify for how long 'pound' will wait for a client request
     (default: 10 seconds).  It will drop the connection if client
     doesn't send any data within this interval.

     This statement overrides the global timeout value (*note
     Timeouts::) for this particular listener.

 -- ListenHTTP directive: MaxRequest N
     Limits the maximum allowed size of incoming requests.  A request
     bigger than that will be responded with status 413.

     By default, there is no limit on the request size.

 -- ListenHTTP directive: MaxURI N
     Limits the maximum allowed length of incoming request URI. A
     request with an URI longer than that will be responded with status
     414.

     By default, there is no limit on the URI length.

 -- ListenHTTP directive: CheckURL "PATTERN"
     Define a pattern that must be matched by each request sent to this
     listener.  A request that does not match will be returned a 501
     status.

 -- ListenHTTP directive: xHTTP N
     Defines which HTTP method are accepted.  The possible values are:

     0
          Accept only standard HTTP methods: 'GET', 'POST', 'HEAD'.
          This is the default.

     1
          Allow also extended HTTP methods: 'PUT', 'PATCH', 'DELETE'.

     2
          Additionally allow standard WebDAV methods: 'LOCK', 'UNLOCK',
          'PROPFIND', 'PROPPATCH', 'SEARCH', 'MKCOL', 'MOVE', 'COPY',
          'OPTIONS', 'TRACE', 'MKACTIVITY', 'CHECKOUT', 'MERGE',
          'REPORT'.

     3
          Additionally allow MS extension WebDAV methods: 'SUBSCRIBE',
          'UNSUBSCRIBE', 'NOTIFY', 'BPROPFIND', 'BPROPPATCH', 'POLL',
          'BMOVE', 'BCOPY', 'BDELETE', 'CONNECT'.

9.9.3 Error definitions
-----------------------

When 'pound' returns an error status, it uses built-in error-specific
description code and status page template.  These values can be
customized using the 'ErrorFile' statement.

 -- ListenHTTP directive: ErrorFile CODE "FILENAME"
     Read HTML page for HTTP status code CODE from file FILENAME.

     The CODE argument is a three-digit HTTP response status, and
     FILENAME is the name of a file which supplies contents (and,
     optionally, HTTP headers) of the error response.  *Note Error
     responses::, for details about the file and its usage.

   For compatibility with 'pound' versions up to 4.11, the following
statement is also recognized:

     ErrNNN "FILENAME"

where NNN is a three-digit HTTP status code.  This statement is entirely
equivalent to

     ErrorFile NNN "FILENAME"

   'Pound' produces only a subset of all possible status codes, so not
all NNN codes are allowed.  The discussion below lists available HTTP
codes, along with the error description and default error page text.

 -- HTTP status: 400
     'Bad Request'
          Your browser (or proxy) sent a request that this server could
          not understand.

 -- HTTP status: 401
     'Unauthorized'
          This server could not verify that you are authorized to access
          the document requested.  Either you supplied the wrong
          credentials (e.g., bad password), or your browser doesn't
          understand how to supply the credentials required.

 -- HTTP status: 403
     'Forbidden'
          You don't have permission to access this resource.  It is
          either read-protected or not readable by the server.

 -- HTTP status: 404
     'Not Found'
          The requested URL was not found on this server.

 -- HTTP status: 405
     'Method Not Allowed'
          The request method is not supported for the requested
          resource.

 -- HTTP status: 413
     'Payload Too Large'
          The request content is larger than the proxy server is able to
          process.

 -- HTTP status: 414
     'URI Too Long'
          The length of the requested URL exceeds the capacity limit for
          this server.

 -- HTTP status: 500
     'Internal Server Error'
          The server encountered an internal error and was unable to
          complete your request.

 -- HTTP status: 501
     'Not Implemented'
          The server does not support the action requested.

 -- HTTP status: 503
     'Service Unavailable'
          The server is temporarily unable to service your request due
          to maintenance downtime or capacity problems.  Please try
          again later.

9.9.4 Listener logging
----------------------

Following statements are similar to the ones described in *note Logging
configuration::, but apply only to the listener they appear in.

 -- ListenHTTP directive: LogLevel "NAME"
 -- ListenHTTP directive: LogLevel N
     Specify the format to use to log HTTP requests.  NAME is a name of
     a custom format, defined earlier using the 'LogFormat' directive,
     or one of six built-in format names.

     If numeric argument is used, it refers to a built-in format by its
     number (0 through 5).

     *Note Logging::, for a detailed description of HTTP request
     logging.

 -- ListenHTTP directive: ForwardedHeader "NAME"
     Defines the name of the HTTP header that carries the list of
     proxies the request has passed through.  Default value is
     'X-Forwarded-For'.  This header is used to determine the originator
     IP address for logging.  *Note %a::, for details.

 -- ListenerHTTP directive: TrustedIP
     Defines a list of "trusted proxy" IP addresses, which is used to
     determine the originator IP. *Note %a::, for details.

9.9.5 Request Modification
--------------------------

The statements discussed in this subsection modify incoming requests
prior to passing them to the backend.  These same set of statements can
also be used in 'Service' section (*note Service::).  When appearing in
both sections, the directive from 'ListenHTTP' ('ListenHTTPS') section
are applied first, followed by directives from the 'Service' section.
Directives from the same section are applied in order of their
appearance.

 -- ListenerHTTP directive: RewriteDestination BOOL
     If set to 'true', the 'Destination:' request header will be changed
     to point to the backend with the correct protocol.

 -- ListenerHTTP directive: SetURL "URL"
     Set the URL of the incoming request to URL.

 -- ListenerHTTP directive: SetPath "VALUE"
     Set the path part of the URL to the given string.

 -- ListenerHTTP directive: SetQuery "VALUE"
     Set the query part of the URL to the given string.  VALUE must be a
     valid query with the special characters properly encoded using
     percent encoding.

 -- ListenerHTTP directive: SetQueryParam "NAME" "VALUE"
     Set the query parameter NAME to the VALUE.  Value must be properly
     encoded if it contains reserved characters.

 -- ListenerHTTP directive: SetHeader "NAME: VALUE"
 -- ListenerHTTP directive: HeaderAdd "NAME: VALUE"
 -- ListenerHTTP directive: AddHeader "NAME: VALUE"
     Sets the HTTP header.  If the header NAME already exists, it will
     be overwritten.  Otherwise, new header will be added to the end of
     the header list.

     The 'HeaderAdd' and 'AddHeader' forms are retained for backward
     compatibility with earlier 'pound' versions.  You are advised
     against using them.

 -- ListenerHTTP directive: DeleteHeader [OPTIONS] "PATTERN"
     Remove from the request all headers matching PATTERN.  The
     'HeaderRemove' and 'HeadRemove' forms are retained for backward
     compatibility with earlier 'pound' versions.  You are advised
     against using them.

     By default, PATTERN is treated as extended POSIX regular
     expression.  The OPTIONS argument can be used to alter this.  It
     consists of zero or more option flags from the following list:


     Flag                   Meaning
                            
     --------------------------------------------------------------------------
     '-beg'                 Exact match at the beginning of string (prefix
                            match).
                            
     '-case'                Case-sensitive comparison.
                            
     '-contain'             Delete each header where "PATTERN" is a
                            substring.
                            
     '-end'                 Exact match at the end of string (suffix match).
                            
     '-exact'               Use exact string match.
                            
     '-icase'               Case-insensitive comparison.
                            
     '-pcre'                Use Perl-compatible regular expression.
                            *note Regular Expressions::.
                            
     '-perl'                Same as '-pcre'.
                            
     '-posix'               Use POSIX extended regular expression.
                            *note Regular Expressions::.
                            
     '-re'                  Use regular expression match.  This assumes the
                            default regular expression type, as set by the
                            'RegexType' directive
                            (*note Regular Expressions::).

     Table 9.1: Header matching flags for 'DeleteHeader' directive

     The following options are mutually exclusive: '-beg', '-contain',
     '-end', '-exact', '-pcre' ('-perl'), '-posix', '-re'.  If more than
     one of these are used, the last one takes effect.

 -- ListenerHTTP directive: HeaderRemove "PATTERN"
 -- ListenerHTTP directive: HeadRemove "PATTERN"
     These are obsolete keywords, equivalent to

          DeleteHeader -icase "PATTERN"

9.9.5.1 The 'rewrite' statement
...............................

The 'Rewrite' block statement associates one or more header modification
directives discussed above with "request matching directives", so that
request modification takes place only when the request matches certain
conditions.

   Syntactically, a 'Rewrite' section is:

       Rewrite [ request ]
         CONDITIONAL_DIRECTIVES...
         MODIFICATION_DIRECTIVES...
     [ Else
         CONDITIONAL_DIRECTIVES...
         MODIFICATION_DIRECTIVES... ]
       End

where CONDITIONAL_DIRECTIVES represents one or more "request
conditionals" described below and MODIFICATION_DIRECTIVES stands for one
or more header modification directives.  The 'Else' part is optional;
any number of 'Else' blocks can be supplied, thus providing for
conditional branching.

   The 'Rewrite' statement is processed sequentially until a branch is
found whose CONDITIONAL_DIRECTIVES yield 'true', or 'End' is
encountered.  If a matching branch is found, its MODIFICATION_DIRECTIVES
are applied to the request.

   "Request matching directives" or "request conditionals" are special
statements that, being applied to a HTTP request, yield 'true' or
'false' depending on whether the request satisfies the condition
described in the directive.  The following conditionals are available:

 -- Request Conditional: ACL "NAME"
     Returns 'true' if the source IP matches one of the CIDRs from the
     named access control list NAME.  The ACL itself must have been
     defined earlier (*note ACL definition::).

     *Note ACL::, for a detailed discussion.

 -- Request Conditional: ACL
     This statement defines an unnamed ACL to match the source IP
     against.  This line must be followed by one or more lines defining
     CIDRs, as described in *note ACL definition::.  The ACL definition
     is finished with an 'End' keyword on a line by itself.

     Semantically, this statement is equivalent to the named ACL
     reference described above.

     *Note ACL::, for a detailed discussion.

 -- Request Conditional: ACL -file "FILENAME"
 -- Request Conditional: ACL -filewatch "FILENAME"
     Defines an unnamed ACL to match the source IP against.  The ACL
     definition is read from the file FILENAME, one CIDR per line.
     Empty lines and comments are allowed.  If FILENAME is relative, it
     is looked up in the *note include directory::.  The form with
     '-file' reads the file contents once, at the program startup.  The
     one with '-filewatch' reads it and then monitors that file for
     changes.  Any change to the file causes it to be read again, thus
     the ACLs are updated automatically without the need to restart the
     program.

     *Note File reference ACL::, for a detailed discussion of this
     feature.

 -- Request Conditional: BasicAuth "FILENAME"
     Evaluates to 'true', if the incoming request passes basic
     authorization as described in RFC 7617.  FILENAME is the name of a
     plain text file containing usernames and passwords, created with
     'htpasswd' or similar utility.  Unless the name starts with a
     slash, it is taken relative to the 'IncludeDir' directory (*note
     include directory::).  The file is cached in the memory on the
     first authorization attempt, so that further authorizations do not
     result in disk operations.  The file will be re-scanned if 'pound'
     notices that its modification time has changed.

     *Note Authentication::.

 -- Request Conditional: Header [OPTIONS] "PATTERN"
     Yields 'true', if the request contains at least one header matching
     the given PATTERN.  By default, PATTERN is treated as
     case-insensitive POSIX extended regular expression.  This can be
     changed by OPTIONS, described below.

 -- Request Conditional: Host [OPTIONS] "HOSTNAME"
     Evaluates to 'true', if the 'Host' header matches HOSTNAME.  In the
     absence of OPTIONS, case-insensitive exact match is assumed, i.e.
     this construct is equivalent to

          Header "Host:[[:space:]]*QHOST"

     where QHOST is the HOSTNAME argument in quoted form, i.e.  with all
     characters that have special meaning in regular expressions
     escaped.

     *Note Table 9.2: conditional-option, for a detailed discussion of
     OPTIONS and their effect on matching.

     This statement is provided to facilitate handling of "virtual
     hosts".  *Note Service selection::, for details.

 -- Request Conditional: Path [OPTIONS] "PATTERN"
     Returns 'true', if the path part of the incoming request matches
     PATTERN.

 -- Request Conditional: Query [OPTIONS] "PATTERN"
     Returns 'true', if the query part of the incoming request matches
     PATTERN.  The argument must be properly percent-encoded, if it
     contains whitespace or other non-printable characters.

 -- Request Conditional: QueryParam "NAME" [OPTIONS] "PATTERN"
     Returns 'true', if the value of the query parameter NAME matches
     PATTERN.

     *Note Table 9.2: conditional-option, for a detailed discussion of
     OPTIONS and their effect on matching.

 -- Request Conditional: StringMatch "STRING" [OPTIONS] "PATTERN"
     Expands STRING as described in *note String Expansions:: and
     matches the resulting value against PATTERN.

 -- Request Conditional: URL [OPTIONS] "PATTERN"
     Matches URL of the request.  PATTERN is treated as case-sensitive
     extended regular expression, unless instructed otherwise by OPTIONS
     (see below).

   In these directives, OPTIONS is a whitespace-delimited list of zero
or more flags from the following table:


Flag                   Meaning
                       
--------------------------------------------------------------------------
'-beg'                 Exact match at the beginning of string (prefix
                       match).
                       
'-case'                Case-sensitive comparison.
                       
'-contain'             Match if PATTERN is a substring of the original
                       value.
                       
'-end'                 Exact match at the end of string (suffix match).
                       
'-exact'               Use exact string match.
                       
                       
'-file'                Treat PATTERN as the name of a file to read
                       patterns from.  If the name is relative, it will
                       be looked up in the *note include directory::.
                       Patterns are read from the file line by line.
                       Leading and trailing whitespace is removed.
                       Empty lines and comments (lines starting with
                       '#') are ignored.
                       
'-icase'               Case-insensitive comparison.
                       
'-pcre'                Use Perl-compatible regular expression.
                       *note Regular Expressions::.
                       
'-perl'                Same as '-pcre'.
                       
'-posix'               Use POSIX extended regular expression.
                       *note Regular Expressions::.
                       
'-re'                  Use regular expression match.  This assumes the
                       default regular expression type, as set by the
                       'RegexType' directive
                       (*note Regular Expressions::).

Table 9.2: Conditional directive flags

   The following options are mutually exclusive: '-beg', '-contain',
'-end', '-exact', '-pcre' ('-perl'), '-posix', '-re'.  If more than one
of these are used, the last one takes effect.

   Placing the keyword 'Not' before a header matching directive reverts
its meaning.  For example, the following will match any request whose
URL does not begin with '/static/':

     Not URL -beg "/static/"

   The 'Match' block statement can be used to join multiple header
matching directives.  Its syntax is:

     Match OP
       ...
     End

where ... stands for any number of matching directives, and OP is a
boolean operation: 'AND' or 'OR' (case-insensitive).  For example, the
statement

     Match OR
       Host "www.example.net"
       Path -beg "/ssl"
     End

will match if the request 'Host' header has the value 'www.example.net',
or the path part of its URL starts with '/ssl'.  In contrast, the
statement below:

     Match AND
       Host "www.example.net"
       Path -beg "/ssl"
     End

will match only if both these conditions are met.  As a syntactical
short-cut, two or more matching statements appearing outside of 'Match'
are joined by an implicit logical 'AND', so that the latter example is
equivalent to:

     Host "www.example.net"
     Path -beg "/ssl"

   The 'Match' statement, like any other matching directive, can be
prefixed with 'Not', which reverts its meaning.

9.9.6 Response Modification
---------------------------

 -- ListenerHTTP directive: RewriteLocation N
     This statement controls whether 'Location:' and 'Content-location:'
     headers in HTTP responses are modified before sending them back to
     the client.

     If N is 0, both headers are left intact.

     If N is 1, the headers are changed as follows.  If they point to
     the backend itself or to the listener (but with the wrong
     protocol), the request host name will be used instead.  This is the
     default.

     If N is 2, do the same, but compare only the backend address; this
     is useful for redirecting a request to an HTTPS listener on the
     same server as the HTTP listener.

