On 19.05.2014 23:39, Alex Attarian wrote:

[SNIP]

>> load01 -> proxy01 -> interface eth2:0
>> =============================================================
>> Network config on proxy01:
>> eth2      Link encap:Ethernet  HWaddr 08:00:27:01:B4:79
>>           inet addr:10.0.200.52  Bcast:10.0.200.255  Mask:255.255.255.0
>>           inet6 addr: fe80::a00:27ff:fe01:b479/64 Scope:Link
>>           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>>           RX packets:221795 errors:0 dropped:0 overruns:0 frame:0
>>           TX packets:213292 errors:0 dropped:0 overruns:0 carrier:0
>>           collisions:0 txqueuelen:1000
>>           RX bytes:19749301 (18.8 MiB)  TX bytes:20172223 (19.2 MiB)
>>
>> eth2:0    Link encap:Ethernet  HWaddr 08:00:27:01:B4:79
>>           inet addr:10.0.200.60  Bcast:10.0.200.60  Mask:255.255.255.255
>>           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1

[SNIP]

What do you do to prevent ARP responses from proxy01 for the IP
10.0.200.60? The usual way this is done by configuring this IP on
interface lo:0 and then putting something like this in you sysctl.conf file:

# LVS DR routing parameters
net.ipv4.conf.lo.arp_ignore=1
net.ipv4.conf.lo.arp_announce=2
net.ipv4.conf.all.arp_ignore=1
net.ipv4.conf.all.arp_announce=2
net.ipv4.conf.eth0.arp_ignore=1
net.ipv4.conf.eth0.arp_announce=2
...

An alternative is to not configure the VIP on the realserver at all and
instead put this iptables rule there:

iptables -t nat -A PREROUTING -p tcp -d <VIP> -j REDIRECT

Regards,
  Dennis

_______________________________________________
Please read the documentation before posting - it's available at:
http://www.linuxvirtualserver.org/

LinuxVirtualServer.org mailing list - lvs-users@LinuxVirtualServer.org
Send requests to lvs-users-requ...@linuxvirtualserver.org
or go to http://lists.graemef.net/mailman/listinfo/lvs-users

Reply via email to