Hi, I have set it up, my problem seems to lies on the time out, as when the time out occurs, the tcp connection will be drop. When the client try to reconnect, the new tcp connection will be established. It seems to be after sometime when there is an inactivity on the client for some time (not the tcp timeout), the LVS will goto sleep, and when the client try to connect, it will try to wait up the LVS,, and failed. The subsequent retry will be successful. Is there such setting in LVS?
Thanks Reagrds... Tang Khing Tiong IBM Global Business Services Mobile: +65 98588291 Email: tan...@sg.ibm.com From: lvs-users-requ...@linuxvirtualserver.org To: lvs-users@linuxvirtualserver.org Date: 17/03/2019 12:58 AM Subject: lvs-users Digest, Vol 189, Issue 3 Sent by: lvs-users-boun...@linuxvirtualserver.org Send lvs-users mailing list submissions to lvs-users@linuxvirtualserver.org To subscribe or unsubscribe via the World Wide Web, visit https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.graemef.net_mailman_listinfo_lvs-2Dusers&d=DwICAg&c=jf_iaSHvJObTbx-siA1ZOg&r=fFxFdgcVIYgphlxPbbJeBaYNmmBz9XS2jKupGnk9mcY&m=0Z3EmhKu_IHnmdd2wt_dD97Fiyeepl9K4Xd2vdCFH2s&s=SzDaVssPs2FKK0auLzEmjAHkAhDnOvX1Kdth5ei8vZE&e= or, via email, send a message with subject or body 'help' to lvs-users-requ...@linuxvirtualserver.org You can reach the person managing the list at lvs-users-ow...@linuxvirtualserver.org When replying, please edit your Subject line so it is more specific than "Re: Contents of lvs-users digest..." Today's Topics: 1. Re: LVS Sleep after a period of Time (Malcolm Turnbull) 2. [PATCH v2] ipvsadm: allow tunneling with gue encapsulation (Jacky Hu) ----- Message from Malcolm Turnbull <malc...@loadbalancer.org> on Sat, 16 Mar 2019 13:42:52 +0000 ----- To: "LinuxVirtualServer.org users mailing list." <lvs-users@linuxvirtualserver.org> Subject: Re: [lvs-users] LVS Sleep after a period of Time Tang, You probably need to configure the tcp timeouts for LVS in the kernel: To list the current timeouts: root@lb1:~# ipvsadm -l --timeout Timeout (tcp tcpfin udp): 900 120 300 To set different ones (in seconds): ipvsadm --set 3600 120 300 To persist this over re-boots put the command in rc.local or somewhere that runs at boot. You can't set it to be forever (because that would cause a lot of issues), most protocols have a keepalive to get around the timeout. Timeout only counts down when you have idle connections. On Fri, 15 Mar 2019 at 12:42, Khing Tiong Tang <tan...@sg.ibm.com> wrote: > > Keepalived v1.2.10 (01/26,2014) > Redhat linux 7.0 > > If I left my login to the real server via the VIP for sometime, I refresh > the client, there is a communication error. It seems like the LVS has a > sleep time after idle for sometime. May I know if I can change the idle > time to infinite? > My Keepalived config: > # virtual XM > virtual_server 10.40.25.235 18010 { > delay_loop 1 > lb_algo rr > lb_kind DR > protocol TCP > > real_server 10.40.25.35 18010 { > TCP_CHECK { > connect_timeout 3 > } > } > > real_server 10.40.25.135 18010 { > TCP_CHECK { > connect_timeout 3 > } > } > } > Thanks > Reagrds... > > Tang Khing Tiong > IBM Global Business Services > Mobile: +65 98588291 > Email: tan...@sg.ibm.com > > > _______________________________________________ > Please read the documentation before posting - it's available at: > https://urldefense.proofpoint.com/v2/url?u=http-3A__www.linuxvirtualserver.org_&d=DwIBaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=fFxFdgcVIYgphlxPbbJeBaYNmmBz9XS2jKupGnk9mcY&m=0Z3EmhKu_IHnmdd2wt_dD97Fiyeepl9K4Xd2vdCFH2s&s=Rz-Gd6zbuyupIEPPwEEW3m36s4z0vrTKjlciQpqm_BA&e= > > LinuxVirtualServer.org mailing list - lvs-users@LinuxVirtualServer.org > Send requests to lvs-users-requ...