     To check whether the location points to the listener or to the
     backend, its hostname part is resolved and the obtained IP address
     (or addresses) are compared with that of listener or backend.  This
     process is affected by the 'dns' feature setting (*note dns::).  If
     it is disabled ('-W no-dns' option is given), no resolving takes
     place.  In this case the location is deemed to point to the
     listener if its hostname part matches that of the incoming request.
     For backends, the hostname is compared with the value of the
     'ServerName' setting of that backend (*note ServerName::), if any.

9.9.6.1 The 'Rewrite response' statement.
.........................................

A special form of the 'Rewrite' statement is provided for modifying
headers in the response obtained from a regular backend or generated
with a 'Error' backend, before sending them back to the requesting
server:

       Rewrite response
         CONDITIONAL_DIRECTIVES...
         MODIFICATION_DIRECTIVES...
     [ Else
         CONDITIONAL_DIRECTIVES...
         MODIFICATION_DIRECTIVES... ]
       End

   The conditional directives allowed for use in this statement are:

 -- Rewrite response conditional: Header [OPTIONS] "PATTERN"
     Returns 'true', if the response contains at least one header
     matching the given PATTERN.

 -- Rewrite response conditional: StringMatch "STRING" [OPTIONS]
          "PATTERN"
     Expands STRING as described in *note String Expansions::, and
     matches the resulting value against PATTERN.

   Both conditionals treat their PATTERN argument as case-insensitive
POSIX extended regular expression.  *Note Table 9.2: conditional-option,
for a discussion of available OPTIONS.

   The following "response modification" directives are defined:

 -- Response modification: DeleteHeader [OPTIONS] "PATTERN"
     Remove matching headers from the response.  By default, PATTERN is
     treated as extended POSIX regular expression.  Use OPTIONS to alter
     this behavior.  *Note Table 9.1: deleteheader-option, for a list of
     available options.

 -- Response modification: SetHeader "NAME: VALUE"
     Sets the HTTP response header.  Argument undergoes string expansion
     (*Note String Expansions::).  If the header NAME already exists, it
     will be overwritten.  Otherwise, new header will be added to the
     end of the header list.

9.9.7 Rewriting error responses
-------------------------------

When a regular backend responds with an error, the content (body) of
that response can be replaced with an arbitrary custom page.  For this
to work, the following conditions should be met:

  1. Response status code is one of error codes that 'pound' itself can
     return.  These are listed in *note Error definitions::.
  2. A custom error page is defined for that status code using the
     'ErrorFile' statement.
  3. Error response rewriting is explicitly enabled for the service that
     contains the backend from which the response is obtained, or for
     the listener where that service is located.  To do so use the
     following statement:

 -- ListenerHTTP directive: RewriteErrors BOOL
     Enables or disables error response rewriting for that listener.

     The same statement is available for use within a service (see
     below).  The 'RewriteErrors' setting of a service overrides that of
     the listener.

9.9.8 Service definitions
-------------------------

The 'Service' section defines rules that decide to which backend to
route requests received by that listener.  Any number of 'Service'
sections can be present.  When a request is received, the listener
iterates over all services in the order of their appearance in the
configuration and applies the section rules to the request.  If the
rules match the request, the request is forwarded to the backend defined
in that section.

   *Note Service::, for a detailed discussion of the 'Service'
statement.

 -- ListenHTTP statement: ACME DIR
     This statement defines a special service with a built-in backend
     for handling 'ACME' challenge requests.  *Note ACME::, for a
     detailed discussion of its use.

     The DIR argument defines the directory where to look for challenge
     files.

9.10 ListenHTTPS
================

The 'ListenHTTPS' section defines a listener that operates in HTTPS. The
section declaration begins with the keyword 'ListenHTTPS' optionally
followed by a string supplying symbolic name for that listener:

     ListenHTTPS "main"
       ...
     End

   The purpose of the symbolic name is the same as in 'ListenHTTP'
statement.  All keywords defined for 'ListenHTTP' can be used for
'ListenHTTPS' as well.  *Note ListenHTTP::, for a detailed discussion of
these.

   Statements specific for this section are:

 -- ListenHTTPS: Cert "FILENAME"
     Specifies the server "certificate".  FILENAME is either a
     certificate file name, or the name of a directory containing
     certificate files.

     A "certificate file" is a file containing the certificate, possibly
     a certificate chain and the signature for this server, in that
     order.

     This directive is mandatory within 'ListenHTTPS'.

     Multiple 'Cert' directives are allowed.  If multiple directives are
     used, the first one is the default certificate, with additional
     certificates used if the client requests them.

     The ordering of the directives is important: the first certificate
     where the CN matches the client request will be used, so put your
     directives in the most-specific-to-least specific order (i.e.
     wildcard certificates after host-specific certificates).

     'Cert' directives must precede all other SSL-specific directives.

 -- ListenHTTPS: ClientCert MODE DEPTH
     Specifies whether the listener must ask for the client's HTTPS
     certificate.  Allowed values for MODE are:

       0. Never ask for the certificate (the default).
       1. Ask for the client certificate.
       2. Ask and fail, if no certificate was presented.
       3. Ask but do not verify.

     DEPTH is the depth of verification for a client certificate (up to
     9).  The default depth limit is 9, allowing for the peer
     certificate and additional 9 CA certificates that must be verified.

 -- ListenHTTPS: Disable PROTO
     Disable the SSL protocol PROTO and all lower protocols as well.
     Allowed values for PROTO are: 'SSLv2', 'SSLv3', 'TLSv1', 'TLSv1_1',
     'TLSv1_2'.

     For example:

          Disable TLSv1

     This disables SSLv2, SSLv3 and TLSv1, thus allowing only TLSv1_1
     and TLSv1_2.

 -- ListenHTTPS: Ciphers "CIPHER_LIST"
     This is the list of ciphers that will be accepted by the SSL
     connection; it is a string in the same format as in 'OpenSSL'
     'ciphers' and 'SSL_CTX_set_cipher_list' functions.

 -- ListenHTTPS: SSLHonorCipherOrder BOOL
     If set 'true', the server will broadcast a preference to use
     ciphers in the order supplied in the 'Ciphers' directive.  If the
     value is 'false', the server will accept any cipher from the
     'Ciphers' list.  Default value is 'false'.

 -- ListenHTTPS: SSLAllowClientRenegotiation MODE
     If MODE is 0, client initiated renegotiation will be disabled.
     This will mitigate DoS exploits based on client renegotiation,
     regardless of the patch status of clients and servers related to
     "Secure renegotiation".  If MODE is 1, secure renegotiation is
     supported.  If MODE value is 2, insecure renegotiation is
     supported.

     The default value is 0.

 -- ListenHTTPS: CAlist "FILENAME"
     Set the list of trusted CA's for this server.  The FILENAME is the
     name of a file containing a sequence of CA certificates (in PEM
     format).  The names of the defined CA certificates will be sent to
     the client on connection.

 -- ListenHTTPS: VerifyList "FILENAME"
     Set the certificate authority list.  The FILENAME is the name of a
     file with CA root certificates, in PEM format.

   _Please note_, that there is an important difference between the
'CAlist' and the 'VerifyList'.  The 'CAlist' tells the client (browser)
which client certificates it should send.  The 'VerifyList' defines
which CAs are actually used for the verification of the returned
certificate.

 -- ListenHTTPS: CRLlist "FILENAME"
     Set the "Certificate Revocation List" file.  FILENAME is the name
     of a file that contains the CRLs (in PEM format).

 -- ListenHTTPS: NoHTTPS11 MODE
     Behave like an 'HTTP/1.0' server for HTTPS clients.  If MODE is 0,
     always conform to HTTPS/1.1.  If it is 1, do not allow multiple
     requests on SSL connections.  If the value is 2 (default), disable
     multiple requests on SSL connections only for MSIE clients.

9.11 Service
============

The 'Service' statements define backends to use and conditions a request
should satisfy in order to be routed to these backends.  These
statements can appear both within 'ListenHTTP' ('ListenHTTPS') sections
and outside of them.  When processing an incoming request, the listener
will first try to match it against services defined within it.  If none
of these services matches the request, it will try to match it against
services defined in the top level.  If a matching service is found, it
will be used to process the request.  Otherwise a 503 ("Service
Unavailable") response will be returned.

   A service is defined by a section statement that begins with the
'Section' keyword, followed by service definition statements and
terminated by 'End' on a line by itself:

     Service "NAME"
       ...
     End

   Optional NAME argument assigns a symbolic name to the service.  That
name is used to identify the service in diagnostic and access log
messages (*note '%{OBJ}N': log format.), metric output (*note
Metrics::), and in 'poundctl' requests (*note poundctl::).  In the
absence of an assigned NAME, the ordinal number of the service in the
enclosing section is used as its identifier.  Service numbers start at
0.

   Following subsections discuss statements that can be used in
'Service' sections.

9.11.1 Service Selection Statements
-----------------------------------

Service selection statements define conditions an incoming request must
satisfy in order to be handled by this service.

 -- Service Conditional: ACL "NAME"
     Returns 'true' if the source IP of the request matches one of the
     CIDRs from the named access control list NAME.  The ACL itself must
     have been defined earlier (*note ACL definition::).

     *Note ACL::, for a detailed discussion.

 -- Service Conditional: ACL
     This statement defines an unnamed ACL to match the source IP
     against.  This line must be followed by one or more lines defining
     CIDRs, as described in *note ACL definition::.  The ACL definition
     is finished with an 'End' keyword on a line by itself.

     Semantically, this statement is equivalent to the named ACL
     reference described above.

     *Note ACL::, for a detailed discussion.

 -- Service Conditional: BasicAuth "FILENAME"
     Evaluates to 'true', if the incoming request passes basic
     authorization as described in RFC 7617.  FILENAME is the name of a
     plain text file containing usernames and passwords, created with
     'htpasswd' or similar utility.  Unless the name starts with a
     slash, it is taken relative to the 'IncludeDir' directory (*note
     include directory::).  The file is cached in the memory on the
     first authorization attempt, so that further authorizations do not
     result in disk operations.  The file will be rescanned if 'pound'
     notices that its modification time has changed.

     *Note Authentication::.

 -- Service Conditional: ClientCert "FILENAME"
     Evaluates to 'true' if the client presents the certificate matching
     that from the file FILENAME (PEM format).

     This conditional cannot be used in standalone services (i.e.
     services that are defined in global scope).  It also cannot be used
     if the 'ListenHTTPS' section that hosts the service has the
     'ClientCert' statement on its own.

 -- Service Conditional: Header [OPTIONS] "PATTERN"
     Yields 'true', if the request contains at least one header matching
     the given PATTERN.  By default, PATTERN is treated as
     case-insensitive POSIX extended regular expression.  This can be
     changed by OPTIONS, described below.

 -- Service Conditional: Host [OPTIONS] "HOSTNAME"
     Evaluates to 'true', if the 'Host' header matches HOSTNAME.  In the
     absence of OPTIONS, case-insensitive exact match is assumed, i.e.
     this construct is equivalent to

          Header "Host:[[:space:]]*QHOST"

     where QHOST is the HOSTNAME argument in quoted form, i.e.  with all
     characters that have special meaning in regular expressions
     escaped.

     *Note Table 9.2: conditional-option, for a detailed discussion of
     OPTIONS and their effect on matching.

     This statement is provided to facilitate handling of "virtual
     hosts".  *Note Service selection::, for details.

 -- Service Conditional: Path [OPTIONS] "PATTERN"
     Returns 'true', if the path part of the incoming request matches
     PATTERN.

 -- Service Conditional: Query [OPTIONS] "PATTERN"
     Returns 'true', if the query part of the incoming request matches
     PATTERN.  The argument must be properly percent-encoded, if it
     contains whitespace or other non-printable characters.

 -- Service Conditional: QueryParam "NAME" [OPTIONS] "PATTERN"
     Returns 'true', if the value of the query parameter NAME matches
     PATTERN.

     *Note Table 9.2: conditional-option, for a detailed discussion of
     OPTIONS and their effect on matching.

 -- Service Conditional: StringMatch "STRING" [OPTIONS] "PATTERN"
     Expands STRING as described in *note String Expansions::, and
     matches the resulting value against PATTERN.

 -- Service Conditional: URL [OPTIONS] "PATTERN"
     Matches URL of the request.  PATTERN is treated as case-sensitive
     extended regular expression, unless instructed otherwise by OPTIONS
     (see below).

   The OPTIONS argument in the directives discussed above defines the
comparison algorithm used.  It consists of one or more flags described
in *note Table 9.2: conditional-option.

   Placing the keyword 'Not' before a header matching directive reverts
its meaning.  For example, the following will match any request whose
URL does not begin with '/static/':

     Not URL -beg "/static/"

   The 'Match' block statement can be used to join multiple header
matching directives.  Its syntax is:

     Match OP
       ...
     End

where ... stands for any number of matching directives, and OP is a
boolean operation: 'AND' or 'OR' (case-insensitive).  *Note Match in
service statement::, for a detailed discussion with examples.

9.11.2 Request and Response Modification
----------------------------------------

These statements modify incoming requests prior to passing them to the
backend.  A similar set of statements can be used in listeners (*note
Request Modification::).  In case both the listener and service contain
request modification statements, those from the listener are applied
first, followed by the ones from the service.

 -- Service directive: SetURL "URL"
     Set the URL of the incoming request to URL.

 -- Service directive: SetPath "VALUE"
     Set the path part of the URL to the given string.

 -- Service directive: SetQuery "VALUE"
     Set the query part of the URL to the given string.  VALUE must be a
     valid query with the special characters properly encoded using
     percent encoding.

 -- Service directive: SetQueryParam "NAME" "VALUE"
     Set the query parameter NAME to the VALUE.  The value must be
     properly encoded if it contains reserved characters.

 -- Service directive: SetHeader "NAME: VALUE"
 -- Service directive: HeaderAdd "NAME: VALUE"
 -- Service directive: AddHeader "NAME: VALUE"
     Sets the HTTP header.  If the header NAME already exists, it will
     be overwritten.  Otherwise, new header will be added to the end of
     the header list.

     The 'HeaderAdd' and 'AddHeader' forms are retained for backward
     compatibility with earlier 'pound' versions.  You are advised
     against using them.

 -- Service directive: DeleteHeader [OPTIONS] "PATTERN"
 -- Service directive: HeaderRemove [OPTIONS] "PATTERN"
 -- Service directive: HeadRemove [OPTIONS] "PATTERN"
     Remove from the request all headers matching PATTERN.  The
     'HeaderRemove' and 'HeadRemove' forms are retained for backward
     compatibility with earlier 'pound' versions.  You are advised
     against using them.

     By default, PATTERN is treated as extended POSIX regular
     expression.  The OPTIONS argument can be used to alter this.  It
     consists of zero or more option flags, described in *note Table
     9.1: deleteheader-option.

 -- Service statement: Rewrite [ request | response ] ... End
     This block statement associates one or more header modification
     directives discussed above with "request matching directives", so
     that request modification takes place only when the request matches
     certain conditions.

     By default 'Rewrite' statements apply to incoming requests.  The
     subject of rewriting can also be specified explicitly after the
     'Rewrite' keyword.

     *Note Rewrite::, for a detailed discussion of this statement.

     *Note Conditional branches::, for an in-depth discussion with
     examples.

     *Note Modifying responses::, for a discussion of the use of this
     statement to modify responses.

 -- Service directive: RewriteErrors BOOL
     Enables or disables error response rewriting for that service.
     *Note Error response rewriting::, for a detailed discussion.

9.11.3 Service Logging
----------------------

 -- Service directive: ForwardedHeader "NAME"
     Defines the name of the HTTP header that carries the list of
     proxies the request has passed through.  Default value is
     'X-Forwarded-For'.  This header is used to determine the originator
     IP address for logging.  *Note %a::, for details.

 -- Service directive: TrustedIP
     Defines a list of "trusted proxy" IP addresses, which is used to
     determine the originator IP.

     *Note %a::, for a detailed discussion.

     This statement is a special form of 'ACL' statement, described in
     *note ACL::.  It can appear in three forms: "anonymous ACL", "file
     reference", or "ACL reference".  Examples:

       1.      TrustedIP
                 "127.0.0.1/8"
                 "10.16.0.0/16"
               End
       2.      TrustedIP -filewatch "/etc/pound/trustip.acl"
       3.      TrustedIP "proxy_addresses"

 -- Service directive: LogSuppress CLASS [CLASS...]
     Suppresses HTTP logging for requests that resulted in status codes
     from the specified classes.  Valid classes are:

     info
     1
          '1xx' response codes.

     success
     2
          '2xx' response codes.

     redirect
     3
          '3xx' response codes.

     clterr
     4
          '4xx' response codes.

     srverr
     5
          '5xx' response codes.

     all
          All response codes.

     This statement is designed for services that receive a constant
     stream of similar HTTP requests from a controlled set of IP
     addresses, such as e.g.  Openmetric services.  *Note Metrics::, for
     an example.

9.11.4 Backends
---------------

9.11.4.1 Backend
................

The 'Backend' section defines a regular backend.  The overall syntax, as
for any section statement, is:

     Backend [ "NAME" ]
       ...
     End

   Optional NAME argument assigns a symbolic name to the service.  That
name is used to identify the backend in diagnostic and access log
messages (*note '%{OBJ}N': log format.), metric output (*note
Metrics::), and in 'poundctl' requests (*note poundctl::).  In the
absence of an assigned NAME, the ordinal (0-based) number of the backend
in the enclosing 'Service' is used as its identifier.

   The following statements can be used in a 'Backend' section:

 -- Backend directive: Address IP
     IP address or host name of the backend server.  If the name cannot
     be resolved to a valid address, 'pound' will assume that it
     represents a path to a Unix-domain socket.

     This directive is mandatory.

 -- Backend directive: Disabled BOOL
     Mark this backend as disabled.

     Backends can be enabled or disabled at runtime using the 'poundctl'
     utility (*note enable: poundctl commands.).

     _Note:_ not to be confused with the 'Disable' statement, described
     below.

 -- Backend directive: Port N
     Sets the port number to connect to.  This directive must be present
     if the 'Address' statement contains an IP address.

 -- Backend directive: Priority N
     Sets numeric priority for this backend.  Priorities are used to
     control probability of receiving a request for handling in case of
     multiple backends.  *Note Balancer::, for a detailed discussion.

     Allowed values for N are 1 to 65535.

   Following directives configure "dynamic backends".  *note Dynamic
backends::, for a detailed discussion:

 -- Backend directive: Family NAME
     Defines the address family to look for when resolving hostnames:

     'any'
          Use all address families available.  This is the default.

     'inet'
          Use only IPv4 addresses.

     'inet6'
          Use only IPv6 addresses.

 -- Backend directive: IgnoreSRVWeight BOOL
     When using 'SRV' records, ignore their weight fields.  Instead,
     copy priority of the producing backend to generated backends.

     This directive is valid when used together with 'Resolve srv' (see
     below).

 -- Backend directive: OverrideTTL N
     This directive configures update interval (in seconds) for dynamic
     backends (*note Dynamic backends::).  At the end of each update
     interval, the DNS be queried and dynamic backends reconfigured (if
     needed) according to its responses.  By default, the TTL value
     obtained from previous DNS response is used.

     To configure the interval to retry failed DNS lookups, see
     'RetryInterval', below.

 -- Backend directive: Resolve TYPE
     Declares a dynamic backend.  Valid values for TYPE are

     'first'
          Resolve the symbolic host name and use first IP from the DNS
          response as the address of the created dynamic backend.  Thus,
          this type will produce at most one dynamic backend.

     'all'
          Resolve the symbolic host name and create one backend for each
          address from the DNS response.  This enables load balancing
          between created backends.  Each backend will be assigned the
          same priority.

     'srv'
          Obtain 'SRV' records for the host name and use them to
          generate dynamic backends.  Each record produces new dynamic
          backend of 'Resolve all' type, which creates regular backends
          as described above.  The weight field of the 'SRV' record is
          mapped to the priority field of each generated backend.  The
          priority field determines the balancer group where the backend
          will be hosted.

 -- Backend directive: RetryInterval N
     Retry failed DNS lookups in N seconds.  Default is 600.

     See also the 'RetryInterval' statement in 'Resolver' section (*note
     resolver::).

   The following three directives set various timeout parameters for
backend operations:

 -- Backend directive: ConnTO N
     Sets "connection timeout", i.e.  time to wait for establishing
     connection with the backend (in seconds).

 -- Backend directive: TimeOut N
     Sets the "response timeout", i.e.  time to wait for a response from
     the backend (in seconds).  Default is 15.

 -- Backend directive: WSTimeOut N
     Idle timeout for WebSocket operations, in seconds.  Default value:
     600 (10 minutes).

   Backend servers can use HTTPS as well as plaintext HTTP. The
following directives configure HTTPS backends:

 -- Backend directive: HTTPS
     This directive indicates that the remote server speaks HTTPS.

 -- Backend directive: Cert "FILENAME"
     This specifies the certificate that 'pound' will use as a client.
     The FILENAME is the name of a file containing the certificate,
     possibly a certificate chain and the signature.

 -- Backend directive: Ciphers "CIPHERLIST"
     This is the list of ciphers that will be accepted by the SSL
     connection with the backend (for HTTPS backends); it is a string in
     the same format as used by the OpenSSL functions 'ciphers' and
     'SSL_CTX_set_cipher_list'.

 -- Backend directive: Disable PROTO
     Disable the SSL protocol PROTO and all earlier protocols.  Allowed
     values for PROTO are: 'SSLv2', 'SSLv3', 'TLSv1', 'TLSv1_1',
     'TLSv1_2'.

     _Note:_ not to be confused with the 'Disabled' statement, described
     above.

 -- Backend directive: ServerName "NAME"
     This directive specifies the name to use for server name
     identification ("SNI"). It also rewrites the 'Host:' header for
     this particular backend.  This means you don't have to use
     'SetHeader' in addition to it.

9.11.4.2 Globally Defined Backends
..................................

The 'Backend' section described above can also be used at the topmost
level of the configuration file.  Use this if you plan to use same
backend in several different services.

   When used globally the 'Backend' keyword must always be followed by
the backend name in double-quotes.  The assigned name must be unique
among all global backends.

   To include a globally defined backend in a service, use 'UseBackend'
or 'Backend' keywords.

 -- Service directive: UseBackend "NAME"
     Use globally-defined backend NAME in this service.  The backend
     itself may be defined in global scope before or after the 'Service'
     section that uses it.

   The 'UseBackend' keyword adds the backend to the service exactly as
it was defined.  However, it may sometimes be necessary to alter its
priority and state.  To do so, use the 'Backend' section.  If the name
argument specifies a globally-defined backend, the 'Backend' section can
contain only the 'Priority' and 'Disable' statements.

9.11.4.3 Special Backends
.........................

Special backends are backends that don't rely on an external server to
handle the response, but instead are served by 'pound' itself.

 -- Service directive: Error STATUS [FILE]
     Return a particular HTTP status.

     The STATUS argument supplies the HTTP status code to return.

     Optional FILE argument is the name of a disk file with the error
     page content.  If not supplied, the text is determined as usual:
     first the 'ErrorFile STATUS' statement from the enclosing listener
     is consulted.  If it is not present, the default error page is
     used.

     This directive is useful in a catch-all service, which outputs an
     error page if no service matching the incoming request was found.
     *Note Error responses::, for a discussion.

 -- Service directive: Redirect [CODE] "URL"
     Declares a special backend that responds to each request with a
     redirect response.

     Optional CODE can be one of: 301, 302 (the default), 303, 307, or
     308.

     The URL argument specifies the URL to redirect the request to.
     Before use it is expanded as described in *note String
     Expansions::.

     For compatibility with previous 'pound' versions, if no '$N'
     references are found in URL, the following logic is used: if it is
     a "pure" host (i.e.  with no path) then the client will be
     redirected to that host, with the original request path appended.
     If the URL does contain a path (even if it is just a '/'), then the
     request path is ignored.

     *Note Redirects::, for a detailed discussion of this backend and
     its use.

 -- Service directive: SendFile DIR
     Defines a special backend that serves static files from directory
     DIR.  Name of the file to serve is supplied by the request path,
     after applying usual request modifications (*note Request
     Modification::).  By default, the response bears 'Content-Type:
     text/plain' header.  To change this, use 'SetHeader' statement in
     response rewriting (*note rewrite response::).

     The following example defines a service which will serve requests
     to paths beginning with '/about/' from directory
     '/var/lib/pound/static'.  Name of the file to serve is obtained by
     removing the '/about/' prefix from the request pathname.  Content
     type is set to 'text/html':

          Service
              Path -re "/about/(.+)"
              SetPath "$1"
              Rewrite response
                   SetHeader "Content-Type: text/html"
              End
              SendFile "/var/lib/pound/static"
          End

 -- Service directive: Control
     Defines a special backend that serves "pound management interface".
     *Note Service Control::, for a detailed discussion of this feature.

 -- Service directive: Metrics
     This directive defines a special backend that generates Openmetric
     telemetry output on the given URL. Example usage:

          Service
              URL "/metrics"
              Metrics
          End

     To control access to the telemetry endpoint, use the 'ACL'
     statement (*note ACL::).

     The 'LogSuppress' directive (*note LogSuppress::) is often used in
     openmetric services to suppress logging of served HTTP requests:

          Service
              URL "/metrics"
              Metrics
              ACL "secure"
              LogSuppress success
          End

     The metrics output is discussed in *note Metric Families::.

 -- Service directive: Emergency ... End
     Defines an "emergency backend", which will be used only if all
     other backends become unavailable.  *Note Backend::, for a
     discussion of directives that can be used within 'Emergency'
     section.

     If multiple 'Emergency' sections are defined, an emergency backend
     to use will be selected using the usual balancing technique (*note
     Balancer::).

9.11.5 Session
--------------

 -- Service directive: Session ... End
     Defines how a service deals with possible HTTP sessions.  Once a
     session is identified, 'pound' will attempt to send all requests
     within that session to the same backend server.

     *Note Sessions::, for a detailed discussion of HTTP sessions and
     their handling.

   The following directives are available for use in 'Session' section.

 -- Session directive: Type TYPE
     Defines the expected type of sessions to handle.  Allowed values
     for TYPE are:

     'IP'
          A session is defined by the source IP. All requests coming
          from the same IP are considered to be in the same session.
          The IP address is defined by the 'ID' statement (see below).

     'BASIC'
          A session is defined by the 'Authentication' HTTP header.  If
          the header is present, and specifies the 'Basic'
          authentication type, user ID is extracted from it.

     'URL'
          A session is identified by the value of a particular query
          parameter.  The name of the parameter is given by the 'ID'
          statement.

     'PARM'
          Sessions are identified by HTTP parameter - a string that
          appears after a semicolon in the URL, such as 'bar' in
          'http://foo.com;bar'.

     'COOKIE'
          Sessions are identified by the value of an HTTP cookie, whose
          name is given by the 'ID' directive.

     'HEADER'
          Sessions are identified by the value of HTTP header whose name
          is given by the 'ID' directive.

 -- Session directive: ID "NAME"
     Specifies the "session identifier": IP address (for 'Type IP'),
     query parameter name (for 'Type URL'), cookie name (for 'Type
     COOKIE'), or header name (for 'Type HEADER').

 -- Session directive: TTL N
     How long can a session be idle (in seconds).  A session that has
     been idle for longer than the specified number of seconds will be
     discarded.  This directive is mandatory.

9.11.6 Other Statements
-----------------------

 -- Service directive: Disabled BOOL
     If 'true', mark this service as disabled.  Disabled services are
     not used for request processing.  A service can be enabled or
     disabled at runtime using the 'poundctl' utility (*note enable:
     poundctl commands.).

 -- Service directive: Balancer ALGO
     Sets the request balancing algorithm to use.  Allowed values for
     ALGO are:

     random
          Use weighted random balancing algorithm.

     iwrr
          Use interleaved weighted round robin balancing.

     *Note Balancer::, for a detailed discussion of these algorithms.

     This statement overrides the global 'Balancer' statement (*note
     Balancer: Global directives.).

 -- Service directive: IgnoreCase BOOL
     Ignore case when doing regex matching (default: 'false').  This
     directive sets the default for the following service matching
     directives: 'URL', 'Path', 'QueryParam', 'Query', 'StringMatch', as
     well as for the 'DeleteHeader' modification directive.

     This statement is deprecated and will be removed in future
     versions.  Please, use the '-icase' option to the matching
     directive instead (*note Table 9.2: conditional-option.).

9.12 Resolver
=============

The 'Resolver' section controls DNS lookups for dynamic backend
generation (*note Dynamic backends::).  It can contain the following
directives:

 -- Resolver: CNAMEChain N
     Maximum allowed length of a "CNAME chain".  CNAME chains are formed
     by DNS CNAME records pointing to another CNAME. Although prohibited
     by the RFC, such usage occurs sometimes in the wild.  By default,
     'pound' does not accept CNAME chains.  If you work with nameservers
     that declare such chains, set this statement to a small integer
     value, defining maximum number of CNAME records in the chain that
     'pound' will accept.  The value of 2 or 3 should suffice in most
     cases.

 -- Resolver: ConfigFile FILE
     Read resolver configuration from FILE.  Default is
     '/etc/resolv.conf'.

 -- Resolver: ConfigText ... End
     The material within this section is read verbatim and used as the
     content of the resolver configuration file.  E.g.:

          Resolver
                  ConfigText
                          domain example.org
                          nameserver 192.0.2.1
                          nameserver 192.0.2.4
                  End
          End

     If both 'ConfigFile' and 'ConfigText' are used, the last statement
     used wins.

 -- Resolver: Debug BOOL
     If set to 'true', enables DNS debugging info.

 -- Resolver: RetryInterval N
     Interval in seconds, after which to retry failed DNS queries or
     queries that returned no RRs.  This value is used unless the
     backend defines its own retry interval value.

10 poundctl
***********

The 'poundctl' command displays status of various objects of the running
instance and allows you to change some of them.

   The program communicates with the running 'pound' daemon via a UNIX
socket or remotely, via HTTP or HTTPS. The URL of the communication
socket can be given explicitly by the '-s' command line option, or
obtained from 'poundctl' or 'pound' configuration files.

   If the '.poundctl' exists in the home directory, the configuration
will be obtained from it.  Otherwise, if 'poundctl' runs on the same
machine as the 'pound' daemon and communicates with it via the UNIX
socket, the program will scan the 'pound.cfg' file for the 'Control'
statement (*note Control statement::) and read the socket file name from
it.  These ways of configuring 'poundctl' are discussed below, in *note
poundctl config::.  In examples below, it is assumed that the socket URL
is obtained from one of configuration files.

   The program invocation syntax is:

     poundctl [OPTIONS] COMMAND OBJECT [ARG]

Here, OPTIONS are command line options, COMMAND is a command verb that
instructs 'poundctl' what to do, OBJECT identifies the 'pound' object to
operate upon (*note objects::), and optional ARG supplies argument to
the command verb.

   Pound objects identifiers are formed in a path-like fashion:

     /LISTENER/SERVICE/BACKEND

where:

LISTENER
     Symbolic name of the listener or its ordinal number in the
     configuration.  If referring to a globally-defined service, or to a
     backend in such a service, a dash is used.

SERVICE
     Symbolic name or ordinal number of the service located in that
     listener.

BACKEND
     Ordinal number of backend in the service.

   Depending on the command, either '/BACKEND' or both
'/SERVICE/BACKEND' may be omitted.

   For example, the following command will disable backend 2 in service
1 of listener 0:

     poundctl disable /0/1/2

   Assuming listener 0 is named 'web', this example can also be written
as:

     poundctl disable /web/1/2

   The following command disables the listener 0 itself:

     poundctl disable /0

   A dash in place of LISTENER refers to the global scope.  Thus, the
following disables service 1 defined in the global scope of 'pound.cfg':

     poundctl disable /-/1

10.1 'poundctl' commands
========================

 -- poundctl: list /L/S/B
 -- poundctl: list /L/S
 -- poundctl: list /L
 -- poundctl: list
     Lists status of the given object and its subordinates.  Without
     argument, shows all listeners and underlying objects.

 -- poundctl: enable /L/S/B
 -- poundctl: enable /L/S
 -- poundctl: enable /L
 -- poundctl: on /L/S/B
 -- poundctl: on /L/S
 -- poundctl: on /L
     Enables listener, service, or backend.

 -- poundctl: disable /L/S/B
 -- poundctl: disable /L/S
 -- poundctl: disable /L
 -- poundctl: off /L/S/B
 -- poundctl: off /L/S
 -- poundctl: off /L
     Disables listener, service, or backend.

 -- poundctl: delete /L/S KEY
     Delete the session with the given key.  Notice that backend may not
     be specified.

 -- poundctl: add /L/S/B KEY
     Add a session with the given KEY.

10.2 Using 'poundctl' for remote access
=======================================

Starting from version 4.14, 'pound' is able to provide its management
interface via HTTP (*note Service Control::).  To use remote management
interface, supply its URL with the '-s' command line option.  The URL
syntax is:

     SCHEME://[USER[:PASSWORD]@]HOSTNAME[:PORT][/PATH]

where '[]' denote optional parts.  Valid SCHEME values are 'http' and
'https'.  Use USER and PASSWORD if the interface is protected by basic
authentication (*note Authentication::).

   When using 'https' protocol, you may need to supply the "certificate
authority" file using the '-C FILE' option, where FILE is the name of
the file in PEM format.  This option can also take a directory name as
its argument.  In this case all PEM files from that directory will be
loaded.

   To disable peer certificate verification, use the '-k' option.

   If 'pound' configuration requires the client to send its certificate
for authentication (*Note ClientCert::, or *note ClientCert
conditional::), use the '-K FILE' option to supply it.  Its argument,
FILE, is the name of the file with the certificate and key in PEM
format.

10.3 Configuring 'poundctl'
===========================

Upon startup, the program checks if the file '.poundctl' exists in the
user's home directory.  If so, it reads its configuration from it.  The
location of the configuration file can be changed using the environment
variable 'POUNDCTL_CONF'.  If it is defined and has a non-empty value,
its value is taken as the alternative file name to use.  It can be
either absolute file name, or a file name relative to the home
directory.  Setting 'POUNDCTL_CONF' to an empty value disables reading
the configuration.

   If the program cannot determine the socket URL from '.poundctl', it
will attempt to scan 'pound' configuration file, on the assumption that
it runs on the same machine as the daemon and that its 'pound.cfg' file
contains a 'Control' statement (*note Control statement::).  If so, the
socket name is determined from it.

   Otherwise, the control URL has to be given explicitly using the '-s'
command line option.

   The '.poundctl' file has the same syntax as 'pound.cfg': it is a
sequence of "statements" and "sections", separated by arbitrary amount
of empty lines and comments.  A "simple statement" occupies a single
line and consists of a keyword ("directive") and one or more values
separated by whitespace.  A "section" is a compound statement that
encloses other statements and sections.  Sections begin with a keyword,
optionally followed by arguments, and end with a word 'End' on a line by
itself.  All keywords are case-insensitive.

   The following keywords are available in the global scope:

 -- poundctl config: URL "URL"
     Sets the URL of the 'pound' management socket.  The value is either
     the file name of the UNIX socket file, or a remote URL, as
     described in *note poundctl remote::.

 -- poundctl config: CAFile "FILE"
     Name of the certificate authority file.  See also the '-C' option,
     below.

 -- poundctl config: CAPath "DIR"
     Read certificate authority files from the directory DIR.

 -- poundctl config: ClientCert "FILE"
     Supplies the name of the file with client certificate and private
     key, for client authentication.  See also the '-K' option, below.

 -- poundctl config: Verify BOOL
     Enables or disables peer certificate verification.  The default is
     'on'.  See also the '-k' command line option.

 -- poundctl config: TemplateFile "FILE"
     Name of the template file (*note poundctl template::).

 -- poundctl config: TemplatePath "FILE"
     Search path for template files (*note poundctl template::).

 -- poundctl config: TemplateName "NAME"
     Name of the template to use (*note poundctl template::).

10.3.1 Multiple Servers Configuration
-------------------------------------

The 'Server' section provides a way to organize management of multiple
'pound' servers.  The idea is that you define the configuration for each
particular 'pound' installation in a separate 'Server' section, and then
use the name of that section to identify the server of interest in the
command line, using the '-S' option:

     poundctl -S web list

   The syntax of the 'Server' section is:

     Server "NAME"
       ...
     End

where NAME is a unique name assigned to that server.  It will be used as
argument to the '-S' option to identify it.  The ellipsis denotes one or
more of the following statements:

 -- poundctl Server: URL URL
     Sets the URL of the 'pound' management socket for that server.  The
     value is either the file name of the UNIX socket file, or a remote
     URL, as described in *note poundctl remote::.

 -- poundctl Server: CAFile FILE
     Name of the certificate authority file.

 -- poundctl Server: CAPath DIR
     Read certificate authority files from the directory DIR.

 -- poundctl Server: ClientCert FILE
     Supplies the name of the file with client certificate and private
     key, for client authentication to that server.

 -- poundctl Server: Verify BOOL
     Enables or disables peer certificate verification.  The default is
     'on'.

10.4 'poundctl' options
=======================

The following options are understood by 'poundctl':

'-C FILE'
'-C DIR'
     Read certificate authority files from FILE or from files in DIR.
     *Note poundctl remote::.  This overrides the 'CAFile' or 'CAPath'
     configuration settings (*note poundctl config::).

'-f FILE'
     Read 'pound' configuration from FILE, instead of the default
     configuration file.

'-i N'
     Sets indentation level for JSON output to N columns.

'-j'
     Use JSON output format.

'-K FILE'
     Read client certificate and private key from FILE.  *Note poundctl
     remote::.  This option overrides the 'ClientCert' configuration
     setting (*note poundctl config::).

'-k'
     Disable peer certificate verification.  *Note poundctl remote::.
     This overrides the 'Verify' configuration setting (*note poundctl
     config::).

'-h'
     Shows a short help output and exits.

'-S NAME'
     Operate on server defined by 'Section "NAME"' in the '.poundctl'
     file.  *Note multiple servers::, for a detailed discussion.

'-s SOCKET'
'-s URL'
     Sets pathname of the control socket, or its URL (for remote access,
     *note poundctl remote::).  This overrides the 'URL' configuration
     setting (*note poundctl config::).

'-T FILE'
     Sets the name of the template file to use.  Overrides the
     'TemplateFile' configuration setting (*note poundctl config::).

'-t NAME'
     Defines the name of the template to use, instead of the 'default'.
     This overrides the 'TemplateName' configuration setting (*note
     poundctl config::).

'-V'
     Prints program version, compilation settings, and exits.

'-v'
     Increases output verbosity level.

10.5 'poundctl' template
========================

Information received from the 'pound' daemon is formatted as a JSON
object.  To produce human-readable output, 'poundctl' uses a "template",
i.e.  a text written in a domain-specific language expressly designed
for that purpose.  The template language complies, in general, with the
specification in <https://pkg.go.dev/text/template>.  *Note Template
syntax::, for a detailed description.

   Templates are stored in template files, which are looked up in the
template search path.  The path is a column-delimited list of
directories or file names.  To locate the template file, the path is
scanned left-to right.  If an element is a regular file name (or a hard
or symbolic link to a regular file), 'poundctl' tries to open that file.
If an element is a directory name, the program tries to open the file
'poundctl.tmpl' in that directory.  If opening succeeds, further
scanning stops and templates are read from that file.

   The default template path is

     ~/.poundctl.tmpl:DATADIR/pound

where DATADIR stands for the program data directory(1).  That is, the
file '.poundctl.tmpl' in the user home directory is searched first, then
the file 'poundctl.tmpl' (without the leading dot) is looked up in the
program data directory.

   The default search path can be changed in the configuration file,
using the 'TemplatePath' statement (*note poundctl config::), or by
setting the environment variable 'POUND_TMPL_PATH'.

   To examine the default value of the search path, use the '-V' command
line option.

   The template file to use can be requested from the command line using
the '-t' option (or 'TemplateFile' configuration setting).  In this
case, template search path in not searched and the supplied file is used
verbatim.

   Unless instructed otherwise, 'poundctl' uses the template 'default'.
You can request another template name using the 'TemplateName'
configuration setting or the '-T' command line option.

   The default 'poundctl.tmpl' file defines two templates: 'default' and
'xml'.

   ---------- Footnotes ----------

   (1) It is determined at compile time.  Normally it is
'/usr/share/pound' or '/usr/local/share/pound'.

10.5.1 Template syntax
----------------------

The syntax of 'poundctl' templates is modelled after and mostly
conforming to the specifications of the 'golang' template module(1).

   Templates are executed by applying them to a JSON object.
Annotations in a template refer to attributes of the object to control
execution and derive values to be displayed.  Execution of the template
walks the structure and sets the cursor, represented by a period (called
"dot"), to the value at the current location in the object as execution
proceeds.

   The input text for a template is as ASCII text is arbitrary format.

   Actions (data evaluations or control structures) are delimited by
'{{' and '}}'; all text outside actions is copied to the output
verbatim.

   To aid in formatting template source code, if '{{' is followed
immediately by a minus sign and white space, all trailing white space is
trimmed from the immediately preceding text.  Similarly, if '}}' is
preceded by white space and a minus sign, all leading white space is
trimmed from the immediately following text.  Notice that the presence
of the whitespace in these trim markers is mandatory: '{{- 3}}' trims
the immediately preceding text and outputs '3', while "'{{-3}}' parses
as an action containing the number '-3'.

   ---------- Footnotes ----------

   (1) <https://pkg.go.dev/text/template>

10.5.1.1 Actions
................

Here is the list of actions.  "Arguments" and "pipelines" are
evaluations of data, defined in detail in the sections that follow.

'{{ }}'
     Empty action is discarded.  It may be useful to trim the preceding
     or following whitespace, as in

          {{- -}}

'{{/* a comment */}}'
     Comments are discarded.  They may span multiple lines of text.
     Comments do not nest and must start immediately after the opening
     delimiter (with optional dash and whitespace in between).  A
     comment may be followed by any action described below.

     Comments may be used to control trailing and leading whitespace as
     well:

          {{- a comment trimming the surrounding whitespace -}}

'{{ PIPELINE }}'
     The PIPELINE is evaluated, and the default textual representation
     of its value is copied to the output.

'{{if PIPELINE }} T1 {{end}}'
     If the value of the PIPELINE is empty, no output is generated;
     otherwise, T1 is executed.  The empty values are 'null', 'false',
     numeric 0, empty string ('""'), array ('[]'), or object ('{}').
     Dot is unaffected.

'{{if PIPELINE }} T1 {{else}} T0 {{end}}'
     If the value of the pipeline is empty, T0 is executed; otherwise,
     T1 is executed.  Dot is unaffected.

'{{if PIPELINE }} T1 {{else if PIPELINE }} T2 {{else}} T0 {{end}}'
     A shortcut to simplify writing the if-else chains.  Equivalent to
     (newlines added for readability):

          {{if PIPELINE }}
            T1
          {{else -}}
           {{if PIPELINE }}
             T2
           {{else}}
             T0
           {{end}}
          {{end}}

'{{range PIPELINE }} T1 {{end}}'
     The value of PIPELINE must be an object or array.  If it is of
     length zero, nothing is output.  Otherwise, dot is set to the
     successive elements of the array or object and T1 is executed.  For
     objects, the elements will be	visited in sorted key order.

'{{range PIPELINE }} T1 {{else}} T0 {{end}}'
     Same as above, except that if the value of the PIPELINE is of
     length zero, T0 is executed with dot unaffected.

     Within the '{{range}}' action, the following two keywords may
     appear:

     '{{break}}'
          The innermost '{{range PIPELINE}}' loop is ended early,
          stopping the current iteration and bypassing all remaining
          iterations.

     '{{continue}}'
          The current iteration of the innermost '{{range PIPELINE}}'
          loop is stopped, and the loop starts the next iteration.

'{{define "NAME"}} TEXT {{end}}'
     The TEXT is collected and stored for the further use as template
     with the given NAME.  It can be invoked using the '{{template}}'
     action (see below).

'{{template "NAME"}}'
     The template with the specified NAME (see the '{{define}}' above)
     is executed with dot set to 'null'.

'{{template "NAME" VALUE }}'
     The template with the specified NAME (see the '{{define}}' above)
     is executed with dot set to VALUE.

'{{block "NAME" PIPELINE }} T1 {{end}}'
     A block is shorthand for defining a template and then executing it
     in place:

          {{define "NAME"}} T1 {{end}}
          {{template "NAME" PIPELINE}}

'{{with PIPELINE }} T1 {{end}}'
     If the value of the PIPELINE is empty, no output is generated;
     otherwise, dot is set to the value of the PIPELINE and T1 is
     executed.

'{{with PIPELINE }} T1 {{else}} T0 {{end}}'
     Same as above, but if the value of the PIPELINE is empty, T0 is
     executed with dot unchanged.

10.5.1.2 Arguments
..................

An "argument" is a simple value, i.e.  any of the following:

   * Numeric value (integer or floating point)
   * Boolean value: 'true' or 'false'.
   * Quoted string.
   * A dot ('.') This represents the cursor value.
   * Attribute: '.ATTR' This is the value of the attribute ATTR in the
     current value (dot).  Attribute references can be nested, as in
     '.Attr.Xattr.Yattr'.
   * A variable reference: '$VAR'.  Here, VAR is the name of the
     variable defined in the 'range' action.  *Note Variables::, below.

   * Function call in parentheses, for grouping.

10.5.2 Pipelines
----------------

A "pipeline" is a series of one or more "commands" delimited by pipe
sign ('|').  Each "command" is either an argument or a "function call",
in form:

     FUNC ARG1 ARG2...

where FUNC is the name of one of the built-in functions discussed below.

   Pipelines are executed from left to right, with the result of the
previous command implicitly added to the list of arguments of each
subsequent command.  For example, the pipeline

     .attr | eq $x

is equivalent to

     eq $x .attr

i.e.  it calls the built-in function 'eq' with two arguments: the value
of the variable 'x' and attribute 'attr' of the cursor value.

   The following built-in functions are defined:

 -- Template built-in: and A1 A2
     Evaluates to 'true' if pipelines A1 and A2 both evaluate to 'true'.
     Notice, that there is no boolean shortcut evaluation: both
     pipelines are evaluated prior to calling 'and'.

 -- Template built-in: or A1 A2
     Evaluates to 'true' if at least one of the pipelines A1 and A2
     evaluates to 'true'.  Notice, that there is no boolean shortcut
     evaluation: both pipelines are evaluated prior to calling 'or'.

 -- Template built-in: index A1 A2...
     Returns the result of indexing its first argument by the following
     arguments.  Thus, if '.' is an array, then:

          index . 5

     evaluates to its fifth element ('.[5]').

 -- Template built-in: len A1
     Returns the integer length of its argument.

 -- Template built-in: not A1
     Returns 'true' if its argument evaluates to 'false'.

 -- Template built-in: eq A1 A2
     Returns 'true' if both its arguments are equal.  This applies only
     if both A1 and A2 are numeric or if they both are strings.

 -- Template built-in: ne A1 A2
     Returns 'true' if its arguments (both must be numeric or strings)
     are not equal.

 -- Template built-in: lt A1 A2
     Returns 'true' if A1 is numerically less than A2.

 -- Template built-in: le A1 A2
     Returns 'true' if A1 is numerically less than or equal to A2.

 -- Template built-in: gt A1 A2
     Returns 'true' if A1 is numerically greater than A2.

 -- Template built-in: ge A1 A2
     Returns 'true' if A1 is numerically greater than or equal to A2.

 -- Template built-in: even A1
     Returns 'true' if A1, which must evaluate to an integer value, is
     divisible by 2.

 -- Template built-in: printf FMT A1...
     Implements the 'printf' function.  FMT must evaluate to string.
     Rest of arguments is interpreted according to the conversion
     specifications in FMT.  The result is a formatted string.

     In addition to the standard conversion specifications, the '%v'
     specifier is implemented: it formats its argument in the best way,
     depending on its actual type.

 -- Template built-in: typeof A1
     Evaluates to the type of its argument, one of: 'null', 'bool',
     'number', 'integer', 'string', 'array', and 'object'.

 -- Template built-in: exists A1 A2
     A1 must evaluate to an object and A2 to string.  The function
     evaluates to 'true' if the attribute A2 is present in A1.

 -- Template built-in: add A1 A2...
     Returns the sum of its arguments.

 -- Template built-in: sub A1 A2
     Returns the difference 'A1 - A2'.

 -- Template built-in: mul A1 A2
     Multiplies A1 by A2.

 -- Template built-in: div A1 A2
     Divides A1 by A2.

10.5.3 Variables
----------------

Variables (referred to as '$NAME') can be defined in 'range' and 'with'
actions.  For 'range', the syntax is:

     {{range $INDEX, $ELEMENT = PIPELINE }} T1 {{end}}

where INDEX and ELEMENT are arbitrary variable names.  When executing
this action, during each iteration $INDEX and $ELEMENT are set to the
index (attribute name) and value of each successive element.  Dot
remains unaffected.

   For 'with', the syntax is:

     {{with $VAR = PIPELINE }} T1 {{end}}

   PIPELINE is evaluated, its result is assigned to $VAR and the T1
block is executed with dot unchanged.

   A variable's scope extends to the 'end' action of the control
structure ('with' or 'range') in which it is declared.  This includes
any nested statements that may appear in between.

10.5.4 Input object
-------------------

Depending on the request issued by 'poundctl', the invoked template can
receive as its argument ("dot") an object of the following types: "full
listing", "listener", "service", or "backend".

   Since there is no explicit indication of the object type being
passed, templates normally use heuristics based on the presence or
absence of certain attribute to deduce the object type in question.  The
recommended approach is described in the following pseudo-code fragment:

     {{if exists . "listeners" }}
       {{/* This is a full listing, as requested by poundctl list. */}}
       ...
     {{else if exists . "services"}}
       {{/* Single listener, as requested by poundctl list /L.
            Notice that this attribute is present in the full listing as
            well, so presence of "listeners" should be checked first. */}}
       ...
     {{else if exists . "backends"}}
       {{/* Single service, as requested by poundctl list /L/S. */}}
       ...
     {{else}}
       {{/* Backend listing (poundctl list /L/I/B) */}}
       ...
     {{end}}

   Structures of each object are discussed in subsections that follow.

10.5.4.1 Full listing
.....................

A full listing contains the following attributes:

'listeners'
     An array of "listener" objects.  See below for a description.

'services'
     An array of "service" objects, representing services defined in the
     global scope of the 'pound' configuration file.

'pid'
     PID of the running 'pound' daemon.

'version'
     'Pound' version number (string).

'workers'
     Workers statistics.  This is a JSON object with the following
     attributes:

     'active'
          Number of active threads.

     'count'
          Number of threads currently running.

     'max'
          Maximum number of threads.

     'min'
          Minimum number of threads.

     'timeout'
          Thread idle timeout.

'queue_len'
     Number of incoming HTTP requests in the queue (integer).

'timestamp'
     Current time on the server, formatted as ISO 8601 date-time with
     microsecond precision, e.g.: '2023-01-05T22:43:18.071559'.

10.5.4.2 Listener
.................

A "listener" object represents a single HTTP or HTTPS listener in
'pound' configuration.  It has the following attributes:

'address'
     Address of this listener.  A string formatted as 'IP:PORT'.  for
     IPv4 and IPv6 addresses or containing a socket file name, for UNIX
     sockets.

'protocol'
     Protocol used: either 'http' or 'https'.

'services'
     Array of "service" objects representing services defined in this
     listener.  See below for the definition of a "service" object.

'enabled'
     Boolean.  Whether this listener is enabled or not.

'nohttps11'
     Value of the 'NoHTTPS11' configuration statement for this listener
     (*note NoHTTPS11: ListenHTTPS.). One of: 0, 1, 2.

10.5.4.3 Service
................

A "service" object describes a single service.

'name'
     Symbolic name of this service.

'enabled'
     Boolean.  Whether this service is enabled or not.

'session_type'
     Name of the session handling algorithm for this service.  One of:
     'IP', 'BASIC', 'URL', 'PARM', 'COOKIE', 'HEADER'.

'sessions'
     List of active sessions in this service.  Each session is
     represented as object with the following attributes:

     'key'
          Session key (string).

     'backend'
          Ordinal number of the backend assigned to handle requests with
          this session.

     'expire'
          Expiration time of this session, formatted as
          '1970-01-01T00:00:00.000000' (with microsecond precision).

'backends'
     List of "backends" defined for this service.

'emergency'
     Emergency "backend" object, or 'null' if no such backend is
     defined.

10.5.4.4 Backend
................

The following attributes are always present in each "backend" object:

'alive'
     Whether or not this backend is alive.

'conn_to'
     Connection timeout for this backend (seconds).

'enabled'
     Whether or not this backend is enabled.

'io_to'
     I/O timeout for this backend (seconds).

'priority'
     Priority value assigned to this backend.

'protocol'
     Protocol used by this backend: either 'http' or 'https'.

'type'
     Backend type.  One of: 'acme', 'backend', 'control', 'redirect'.

'ws_to'
     Websocket timeout (seconds).

   Depending on the backend type, the following attributes may be
present:

'acme'
     An object of the following structure:

     'path'
          Directory where ACME challenges are stored.

'backend'
     Object:
     'address'
          Backend address.

'redirect'
     Object:
     'url'
          URL to redirect to.
     'code'
          HTTP code for redirection responses.  One of: 301, 302, 307.
     'redir_req'
          Boolean: whether to append the original request path to the
          resulting location.

   If backend statistics is enabled (*note BackendStats::), the 'stats'
object will be present, with the following attributes:

'request_count'
     Total number of requests processed by this backend.
'request_time_avg'
     Average time per request, in nanoseconds.
'request_time_stddev'
     Standard deviation of the above.

Appendix A Metric Families
**************************

This appendix describes metric families returned in the output of
"openmetrics" 'pound' backends (*note Metrics::).

 -- Metric family: gauge pound_workers
     Number of pound workers (*note Worker model::).  Indexed by types:

     'active'
          Number of workers currently active.
     'count'
          Number of workers running (both idle and active).
     'min'
          Minimum number of workers as set by the 'WorkerMinCount'
          configuration directive (*note WorkerMinCount: Global
          directives.).
     'max'
          Maximum number of workers as set by the 'WorkerMaxCount'
          configuration directive (*note WorkerMaxCount: Global
          directives.).

     Example:

          pound_workers{type="active"} 2
          pound_workers{type="count"} 5
          pound_workers{type="max"} 128
          pound_workers{type="min"} 5

 -- Metric family: stateset pound_listener_enabled
     State of a listener: enabled/disabled.  Indexed by the listener
     ordinal number.

          pound_listener_enabled{listener="0"} 1
          pound_listener_enabled{listener="1"} 0
          pound_listener_enabled{listener="2"} 1

 -- Metric family: info pound_listener_info
     Description of a listener.  Each instance contains the following
     indices:

     'listener'
          Listener ordinal number.

     'name'
          Listener name, as set in the 'ListenHTTP' or 'ListenHTTPS'
          statement (*note ListenHTTP::).

     'address'
          Listener address.  For INET family, it is formatted as
          'IP:PORT', for UNIX sockets, it is the pathname of the socket.

     'protocol'
          Either 'http' or 'https'.

     The value of this metrics is always '1'.

          pound_listener_info{listener="0",name="",address="/run/pound.sock",protocol="http"} 1
          pound_listener_info{listener="1",name="plain",address="0.0.0.0:80",protocol="http"} 1
          pound_listener_info{listener="2",name="tls",address="0.0.0.0:443",protocol="https"} 1

 -- Metric family: info pound_service_info
     Description of a service.  Indices:

     'listener'
          Listener ordinal number.  This index is absent for globally
          defined services.

     'service'
          Index of the service in listener (or in global configuration,
          for globally defined services).

     'name'
          Service name as set in the 'Service' definition (*note
          Service::).

          pound_service_info{listener="0",service="0",name=""} 1
          pound_service_info{listener="1",service="0",name=""} 1
          pound_service_info{listener="1",service="1",name="redirect"} 1
          pound_service_info{listener="2",service="0",name="metrics"} 1
          pound_service_info{listener="2",service="1",name="web"} 1
          pound_service_info{service="0",name="fallback"} 1

 -- Metric family: stateset pound_service_enabled
     State of a particular service.

          pound_service_enabled{listener="0",service="0"} 1
          pound_service_enabled{listener="1",service="0"} 1
          pound_service_enabled{listener="2",service="0"} 1
          pound_service_enabled{service="0"} 1

 -- Metric family: gauge pound_backends
     Number of backends per service: total, alive, enabled, and active
     (both alive and enabled).  Indices:

     'listener'
          Listener ordinal number.  This index is absent for globally
          defined services.

     'service'
          Index of the service in listener (or in global configuration,
          for globally defined services).

     'state'
          Backend state: 'total', 'alive', 'enabled', or 'active'.

     Example:

          pound_backends{listener="0",service="0",state="total"} 5
          pound_backends{listener="0",service="0",state="enabled"} 3
          pound_backends{listener="0",service="0",state="alive"} 3
          pound_backends{service="0",state="total"} 1
          pound_backends{service="0",state="enabled"} 1
          pound_backends{service="0",state="alive"} 1

 -- Metric family: stateset pound_backend_state
     State of each backend.  Indices:

     'listener'
          Listener ordinal number.  This index is absent for globally
          defined services.

     'service'
          Index of the service in listener (or in global configuration,
          for globally defined services).

     'backend'
          Index of the backend in service.

     'state'
          'enabled': whether the backend is enabled or not.
          'alive': whether the backend is alive or not.

     Example:

          pound_backend_state{listener="0",service="0",backend="0",state="alive"} 1
          pound_backend_state{listener="0",service="0",backend="0",state="enabled"} 1
          pound_backend_state{listener="0",service="0",backend="1",state="alive"} 1
          pound_backend_state{listener="0",service="0",backend="1",state="enabled"} 0

 -- Metric family: gauge pound_backend_requests
     Number of requests processed by backend.  This metrics is available
     only if backend statistics is enabled (*note BackendStats::).

     Example:

          pound_backend_requests{listener="0",service="0",backend="0"} 40587
          pound_backend_requests{listener="1",service="0",backend="0"} 13858

 -- Metric family: gauge pound_backend_request_time_avg_nanoseconds
     Average time per request spent in backend (nanoseconds).  This
     metrics is available only if backend statistics is enabled (*note
     BackendStats::).

          pound_backend_request_time_avg_nanoseconds{listener="0",service="0",backend="0"} 156254
          pound_backend_request_time_avg_nanoseconds{listener="1",service="2",backend="0"} 26147

 -- Metric family: gauge pound_backend_request_stddev_nanoseconds
     Standard deviation of the average time per request.  This metrics
     is available only if backend statistics is enabled (*note
     BackendStats::).

          pound_backend_request_stddev_nanoseconds{listener="0",service="0",backend="0"} 0
          pound_backend_request_stddev_nanoseconds{listener="1",service="2",backend="0"} 59

Appendix B Time and Date Formats
********************************

This appendix documents the time format specifications understood by the
'%{FORMAT}t' log format conversion.  Essentially, it is a reproduction
of the man page for GNU 'strftime' function.

   Ordinary characters placed in the format string are reproduced
without conversion.  Conversion specifiers are introduced by a '%'
character, and are replaced as follows:

%a             The abbreviated weekday name according to the
               current locale.
               
%A             The full weekday name according to the current
               locale.
               
%b             The abbreviated month name according to the
               current locale.
               
%B             The full month name according to the current
               locale.
               
               
%c             The preferred date and time representation for
               the current locale.
               
%C             The century number (year/100) as a 2-digit
               integer.
               
%d             The day of the month as a decimal number (range
               01 to 31).
               
%D             Equivalent to '%m/%d/%y'.
               
%e             Like '%d', the day of the month as a decimal
               number, but a leading zero is replaced by a
               space.
               
%E             Modifier: use alternative format, see below
               (*note conversion specs::).
               
%F             Equivalent to '%Y-%m-%d' (the ISO 8601 date
               format).
               
%G             The ISO 8601 year with century as a decimal
               number.  The 4-digit year corresponding to the
               ISO week number (see '%V').  This has the same
               format and value as '%y', except that if the ISO
               week number belongs to the previous or next
               year, that year is used instead.
               
%g             Like '%G', but without century, i.e., with a
               2-digit year (00-99).
               
%h             Equivalent to '%b'.
               
%H             The hour as a decimal number using a 24-hour
               clock (range 00 to 23).
               
%I             The hour as a decimal number using a 12-hour
               clock (range 01 to 12).
               
%j             The day of the year as a decimal number (range
               001 to 366).
               
%k             The hour (24-hour clock) as a decimal number
               (range 0 to 23); single digits are preceded by a
               blank.  (See also '%H'.)
               
%l             The hour (12-hour clock) as a decimal number
               (range 1 to 12); single digits are preceded by a
               blank.  (See also '%I'.)
               
%m             The month as a decimal number (range 01 to 12).
               
%M             The minute as a decimal number (range 00 to 59).
               
%n             A newline character.
               
%O             Modifier: use alternative format, see below
               (*note conversion specs::).
               
%p             Either 'AM' or 'PM' according to the given time
               value, or the corresponding strings for the
               current locale.  Noon is treated as 'pm' and
               midnight as 'am'.
               
%P             Like '%p' but in lowercase: 'am' or 'pm' or a
               corresponding string for the current locale.
               
%r             The time in 'a.m.' or 'p.m.' notation.  In the
               POSIX locale this is equivalent to '%I:%M:%S
               %p'.
               
%R             The time in 24-hour notation ('%H:%M').  For a
               version including the seconds, see '%T' below.
               
               
%s             The number of seconds since the Epoch, i.e.,
               since 1970-01-01 00:00:00 UTC.
               
%S             The second as a decimal number (range 00 to 61).
               
%t             A tab character.
               
%T             The time in 24-hour notation ('%H:%M:%S').
               
%u             The day of the week as a decimal, range 1 to 7,
               Monday being 1.  See also '%w'.
               
%U             The week number of the current year as a decimal
               number, range 00 to 53, starting with the first
               Sunday as the first day of week 01.  See also
               '%V' and '%W'.
               
%V             The ISO 8601:1988 week number of the current
               year as a decimal number, range 01 to 53, where
               week 1 is the first week that has at least 4
               days in the current year, and with Monday as the
               first day of the week.  See also '%U' and '%W'.
               
%w             The day of the week as a decimal, range 0 to 6,
               Sunday being 0.  See also '%u'.
               
%W             The week number of the current year as a decimal
               number, range 00 to 53, starting with the first
               Monday as the first day of week 01.
               
%x             The preferred date representation for the
               current locale without the time.
               
%X             The preferred time representation for the
               current locale without the date.
               
%y             The year as a decimal number without a century
               (range 00 to 99).
               
%Y             The year as a decimal number including the
               century.
               
%z             The time-zone as hour offset from GMT.  Required
               to emit RFC822-conformant dates (using '%a, %d
               %b %Y %H:%M:%S %z')
               
%Z             The time zone or name or abbreviation.
               
%+             The date and time in 'date(1)' format.
               
%%             A literal '%' character.

   Some conversion specifiers can be modified by preceding them by the
'E' or 'O' modifier to indicate that an alternative format should be
used.  If the alternative format or specification does not exist for the
current locale, the behaviour will be as if the unmodified conversion
specification were used.  The Single Unix Specification mentions '%Ec',
'%EC', '%Ex', '%EX', '%Ry', '%EY', '%Od', '%Oe', '%OH', '%OI', '%Om',
'%OM', '%OS', '%Ou', '%OU', '%OV', '%Ow', '%OW', '%Oy', where the effect
of the 'O' modifier is to use alternative numeric symbols (say, roman
numerals), and that of the 'E' modifier is to use a locale-dependent
alternative representation.

Appendix C GNU Free Documentation License
*****************************************

                     Version 1.3, 3 November 2008

     Copyright (C) 2000, 2001, 2002, 2007, 2008 Free Software Foundation, Inc.
     <https://fsf.org/>

     Everyone is permitted to copy and distribute verbatim copies
     of this license document, but changing it is not allowed.

  0. PREAMBLE

     The purpose of this License is to make a manual, textbook, or other
     functional and useful document "free" in the sense of freedom: to
     assure everyone the effective freedom to copy and redistribute it,
     with or without modifying it, either commercially or
     noncommercially.  Secondarily, this License preserves for the
     author and publisher a way to get credit for their work, while not
     being considered responsible for modifications made by others.

     This License is a kind of "copyleft", which means that derivative
     works of the document must themselves be free in the same sense.
     It complements the GNU General Public License, which is a copyleft
     license designed for free software.

     We have designed this License in order to use it for manuals for
     free software, because free software needs free documentation: a
     free program should come with manuals providing the same freedoms
     that the software does.  But this License is not limited to
     software manuals; it can be used for any textual work, regardless
     of subject matter or whether it is published as a printed book.  We
     recommend this License principally for works whose purpose is
     instruction or reference.

  1. APPLICABILITY AND DEFINITIONS

     This License applies to any manual or other work, in any medium,
     that contains a notice placed by the copyright holder saying it can
     be distributed under the terms of this License.  Such a notice
     grants a world-wide, royalty-free license, unlimited in duration,
     to use that work under the conditions stated herein.  The
     "Document", below, refers to any such manual or work.  Any member
     of the public is a licensee, and is addressed as "you".  You accept
     the license if you copy, modify or distribute the work in a way
     requiring permission under copyright law.

     A "Modified Version" of the Document means any work containing the
     Document or a portion of it, either copied verbatim, or with
     modifications and/or translated into another language.

     A "Secondary Section" is a named appendix or a front-matter section
     of the Document that deals exclusively with the relationship of the
     publishers or authors of the Document to the Document's overall
     subject (or to related matters) and contains nothing that could
     fall directly within that overall subject.  (Thus, if the Document
     is in part a textbook of mathematics, a Secondary Section may not
     explain any mathematics.)  The relationship could be a matter of
     historical connection with the subject or with related matters, or
     of legal, commercial, philosophical, ethical or political position
     regarding them.

     The "Invariant Sections" are certain Secondary Sections whose
     titles are designated, as being those of Invariant Sections, in the
     notice that says that the Document is released under this License.
     If a section does not fit the above definition of Secondary then it
     is not allowed to be designated as Invariant.  The Document may
     contain zero Invariant Sections.  If the Document does not identify
     any Invariant Sections then there are none.

     The "Cover Texts" are certain short passages of text that are
     listed, as Front-Cover Texts or Back-Cover Texts, in the notice
     that says that the Document is released under this License.  A
     Front-Cover Text may be at most 5 words, and a Back-Cover Text may
     be at most 25 words.

     A "Transparent" copy of the Document means a machine-readable copy,
     represented in a format whose specification is available to the
     general public, that is suitable for revising the document
     straightforwardly with generic text editors or (for images composed
     of pixels) generic paint programs or (for drawings) some widely
     available drawing editor, and that is suitable for input to text
     formatters or for automatic translation to a variety of formats
     suitable for input to text formatters.  A copy made in an otherwise
     Transparent file format whose markup, or absence of markup, has
     been arranged to thwart or discourage subsequent modification by
     readers is not Transparent.  An image format is not Transparent if
     used for any substantial amount of text.  A copy that is not
     "Transparent" is called "Opaque".

     Examples of suitable formats for Transparent copies include plain
     ASCII without markup, Texinfo input format, LaTeX input format,
     SGML or XML using a publicly available DTD, and standard-conforming
     simple HTML, PostScript or PDF designed for human modification.
     Examples of transparent image formats include PNG, XCF and JPG.
     Opaque formats include proprietary formats that can be read and
     edited only by proprietary word processors, SGML or XML for which
     the DTD and/or processing tools are not generally available, and
     the machine-generated HTML, PostScript or PDF produced by some word
     processors for output purposes only.

     The "Title Page" means, for a printed book, the title page itself,
     plus such following pages as are needed to hold, legibly, the
     material this License requires to appear in the title page.  For
     works in formats which do not have any title page as such, "Title
     Page" means the text near the most prominent appearance of the
     work's title, preceding the beginning of the body of the text.

     The "publisher" means any person or entity that distributes copies
     of the Document to the public.

     A section "Entitled XYZ" means a named subunit of the Document
     whose title either is precisely XYZ or contains XYZ in parentheses
     following text that translates XYZ in another language.  (Here XYZ
     stands for a specific section name mentioned below, such as
     "Acknowledgements", "Dedications", "Endorsements", or "History".)
     To "Preserve the Title" of such a section when you modify the
     Document means that it remains a section "Entitled XYZ" according
     to this definition.

     The Document may include Warranty Disclaimers next to the notice
     which states that this License applies to the Document.  These
     Warranty Disclaimers are considered to be included by reference in
     this License, but only as regards disclaiming warranties: any other
     implication that these Warranty Disclaimers may have is void and
     has no effect on the meaning of this License.

  2. VERBATIM COPYING

     You may copy and distribute the Document in any medium, either
     commercially or noncommercially, provided that this License, the
     copyright notices, and the license notice saying this License
     applies to the Document are reproduced in all copies, and that you
     add no other conditions whatsoever to those of this License.  You
     may not use technical measures to obstruct or control the reading
     or further copying of the copies you make or distribute.  However,
     you may accept compensation in exchange for copies.  If you
     distribute a large enough number of copies you must also follow the
     conditions in section 3.

     You may also lend copies, under the same conditions stated above,
     and you may publicly display copies.

  3. COPYING IN QUANTITY

     If you publish printed copies (or copies in media that commonly
     have printed covers) of the Document, numbering more than 100, and
     the Document's license notice requires Cover Texts, you must
     enclose the copies in covers that carry, clearly and legibly, all
     these Cover Texts: Front-Cover Texts on the front cover, and
     Back-Cover Texts on the back cover.  Both covers must also clearly
     and legibly identify you as the publisher of these copies.  The
     front cover must present the full title with all words of the title
     equally prominent and visible.  You may add other material on the
     covers in addition.  Copying with changes limited to the covers, as
     long as they preserve the title of the Document and satisfy these
     conditions, can be treated as verbatim copying in other respects.

     If the required texts for either cover are too voluminous to fit
     legibly, you should put the first ones listed (as many as fit
     reasonably) on the actual cover, and continue the rest onto
     adjacent pages.

     If you publish or distribute Opaque copies of the Document
     numbering more than 100, you must either include a machine-readable
     Transparent copy along with each Opaque copy, or state in or with
     each Opaque copy a computer-network location from which the general
     network-using public has access to download using public-standard
     network protocols a complete Transparent copy of the Document, free
     of added material.  If you use the latter option, you must take
     reasonably prudent steps, when you begin distribution of Opaque
     copies in quantity, to ensure that this Transparent copy will
     remain thus accessible at the stated location until at least one
     year after the last time you distribute an Opaque copy (directly or
     through your agents or retailers) of that edition to the public.

     It is requested, but not required, that you contact the authors of
     the Document well before redistributing any large number of copies,
     to give them a chance to provide you with an updated version of the
     Document.

  4. MODIFICATIONS

     You may copy and distribute a Modified Version of the Document
     under the conditions of sections 2 and 3 above, provided that you
     release the Modified Version under precisely this License, with the
     Modified Version filling the role of the Document, thus licensing
     distribution and modification of the Modified Version to whoever
     possesses a copy of it.  In addition, you must do these things in
     the Modified Version:

       A. Use in the Title Page (and on the covers, if any) a title
          distinct from that of the Document, and from those of previous
          versions (which should, if there were any, be listed in the
          History section of the Document).  You may use the same title
          as a previous version if the original publisher of that
          version gives permission.

       B. List on the Title Page, as authors, one or more persons or
          entities responsible for authorship of the modifications in
          the Modified Version, together with at least five of the
          principal authors of the Document (all of its principal
          authors, if it has fewer than five), unless they release you
          from this requirement.

       C. State on the Title page the name of the publisher of the
          Modified Version, as the publisher.

       D. Preserve all the copyright notices of the Document.

       E. Add an appropriate copyright notice for your modifications
          adjacent to the other copyright notices.

       F. Include, immediately after the copyright notices, a license
          notice giving the public permission to use the Modified
          Version under the terms of this License, in the form shown in
          the Addendum below.

       G. Preserve in that license notice the full lists of Invariant
          Sections and required Cover Texts given in the Document's
          license notice.

       H. Include an unaltered copy of this License.

       I. Preserve the section Entitled "History", Preserve its Title,
          and add to it an item stating at least the title, year, new
          authors, and publisher of the Modified Version as given on the
          Title Page.  If there is no section Entitled "History" in the
          Document, create one stating the title, year, authors, and
          publisher of the Document as given on its Title Page, then add
          an item describing the Modified Version as stated in the
          previous sentence.

       J. Preserve the network location, if any, given in the Document
          for public access to a Transparent copy of the Document, and
          likewise the network locations given in the Document for
          previous versions it was based on.  These may be placed in the
          "History" section.  You may omit a network location for a work
          that was published at least four years before the Document
          itself, or if the original publisher of the version it refers
          to gives permission.

       K. For any section Entitled "Acknowledgements" or "Dedications",
          Preserve the Title of the section, and preserve in the section
          all the substance and tone of each of the contributor
          acknowledgements and/or dedications given therein.

       L. Preserve all the Invariant Sections of the Document, unaltered
          in their text and in their titles.  Section numbers or the
          equivalent are not considered part of the section titles.

       M. Delete any section Entitled "Endorsements".  Such a section
          may not be included in the Modified Version.

       N. Do not retitle any existing section to be Entitled
          "Endorsements" or to conflict in title with any Invariant
          Section.

       O. Preserve any Warranty Disclaimers.

     If the Modified Version includes new front-matter sections or
     appendices that qualify as Secondary Sections and contain no
     material copied from the Document, you may at your option designate
     some or all of these sections as invariant.  To do this, add their
     titles to the list of Invariant Sections in the Modified Version's
     license notice.  These titles must be distinct from any other
     section titles.

     You may add a section Entitled "Endorsements", provided it contains
     nothing but endorsements of your Modified Version by various
     parties--for example, statements of peer review or that the text
     has been approved by an organization as the authoritative
     definition of a standard.

     You may add a passage of up to five words as a Front-Cover Text,
     and a passage of up to 25 words as a Back-Cover Text, to the end of
     the list of Cover Texts in the Modified Version.  Only one passage
     of Front-Cover Text and one of Back-Cover Text may be added by (or
     through arrangements made by) any one entity.  If the Document
     already includes a cover text for the same cover, previously added
     by you or by arrangement made by the same entity you are acting on
     behalf of, you may not add another; but you may replace the old
     one, on explicit permission from the previous publisher that added
     the old one.

     The author(s) and publisher(s) of the Document do not by this
     License give permission to use their names for publicity for or to
     assert or imply endorsement of any Modified Version.

  5. COMBINING DOCUMENTS

     You may combine the Document with other documents released under
     this License, under the terms defined in section 4 above for
     modified versions, provided that you include in the combination all
     of the Invariant Sections of all of the original documents,
     unmodified, and list them all as Invariant Sections of your
     combined work in its license notice, and that you preserve all
     their Warranty Disclaimers.

     The combined work need only contain one copy of this License, and
     multiple identical Invariant Sections may be replaced with a single
     copy.  If there are multiple Invariant Sections with the same name
     but different contents, make the title of each such section unique
     by adding at the end of it, in parentheses, the name of the
     original author or publisher of that section if known, or else a
     unique number.  Make the same adjustment to the section titles in
     the list of Invariant Sections in the license notice of the
     combined work.

     In the combination, you must combine any sections Entitled
     "History" in the various original documents, forming one section
     Entitled "History"; likewise combine any sections Entitled
     "Acknowledgements", and any sections Entitled "Dedications".  You
     must delete all sections Entitled "Endorsements."

  6. COLLECTIONS OF DOCUMENTS

     You may make a collection consisting of the Document and other
     documents released under this License, and replace the individual
     copies of this License in the various documents with a single copy
     that is included in the collection, provided that you follow the
     rules of this License for verbatim copying of each of the documents
     in all other respects.

     You may extract a single document from such a collection, and
     distribute it individually under this License, provided you insert
     a copy of this License into the extracted document, and follow this
     License in all other respects regarding verbatim copying of that
     document.

  7. AGGREGATION WITH INDEPENDENT WORKS

     A compilation of the Document or its derivatives with other
     separate and independent documents or works, in or on a volume of a
     storage or distribution medium, is called an "aggregate" if the
     copyright resulting from the compilation is not used to limit the
     legal rights of the compilation's users beyond what the individual
     works permit.  When the Document is included in an aggregate, this
     License does not apply to the other works in the aggregate which
     are not themselves derivative works of the Document.

     If the Cover Text requirement of section 3 is applicable to these
     copies of the Document, then if the Document is less than one half
     of the entire aggregate, the Document's Cover Texts may be placed
     on covers that bracket the Document within the aggregate, or the
     electronic equivalent of covers if the Document is in electronic
     form.  Otherwise they must appear on printed covers that bracket
     the whole aggregate.

  8. TRANSLATION

     Translation is considered a kind of modification, so you may
     distribute translations of the Document under the terms of section
     4.  Replacing Invariant Sections with translations requires special
     permission from their copyright holders, but you may include
     translations of some or all Invariant Sections in addition to the
     original versions of these Invariant Sections.  You may include a
     translation of this License, and all the license notices in the
     Document, and any Warranty Disclaimers, provided that you also
     include the original English version of this License and the
     original versions of those notices and disclaimers.  In case of a
     disagreement between the translation and the original version of
     this License or a notice or disclaimer, the original version will
     prevail.

     If a section in the Document is Entitled "Acknowledgements",
     "Dedications", or "History", the requirement (section 4) to
     Preserve its Title (section 1) will typically require changing the
     actual title.

  9. TERMINATION

     You may not copy, modify, sublicense, or distribute the Document
     except as expressly provided under this License.  Any attempt
     otherwise to copy, modify, sublicense, or distribute it is void,
     and will automatically terminate your rights under this License.

     However, if you cease all violation of this License, then your
     license from a particular copyright holder is reinstated (a)
     provisionally, unless and until the copyright holder explicitly and
     finally terminates your license, and (b) permanently, if the
     copyright holder fails to notify you of the violation by some
     reasonable means prior to 60 days after the cessation.

     Moreover, your license from a particular copyright holder is
     reinstated permanently if the copyright holder notifies you of the
     violation by some reasonable means, this is the first time you have
     received notice of violation of this License (for any work) from
     that copyright holder, and you cure the violation prior to 30 days
     after your receipt of the notice.

     Termination of your rights under this section does not terminate
     the licenses of parties who have received copies or rights from you
     under this License.  If your rights have been terminated and not
     permanently reinstated, receipt of a copy of some or all of the
     same material does not give you any rights to use it.

  10. FUTURE REVISIONS OF THIS LICENSE

     The Free Software Foundation may publish new, revised versions of
     the GNU Free Documentation License from time to time.  Such new
     versions will be similar in spirit to the present version, but may
     differ in detail to address new problems or concerns.  See
     <https://www.gnu.org/licenses/>.

     Each version of the License is given a distinguishing version
     number.  If the Document specifies that a particular numbered
     version of this License "or any later version" applies to it, you
     have the option of following the terms and conditions either of
     that specified version or of any later version that has been
     published (not as a draft) by the Free Software Foundation.  If the
     Document does not specify a version number of this License, you may
     choose any version ever published (not as a draft) by the Free
     Software Foundation.  If the Document specifies that a proxy can
     decide which future versions of this License can be used, that
     proxy's public statement of acceptance of a version permanently
     authorizes you to choose that version for the Document.

  11. RELICENSING

     "Massive Multiauthor Collaboration Site" (or "MMC Site") means any
     World Wide Web server that publishes copyrightable works and also
     provides prominent facilities for anybody to edit those works.  A
     public wiki that anybody can edit is an example of such a server.
     A "Massive Multiauthor Collaboration" (or "MMC") contained in the
     site means any set of copyrightable works thus published on the MMC
     site.

     "CC-BY-SA" means the Creative Commons Attribution-Share Alike 3.0
     license published by Creative Commons Corporation, a not-for-profit
     corporation with a principal place of business in San Francisco,
     California, as well as future copyleft versions of that license
     published by that same organization.

     "Incorporate" means to publish or republish a Document, in whole or
     in part, as part of another Document.

     An MMC is "eligible for relicensing" if it is licensed under this
     License, and if all works that were first published under this
     License somewhere other than this MMC, and subsequently
     incorporated in whole or in part into the MMC, (1) had no cover
     texts or invariant sections, and (2) were thus incorporated prior
     to November 1, 2008.

     The operator of an MMC Site may republish an MMC contained in the
     site under CC-BY-SA on the same site at any time before August 1,
     2009, provided the MMC is eligible for relicensing.

ADDENDUM: How to use this License for your documents
====================================================

To use this License in a document you have written, include a copy of
the License in the document and put the following copyright and license
notices just after the title page:

       Copyright (C)  YEAR  YOUR NAME.
       Permission is granted to copy, distribute and/or modify this document
       under the terms of the GNU Free Documentation License, Version 1.3
       or any later version published by the Free Software Foundation;
       with no Invariant Sections, no Front-Cover Texts, and no Back-Cover
       Texts.  A copy of the license is included in the section entitled ``GNU
       Free Documentation License''.

   If you have Invariant Sections, Front-Cover Texts and Back-Cover
Texts, replace the "with...Texts." line with this:

         with the Invariant Sections being LIST THEIR TITLES, with
         the Front-Cover Texts being LIST, and with the Back-Cover Texts
         being LIST.

   If you have Invariant Sections without Cover Texts, or some other
combination of the three, merge those two alternatives to suit the
situation.

   If your document contains nontrivial examples of program code, we
recommend releasing these examples in parallel under your choice of free
software license, such as the GNU General Public License, to permit
their use in free software.

Index
*****

* Menu:

* %%:                                    Logging.            (line 1618)
* %>s:                                   Logging.            (line 1727)
* %a:                                    Logging.            (line 1621)
* %A:                                    Logging.            (line 1665)
* %B:                                    Logging.            (line 1668)
* %b:                                    Logging.            (line 1671)
* %D:                                    Logging.            (line 1675)
* %h:                                    Logging.            (line 1678)
* %H:                                    Logging.            (line 1681)
* %m:                                    Logging.            (line 1707)
* %P:                                    Logging.            (line 1714)
* %q:                                    Logging.            (line 1717)
* %r:                                    Logging.            (line 1721)
* %s:                                    Logging.            (line 1724)
* %t:                                    Logging.            (line 1730)
* %T:                                    Logging.            (line 1754)
* %u:                                    Logging.            (line 1764)
* %U:                                    Logging.            (line 1767)
* %v:                                    Logging.            (line 1771)
* %{FORMAT}t:                            Logging.            (line 1734)
* %{HDR}i:                               Logging.            (line 1684)
* %{HDR}I:                               Logging.            (line 1688)
* %{OBJ}L:                               Logging.            (line 1692)
* %{OBJ}N:                               Logging.            (line 1710)
* %{UNIT}T:                              Logging.            (line 1757)
* -beg, DeleteHeader option:             Request Modification.
                                                             (line 2755)
* -beg, header matching flag:            Rewrite.            (line 2929)
* -c:                                    Usage.              (line  260)
* -C, poundctl:                          poundctl options.   (line 4173)
* -case, DeleteHeader option:            Request Modification.
                                                             (line 2759)
* -case, header matching flag:           Rewrite.            (line 2933)
* -contain, DeleteHeader option:         Request Modification.
                                                             (line 2761)
* -contain, header matching flag:        Rewrite.            (line 2935)
* -e:                                    Usage.              (line  264)
* -end, DeleteHeader option:             Request Modification.
                                                             (line 2764)
* -end, header matching flag:            Rewrite.            (line 2938)
* -exact, DeleteHeader option:           Request Modification.
                                                             (line 2766)
* -exact, header matching flag:          Rewrite.            (line 2940)
* -F:                                    Usage.              (line  270)
* -f:                                    Usage.              (line  277)
* -f, poundctl:                          poundctl options.   (line 4179)
* -file:                                 ACL.                (line  588)
* -file, header matching flag:           Rewrite.            (line 2942)
* -filewatch:                            ACL.                (line  607)
* -h:                                    Usage.              (line  281)
* -h, poundctl:                          poundctl options.   (line 4199)
* -i, poundctl:                          poundctl options.   (line 4183)
* -icase, DeleteHeader option:           Request Modification.
                                                             (line 2768)
* -icase, header matching flag:          Rewrite.            (line 2951)
* -j, poundctl:                          poundctl options.   (line 4186)
* -k:                                    poundctl options.   (line 4194)
* -K, poundctl:                          poundctl options.   (line 4189)
* -p:                                    Usage.              (line  284)
* -pcre, DeleteHeader option:            Request Modification.
                                                             (line 2770)
* -pcre, header matching flag:           Rewrite.            (line 2953)
* -perl, DeleteHeader option:            Request Modification.
                                                             (line 2773)
* -perl, header matching flag:           Rewrite.            (line 2956)
* -posix, DeleteHeader option:           Request Modification.
                                                             (line 2775)
* -posix, header matching flag:          Rewrite.            (line 2958)
* -re, DeleteHeader option:              Request Modification.
                                                             (line 2778)
* -re, header matching flag:             Rewrite.            (line 2961)
* -S, poundctl:                          poundctl options.   (line 4202)
* -s, poundctl:                          poundctl options.   (line 4206)
* -S, poundctl option:                   multiple servers.   (line 4131)
* -T, poundctl:                          poundctl options.   (line 4212)
* -t, poundctl:                          poundctl options.   (line 4216)
* -v:                                    Usage.              (line  289)
* -V:                                    Usage.              (line  300)
* -V, poundctl:                          poundctl options.   (line 4221)
* -v, poundctl:                          poundctl options.   (line 4224)
* -W:                                    Usage.              (line  306)
* .poundctl:                             poundctl config.    (line 4070)
* /etc/services:                         Listener address.   (line 2531)
* 400:                                   Error definitions.  (line 2622)
* 401:                                   Error definitions.  (line 2627)
* 403:                                   Error definitions.  (line 2634)
* 404:                                   Error definitions.  (line 2639)
* 405:                                   Error definitions.  (line 2643)
* 413:                                   Error definitions.  (line 2648)
* 414:                                   Error definitions.  (line 2653)
* 500:                                   Error definitions.  (line 2658)
* 501:                                   Error definitions.  (line 2663)
* 503:                                   Error definitions.  (line 2667)
* A record, DNS:                         Dynamic backends.   (line 1359)
* AAAA record, DNS:                      Dynamic backends.   (line 1359)
* ACL:                                   ACL.                (line  567)
* ACL <1>:                               ACL definition.     (line 2219)
* ACL <2>:                               Rewrite.            (line 2829)
* ACL <3>:                               Rewrite.            (line 2836)
* ACL <4>:                               Rewrite.            (line 2847)
* ACL <5>:                               Rewrite.            (line 2848)
* ACL <6>:                               Service Selection Statements.
                                                             (line 3283)
* ACL <7>:                               Service Selection Statements.
                                                             (line 3290)
* ACME:                                  Service definitions.
                                                             (line 3125)
* add:                                   poundctl commands.  (line 4036)
* add <1>:                               Pipelines.          (line 4521)
* AddHeader:                             Request Modification.
                                                             (line 2733)
* AddHeader <1>:                         Service Request and Response Modification.
                                                             (line 3418)
* Address:                               Listener address.   (line 2521)
* Address <1>:                           Backend.            (line 3542)
* Alive:                                 Timeouts.           (line 2450)
* all:                                   Dynamic backends.   (line 1430)
* all, log suppression:                  Service Logging.    (line 3512)
* and:                                   Pipelines.          (line 4456)
* and, logical:                          Service selection.  (line  517)
* Anonymise:                             Logging configuration.
                                                             (line 2340)
* Anonymize:                             Logging configuration.
                                                             (line 2341)
* any:                                   Dynamic backends.   (line 1448)
* Apsis:                                 Overview.           (line  116)
* authentication, basic:                 Authentication.     (line  836)
* backend:                               Introduction.       (line  188)
* Backend:                               Backend.            (line 3526)
* backend, external:                     Redirects.          (line  907)
* backend, regular:                      Introduction.       (line  188)
* backend, special:                      Redirects.          (line  907)
* backends, dynamic:                     Dynamic backends.   (line 1347)
* BackendStats:                          Proxy Tuning.       (line 2070)
* backreference expansion:               Request modifications.
                                                             (line  715)
* Balancer:                              Balancer.           (line 1218)
* Balancer <1>:                          Proxy Tuning.       (line 2081)
* Balancer <2>:                          Other Statements.   (line 3868)
* balancer group:                        Balancer groups.    (line 1324)
* balancing:                             Balancer.           (line 1158)
* balancing strategy:                    Balancer.           (line 1166)
* basic authentication:                  Authentication.     (line  836)
* BASIC, session type:                   Session.            (line 3826)
* BasicAuth:                             Authentication.     (line  849)
* BasicAuth <1>:                         Rewrite.            (line 2862)
* BasicAuth <2>:                         Service Selection Statements.
                                                             (line 3301)
* boolean value, configuration file:     Lexical structure.  (line 1833)
* CAFile:                                poundctl config.    (line 4104)
* CAFile <1>:                            multiple servers.   (line 4154)
* CAlist:                                ListenHTTPS.        (line 3219)
* CAPath:                                poundctl config.    (line 4108)
* CAPath <1>:                            multiple servers.   (line 4157)
* case insensitive match, DeleteHeader:  Request Modification.
                                                             (line 2759)
* case insensitive match, headers:       Rewrite.            (line 2933)
* case sensitive match, DeleteHeader:    Request Modification.
                                                             (line 2768)
* case sensitive match, headers:         Rewrite.            (line 2951)
* Cert:                                  ListenHTTPS.        (line 3151)
* Cert <1>:                              Backend.            (line 3651)
* challenge directory, ACME:             ACME.               (line 1056)
* challenges, ACME:                      ACME.               (line 1049)
* ChangeOwner:                           Management interface.
                                                             (line 2374)
* CheckURL:                              Listener-specific limits.
                                                             (line 2567)
* Ciphers:                               ListenHTTPS.        (line 3198)
* Ciphers <1>:                           Backend.            (line 3656)
* Client:                                Timeouts.           (line 2458)
* Client <1>:                            Listener-specific limits.
                                                             (line 2546)
* ClientCert:                            ListenHTTPS.        (line 3173)
* ClientCert <1>:                        Service Selection Statements.
                                                             (line 3314)
* ClientCert <2>:                        poundctl config.    (line 4111)
* ClientCert <3>:                        multiple servers.   (line 4160)
* clterr, log suppression:               Service Logging.    (line 3504)
* CNAME chains:                          resolver.           (line 3901)
* CNAMEChain:                            resolver.           (line 3900)
* combined:                              Logging.            (line 1594)
* combined, built-in format:             Logging.            (line 1795)
* CombineHeaders:                        Proxy Tuning.       (line 2141)
* comments, configuration file:          Lexical structure.  (line 1819)
* compound statement:                    Syntax.             (line 1882)
* conditions, joining:                   Service selection.  (line  492)
* ConfigFile:                            resolver.           (line 3910)
* ConfigText:                            resolver.           (line 3914)
* conjunction, implicit:                 Service selection.  (line  492)
* conjunction, logical:                  Service selection.  (line  517)
* ConnTO:                                Timeouts.           (line 2471)
* ConnTO <1>:                            Backend.            (line 3633)
* Control:                               Service Control.    (line 2390)
* Control <1>:                           Management interface.
                                                             (line 2358)
* Control <2>:                           Special Backends.   (line 3766)
* control socket:                        Management interface.
                                                             (line 2354)
* COOKIE, session type:                  Session.            (line 3841)
* CRLlist:                               ListenHTTPS.        (line 3235)
* custom log format:                     Logging.            (line 1601)
* Daemon:                                Runtime directives. (line 1990)
* Debug:                                 resolver.           (line 3929)
* delete:                                poundctl commands.  (line 4032)
* DeleteHeader:                          Request Modification.
                                                             (line 2742)
* DeleteHeader <1>:                      rewrite response.   (line 3076)
* DeleteHeader <2>:                      Service Request and Response Modification.
                                                             (line 3427)
* detailed:                              Logging.            (line 1598)
* detailed, built-in format:             Logging.            (line 1799)
* directive:                             Syntax.             (line 1872)
* Disable:                               ListenHTTPS.        (line 3186)
* Disable <1>:                           Backend.            (line 3662)
* disable:                               poundctl commands.  (line 4024)
* disable <1>:                           poundctl commands.  (line 4025)
* disable <2>:                           poundctl commands.  (line 4026)
* Disabled:                              Backend.            (line 3549)
* Disabled <1>:                          Other Statements.   (line 3862)
* disjunction, logical:                  Service selection.  (line  509)
* div:                                   Pipelines.          (line 4530)
* dns:                                   Usage.              (line  317)
* dynamic backends:                      Dynamic backends.   (line 1347)
* ECDHcurve:                             SSL Settings.       (line 2182)
* Emergency:                             Special Backends.   (line 3794)
* enable:                                poundctl commands.  (line 4016)
* enable <1>:                            poundctl commands.  (line 4017)
* enable <2>:                            poundctl commands.  (line 4018)
* eq:                                    Pipelines.          (line 4480)
* Err400:                                Error definitions.  (line 2608)
* Err401:                                Error definitions.  (line 2608)
* Err403:                                Error definitions.  (line 2608)
* Err404:                                Error definitions.  (line 2608)
* Err413:                                Error definitions.  (line 2608)
* Err414:                                Error definitions.  (line 2608)
* Err500:                                Error definitions.  (line 2608)
* Err501:                                Error definitions.  (line 2608)
* Err503:                                Error definitions.  (line 2608)
* Error:                                 Special Backends.   (line 3707)
* ErrorFile:                             Error definitions.  (line 2600)
* escape character:                      Lexical structure.  (line 1837)
* even:                                  Pipelines.          (line 4500)
* exact match, DeleteHeader:             Request Modification.
                                                             (line 2766)
* exact match, headers:                  Rewrite.            (line 2940)
* exists:                                Pipelines.          (line 4517)
* expansion, backreference:              Request modifications.
                                                             (line  715)
* extended:                              Logging.            (line 1585)
* extended, built-in format:             Logging.            (line 1787)
* Family:                                Dynamic backends.   (line 1443)
* Family <1>:                            Backend.            (line 3572)
* file lookup, headers:                  Rewrite.            (line 2942)
* first:                                 Dynamic backends.   (line 1425)
* ForwardedHeader:                       Logging configuration.
                                                             (line 2317)
* ForwardedHeader <1>:                   Listener logging.   (line 2691)
* ForwardedHeader <2>:                   Service Logging.    (line 3465)
* Frank Schmirler:                       Overview.           (line  116)
* ge:                                    Pipelines.          (line 4497)
* Grace:                                 Timeouts.           (line 2494)
* Group:                                 Runtime directives. (line 2001)
* gt:                                    Pipelines.          (line 4494)
* header:                                Request Accessors.  (line 1968)
* Header:                                Rewrite.            (line 2875)
* Header <1>:                            rewrite response.   (line 3061)
* Header <2>:                            Service Selection Statements.
                                                             (line 3323)
* HEADER, session type:                  Session.            (line 3845)
* HeaderAdd:                             Request Modification.
                                                             (line 2732)
* HeaderAdd <1>:                         Service Request and Response Modification.
                                                             (line 3417)
* HeaderOption:                          Proxy Tuning.       (line 2097)
* HeaderRemove:                          Request Modification.
                                                             (line 2789)
* HeaderRemove <1>:                      Service Request and Response Modification.
                                                             (line 3428)
* HeadRemove:                            Request Modification.
                                                             (line 2790)
* HeadRemove <1>:                        Service Request and Response Modification.
                                                             (line 3429)
* high availability:                     Balancer groups.    (line 1334)
* Host:                                  Service selection.  (line  404)
* host:                                  Request Accessors.  (line 1971)
* Host <1>:                              Rewrite.            (line 2881)
* Host <2>:                              Service Selection Statements.
                                                             (line 3329)
* HTTPS:                                 Backend.            (line 3648)
* ID:                                    Session.            (line 3849)
* IgnoreCase:                            Regexp Settings.    (line 2205)
* IgnoreCase <1>:                        Other Statements.   (line 3883)
* IgnoreSRVWeight:                       Dynamic backends.   (line 1464)
* IgnoreSRVWeight <1>:                   Backend.            (line 3584)
* Include:                               File inclusion.     (line 2257)
* include-dir=DIR:                       Usage.              (line  329)
* IncludeDir:                            File inclusion.     (line 2265)
* index:                                 Pipelines.          (line 4466)
* inet:                                  Dynamic backends.   (line 1451)
* inet6:                                 Dynamic backends.   (line 1454)
* info, log suppression:                 Service Logging.    (line 3492)
* Interleaved weighted round robin balancing: Balancer.      (line 1178)
* internal backend:                      Redirects.          (line  907)
* IP address:                            Lexical structure.  (line 1862)
* IP, session type:                      Session.            (line 3821)
* iwrr:                                  Balancer.           (line 1225)
* keywords, configuration file:          Lexical structure.  (line 1823)
* le:                                    Pipelines.          (line 4491)
* len:                                   Pipelines.          (line 4474)
* LetsEncrypt:                           ACME.               (line 1049)
* lexical structure of the configuration file: Lexical structure.
                                                             (line 1813)
* list:                                  poundctl commands.  (line 4009)
* list <1>:                              poundctl commands.  (line 4010)
* list <2>:                              poundctl commands.  (line 4011)
* list <3>:                              poundctl commands.  (line 4012)
* listener:                              Introduction.       (line  164)
* ListenHTTP:                            ListenHTTP.         (line 2504)
* ListenHTTPS:                           ListenHTTPS.        (line 3136)
* load balancing:                        Balancer.           (line 1158)
* log format, user-defined:              Logging.            (line 1601)
* LogFacility:                           Logging.            (line 1552)
* LogFacility <1>:                       Logging configuration.
                                                             (line 2282)
* LogFacility <2>:                       Logging configuration.
                                                             (line 2283)
* LogFormat:                             Logging.            (line 1601)
* LogFormat <1>:                         Logging configuration.
                                                             (line 2294)
* logical and:                           Service selection.  (line  517)
* logical and, explicit:                 Service selection.  (line  517)
* logical and, implicit:                 Service selection.  (line  492)
* logical conjunction, explicit:         Service selection.  (line  517)
* logical disjunction:                   Service selection.  (line  509)
* logical or:                            Service selection.  (line  509)
* LogLevel:                              Logging.            (line 1562)
* LogLevel <1>:                          Logging configuration.
                                                             (line 2300)
* LogLevel <2>:                          Logging configuration.
                                                             (line 2301)
* LogLevel <3>:                          Listener logging.   (line 2679)
* LogLevel <4>:                          Listener logging.   (line 2680)
* LogSuppress:                           Service Logging.    (line 3488)
* LogTag:                                Logging configuration.
                                                             (line 2312)
* lt:                                    Pipelines.          (line 4488)
* Match:                                 Service selection.  (line  509)
* Match <1>:                             Rewrite.            (line 2978)
* Match <2>:                             Service Selection Statements.
                                                             (line 3381)
* matching rules:                        Service selection.  (line  391)
* matching rules, joining:               Service selection.  (line  492)
* MaxRequest:                            Listener-specific limits.
                                                             (line 2554)
* MaxURI:                                Listener-specific limits.
                                                             (line 2560)
* Metrics:                               Special Backends.   (line 3770)
* Mode:                                  Management interface.
                                                             (line 2371)
* mul:                                   Pipelines.          (line 4527)
* multiple matching rules:               Service selection.  (line  492)
* mvh.inc:                               Proxy Tuning.       (line 2165)
* ne:                                    Pipelines.          (line 4484)
* no-include-dir:                        Usage.              (line  330)
* NoHTTPS11:                             ListenHTTPS.        (line 3239)
* Not:                                   Rewrite.            (line 2972)
* Not <1>:                               Service Selection Statements.
                                                             (line 3375)
* not:                                   Pipelines.          (line 4477)
* null:                                  Logging.            (line 1576)
* null, built-in format:                 Logging.            (line 1779)
* numbers, configuration file:           Lexical structure.  (line 1830)
* O'Sullivan, Rick:                      Overview.           (line  116)
* off:                                   poundctl commands.  (line 4027)
* off <1>:                               poundctl commands.  (line 4028)
* off <2>:                               poundctl commands.  (line 4029)
* on:                                    poundctl commands.  (line 4019)
* on <1>:                                poundctl commands.  (line 4020)
* on <2>:                                poundctl commands.  (line 4021)
* or:                                    Pipelines.          (line 4461)
* or, logical:                           Service selection.  (line  509)
* OverrideTTL:                           Backend.            (line 3591)
* param:                                 Request Accessors.  (line 1965)
* PARAM, session type:                   Session.            (line 3836)
* parenthesized subexpression:           Request modifications.
                                                             (line  715)
* path:                                  Request Accessors.  (line 1959)
* Path:                                  Rewrite.            (line 2898)
* Path <1>:                              Service Selection Statements.
                                                             (line 3346)
* PCRE match, DeleteHeader:              Request Modification.
                                                             (line 2770)
* PCRE match, DeleteHeader <1>:          Request Modification.
                                                             (line 2773)
* PCRE match, headers:                   Rewrite.            (line 2953)
* PCRE match, headers <1>:               Rewrite.            (line 2956)
* Perl-compatible regular expression match, DeleteHeader: Request Modification.
                                                             (line 2770)
* Perl-compatible regular expression match, DeleteHeader <1>: Request Modification.
                                                             (line 2773)
* Perl-compatible regular expression match, headers: Rewrite.
                                                             (line 2953)
* Perl-compatible regular expression match, headers <1>: Rewrite.
                                                             (line 2956)
* Perl-compatible regular expressions:   Regular Expressions.
                                                             (line  540)
* PIDFile:                               Runtime directives. (line 2005)
* port:                                  Request Accessors.  (line 1975)
* Port:                                  Listener address.   (line 2530)
* Port <1>:                              Backend.            (line 3558)
* posix regular expression match, DeleteHeader: Request Modification.
                                                             (line 2775)
* posix regular expression match, headers: Rewrite.          (line 2958)
* POSIX regular expressions:             Service selection.  (line  415)
* pound.cfg:                             Introduction.       (line  148)
* poundctl.tmpl:                         poundctl template.  (line 4237)
* POUNDCTL_CONF:                         poundctl config.    (line 4070)
* pound_backends:                        Metric Families.    (line 4847)
* pound_backend_requests:                Metric Families.    (line 4896)
* pound_backend_request_stddev_nanoseconds: Metric Families. (line 4913)
* pound_backend_request_time_avg_nanoseconds: Metric Families.
                                                             (line 4905)
* pound_backend_state:                   Metric Families.    (line 4871)
* pound_listener_enabled:                Metric Families.    (line 4785)
* pound_listener_info:                   Metric Families.    (line 4793)
* pound_service_enabled:                 Metric Families.    (line 4839)
* pound_service_info:                    Metric Families.    (line 4817)
* POUND_TMPL_PATH:                       poundctl template.  (line 4255)
* pound_workers:                         Metric Families.    (line 4762)
* prefix match, DeleteHeader:            Request Modification.
                                                             (line 2755)
* prefix match, headers:                 Rewrite.            (line 2929)
* printf:                                Pipelines.          (line 4504)
* Priority:                              Backend.            (line 3562)
* priority, SRV record:                  Dynamic backends.   (line 1366)
* query:                                 Request Accessors.  (line 1962)
* Query:                                 Rewrite.            (line 2902)
* Query <1>:                             Service Selection Statements.
                                                             (line 3350)
* QueryParam:                            Rewrite.            (line 2907)
* QueryParam <1>:                        Service Selection Statements.
                                                             (line 3355)
* quoted string:                         Lexical structure.  (line 1837)
* random:                                Balancer.           (line 1222)
* redirect:                              Redirects.          (line  912)
* Redirect:                              Special Backends.   (line 3722)
* redirect, log suppression:             Service Logging.    (line 3500)
* RegexType:                             Regular Expressions.
                                                             (line  545)
* RegexType <1>:                         Regexp Settings.    (line 2188)
* regular:                               Logging.            (line 1580)
* regular backend:                       Introduction.       (line  188)
* regular expression match, DeleteHeader: Request Modification.
                                                             (line 2778)
* regular expression match, headers:     Rewrite.            (line 2961)
* regular expressions, PCRE:             Regular Expressions.
                                                             (line  540)
* regular expressions, Perl-compatible:  Regular Expressions.
                                                             (line  540)
* regular expressions, POSIX:            Service selection.  (line  415)
* regular, built-in format:              Logging.            (line 1783)
* request accessor:                      Request modifications.
                                                             (line  758)
* request balancing:                     Balancer.           (line 1158)
* request matching rules:                Service selection.  (line  391)
* resolv.conf:                           resolver.           (line 3911)
* Resolve:                               Dynamic backends.   (line 1421)
* Resolve <1>:                           Backend.            (line 3601)
* Resolver:                              resolver.           (line 3896)
* RetryInterval:                         Dynamic backends.   (line 1499)
* RetryInterval <1>:                     Backend.            (line 3624)
* RetryInterval <2>:                     resolver.           (line 3932)
* rewrite:                               Conditional branches.
                                                             (line  776)
* Rewrite:                               Rewrite.            (line 2798)
* Rewrite <1>:                           Service Request and Response Modification.
                                                             (line 3440)
* RewriteDestination:                    Request Modification.
                                                             (line 2712)
* RewriteErrors:                         Error response rewriting.
                                                             (line 3104)
* RewriteErrors <1>:                     Service Request and Response Modification.
                                                             (line 3458)
* RewriteLocation:                       Response Modification.
                                                             (line 3017)
* RFC 7617:                              Authentication.     (line  836)
* Rick O'Sullivan:                       Overview.           (line  116)
* Robert Segall:                         Overview.           (line  116)
* RootJail:                              Runtime directives. (line 2030)
* Schmirler, Frank:                      Overview.           (line  116)
* search path, templates:                poundctl template.  (line 4237)
* section:                               Syntax.             (line 1882)
* Segall, Robert:                        Overview.           (line  116)
* SendFile:                              Special Backends.   (line 3743)
* Server, poundctl configuration:        multiple servers.   (line 4131)
* ServerName:                            Backend.            (line 3670)
* service:                               Introduction.       (line  170)
* Service definitions:                   Service definitions.
                                                             (line 3114)
* session:                               Sessions.           (line 1247)
* Session:                               Session.            (line 3807)
* SetHeader:                             Request Modification.
                                                             (line 2731)
* SetHeader <1>:                         rewrite response.   (line 3082)
* SetHeader <2>:                         Service Request and Response Modification.
                                                             (line 3416)
* SetPath:                               Request Modification.
                                                             (line 2719)
* SetPath <1>:                           Service Request and Response Modification.
                                                             (line 3404)
* SetQuery:                              Request Modification.
                                                             (line 2722)
* SetQuery <1>:                          Service Request and Response Modification.
                                                             (line 3407)
* SetQueryParam:                         Request Modification.
                                                             (line 2727)
* SetQueryParam <1>:                     Service Request and Response Modification.
                                                             (line 3412)
* SetURL:                                Request Modification.
                                                             (line 2716)
* SetURL <1>:                            Service Request and Response Modification.
                                                             (line 3401)
* simple statement:                      Syntax.             (line 1872)
* Socket:                                Management interface.
                                                             (line 2367)
* SocketFrom:                            Listener address.   (line 2537)
* special backend:                       Redirects.          (line  907)
* srv:                                   Dynamic backends.   (line 1435)
* SRV record, 0 weight:                  Dynamic backends.   (line 1407)
* SRV record, DNS:                       Dynamic backends.   (line 1366)
* SRV records, overriding weight:        Dynamic backends.   (line 1464)
* srverr, log suppression:               Service Logging.    (line 3508)
* SSLAllowClientRenegotiation:           ListenHTTPS.        (line 3209)
* SSLEngine:                             SSL Settings.       (line 2178)
* SSLHonorCipherOrder:                   ListenHTTPS.        (line 3203)
* SSLv2:                                 ListenHTTPS.        (line 3187)
* SSLv2 <1>:                             Backend.            (line 3663)
* SSLv3:                                 ListenHTTPS.        (line 3187)
* SSLv3 <1>:                             Backend.            (line 3663)
* statement, compound:                   Syntax.             (line 1882)
* statement, simple:                     Syntax.             (line 1872)
* strategy, request balancing:           Balancer.           (line 1166)
* StringMatch:                           Rewrite.            (line 2914)
* StringMatch <1>:                       rewrite response.   (line 3065)
* StringMatch <2>:                       Service Selection Statements.
                                                             (line 3362)
* sub:                                   Pipelines.          (line 4524)
* substring match, DeleteHeader:         Request Modification.
                                                             (line 2761)
* substring match, headers:              Rewrite.            (line 2935)
* success, log suppression:              Service Logging.    (line 3496)
* suffix match, DeleteHeader:            Request Modification.
                                                             (line 2764)
* suffix match, headers:                 Rewrite.            (line 2938)
* Supervisor:                            Runtime directives. (line 2023)
* template search path:                  poundctl template.  (line 4237)
* TemplateFile:                          poundctl config.    (line 4119)
* TemplateName:                          poundctl config.    (line 4125)
* TemplatePath:                          poundctl config.    (line 4122)
* Threads:                               Worker Settings.    (line 2060)
* time formats:                          Time and Date Formats.
                                                             (line 4924)
* TimeOut:                               Timeouts.           (line 2465)
* TimeOut <1>:                           Backend.            (line 3637)
* TLSv1:                                 ListenHTTPS.        (line 3187)
* TLSv1 <1>:                             Backend.            (line 3663)
* TLSv1_1:                               ListenHTTPS.        (line 3187)
* TLSv1_1 <1>:                           Backend.            (line 3663)
* TLSv1_2:                               ListenHTTPS.        (line 3187)
* TLSv1_2 <1>:                           Backend.            (line 3663)
* TrustedIP:                             Logging configuration.
                                                             (line 2323)
* TrustedIP <1>:                         Listener logging.   (line 2697)
* TrustedIP <2>:                         Service Logging.    (line 3471)
* TTL:                                   Session.            (line 3854)
* Type:                                  Session.            (line 3817)
* typeof:                                Pipelines.          (line 4513)
* url:                                   Request Accessors.  (line 1956)
* URL:                                   Rewrite.            (line 2918)
* URL <1>:                               Service Selection Statements.
                                                             (line 3366)
* URL <2>:                               poundctl config.    (line 4099)
* URL <3>:                               multiple servers.   (line 4149)
* URL, session type:                     Session.            (line 3831)
* UseBackend:                            UseBackend.         (line 3690)
* User:                                  Runtime directives. (line 2042)
* user database:                         Authentication.     (line  853)
* values, configuration file:            Lexical structure.  (line 1827)
* Verify:                                poundctl config.    (line 4115)
* Verify <1>:                            multiple servers.   (line 4164)
* VerifyList:                            ListenHTTPS.        (line 3225)
* vhost_combined:                        Logging.            (line 1590)
* vhost_combined, built-in format:       Logging.            (line 1791)
* warn-deprecated:                       Usage.              (line  312)
* WatcherTTL:                            Timeouts.           (line 2478)
* weight override, SRV records:          Dynamic backends.   (line 1464)
* weight, SRV record:                    Dynamic backends.   (line 1366)
* Weighted random balancing:             Balancer.           (line 1170)
* WorkerIdleTimeout:                     Worker model.       (line 1541)
* WorkerIdleTimeout <1>:                 Worker Settings.    (line 2056)
* WorkerMaxCount:                        Worker model.       (line 1533)
* WorkerMaxCount <1>:                    Worker Settings.    (line 2052)
* WorkerMinCount:                        Worker model.       (line 1526)
* WorkerMinCount <1>:                    Worker Settings.    (line 2048)
* WSTimeOut:                             Timeouts.           (line 2487)
* WSTimeOut <1>:                         Backend.            (line 3641)
* xHTTP:                                 Listener-specific limits.
                                                             (line 2572)