@linuxvirtualserver.org > or go to https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.graemef.net_mailman_listinfo_lvs-2Dusers&d=DwIBaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=fFxFdgcVIYgphlxPbbJeBaYNmmBz9XS2jKupGnk9mcY&m=0Z3EmhKu_IHnmdd2wt_dD97Fiyeepl9K4Xd2vdCFH2s&s=SzDaVssPs2FKK0auLzEmjAHkAhDnOvX1Kdth5ei8vZE&e= ----- Message from Jacky Hu <hengqing...@gmail.com> on Sat, 16 Mar 2019 14:07:08 +0800 ----- To: hengqing...@gmail.com cc: lvs-users@linuxvirtualserver.org, lvs-de...@vger.kernel.org, ho...@verge.net.au, jacky...@walmart.com, bro...@redhat.com, jason.ni...@walmart.com Subject: [lvs-users] [PATCH v2] ipvsadm: allow tunneling with gue encapsulation Added the following options: --tun-type with adding and editing destinations for tunneling servers. --tun-port with adding and editing destinations for tunneling servers. --tun-info with listing services. Signed-off-by: Jacky Hu <hengqing...@gmail.com> --- Makefile | 2 +- ipvsadm.c | 256 ++++++++++++++++++++++++++++++++++++++++++---- libipvs/ip_vs.h | 27 +++++ libipvs/libipvs.c | 10 ++ 4 files changed, 272 insertions(+), 23 deletions(-) diff --git a/Makefile b/Makefile index 91a2991..63c4389 100644 --- a/Makefile +++ b/Makefile @@ -63,7 +63,7 @@ RPMBUILD = $(shell \ fi ) OBJS = ipvsadm.o config_stream.o dynamic_array.o -LIBS = -lpopt +LIBS = -lpopt -lm ifneq (0,$(HAVE_NL)) LIBS += $(shell \ if which pkg-config > /dev/null 2>&1; then \ diff --git a/ipvsadm.c b/ipvsadm.c index 0cb2b68..2ff4171 100644 --- a/ipvsadm.c +++ b/ipvsadm.c @@ -105,6 +105,7 @@ #include <sys/param.h> #include <sys/wait.h> /* For waitpid */ #include <arpa/inet.h> +#include <math.h> #include <net/if.h> #include <netinet/ip_icmp.h> @@ -187,7 +188,10 @@ static const char* cmdnames[] = { #define OPT_MCAST_PORT 0x02000000 #define OPT_MCAST_TTL 0x04000000 #define OPT_SYNC_MAXLEN 0x08000000 -#define NUMBER_OF_OPT 28 +#define OPT_TUN_INFO 0x10000000 +#define OPT_TUN_TYPE 0x20000000 +#define OPT_TUN_PORT 0x40000000 +#define NUMBER_OF_OPT 31 static const char* optnames[] = { "numeric", @@ -218,6 +222,9 @@ static const char* optnames[] = { "mcast-port", "mcast-ttl", "sync-maxlen", + "tun-info", + "tun-type", + "tun-port", }; /* @@ -230,21 +237,48 @@ static const char* optnames[] = { */ static const char commands_v_options[NUMBER_OF_CMD][NUMBER_OF_OPT] = { - /* -n -c svc -s -p -M -r fwd -w -x -y -mc tot dmn -st -rt thr -pc srt sid -ex ops -pe -b grp port ttl size */ -/*ADD*/ {'x', 'x', '+', ' ', ' ', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', ' ', ' ', ' ', 'x', 'x', 'x', 'x'}, -/*EDIT*/ {'x', 'x', '+', ' ', ' ', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', ' ', ' ', ' ', 'x', 'x', 'x', 'x'}, -/*DEL*/ {'x', 'x', '+', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, -/*FLUSH*/ {'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, -/*LIST*/ {' ', '1', '1', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', '1', '1', ' ', ' ', ' ', ' ', ' ', ' ', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, -/*ADDSRV*/ {'x', 'x', '+', 'x', 'x', 'x', '+', ' ', ' ', ' ', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, -/*DELSRV*/ {'x', 'x', '+', 'x', 'x', 'x', '+', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, -/*EDITSRV*/ {'x', 'x', '+', 'x', 'x', 'x', '+', ' ', ' ', ' ', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, -/*TIMEOUT*/ {'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, -/*STARTD*/ {'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', ' ', 'x', 'x', 'x', 'x', ' ', ' ', ' ', ' '}, -/*STOPD*/ {'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, -/*RESTORE*/ {'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, -/*SAVE*/ {' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, -/*ZERO*/ {'x', 'x', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, + /* -n -c svc -s -p -M -r fwd -w -x -y -mc tot dmn -st -rt thr -pc srt sid -ex ops -pe -b grp port ttl size tun-info tun-type tun-port */ +/*ADD*/ {'x', 'x', '+', ' ', ' ', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', ' ', ' ', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, +/*EDIT*/ {'x', 'x', '+', ' ', ' ', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', ' ', ' ', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, +/*DEL*/ {'x', 'x', '+', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, +/*FLUSH*/ {'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, +/*LIST*/ {' ', '1', '1', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', '1', '1', ' ', ' ', ' ', ' ', ' ', ' ', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', ' ', 'x', 'x'}, +/*ADDSRV*/ {'x', 'x', '+', 'x', 'x', 'x', '+', ' ', ' ', ' ', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', ' ', ' '}, +/*DELSRV*/ {'x', 'x', '+', 'x', 'x', 'x', '+', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, +/*EDITSRV*/ {'x', 'x', '+', 'x', 'x', 'x', '+', ' ', ' ', ' ', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', ' ', ' '}, +/*TIMEOUT*/ {'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, +/*STARTD*/ {'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', ' ', 'x', 'x', 'x', 'x', ' ', ' ', ' ', ' ', 'x', 'x', 'x'}, +/*STOPD*/ {'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, +/*RESTORE*/ {'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, +/*SAVE*/ {' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, +/*ZERO*/ {'x', 'x', ' ', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x', 'x'}, +}; + +static const char * const tunnames[] = { + "ipip", + "gue", +}; + +static const unsigned int tunopts[] = { + OPT_TUN_PORT, +}; + +#define NUMBER_OF_TUN_OPT 1 +#define NA "n/a" + +/* + * Table of legal combinations of tunnel types and options. + * Key: + * '+' compulsory + * 'x' illegal + * '1' exclusive (only one '1' option can be supplied) + * ' ' optional + */ +static const char +tunnel_types_v_options[IP_VS_CONN_F_TUNNEL_TYPE_MAX][NUMBER_OF_TUN_OPT] = { + /* tun-port */ +/* ipip */ {'x'}, +/* gue */ {'+'}, }; /* printing format flags */ @@ -257,6 +291,7 @@ static const char commands_v_options[NUMBER_OF_CMD][NUMBER_OF_OPT] = #define FMT_PERSISTENTCONN 0x0020 #define FMT_NOSORT 0x0040 #define FMT_EXACT 0x0080 +#define FMT_TUN_INFO 0x0100 #define SERVICE_NONE 0x0000 #define SERVICE_ADDR 0x0001 @@ -265,6 +300,9 @@ static const char commands_v_options[NUMBER_OF_CMD][NUMBER_OF_OPT] = /* default scheduler */ #define DEF_SCHED "wlc" +/* default tunnel type */ +#define DEF_TUNNEL_TYPE "ipip" + /* default multicast interface name */ #define DEF_MCAST_IFN "eth0" @@ -300,6 +338,9 @@ enum { TAG_MCAST_PORT, TAG_MCAST_TTL, TAG_SYNC_MAXLEN, + TAG_TUN_INFO, + TAG_TUN_TYPE, + TAG_TUN_PORT, }; /* various parsing helpers & parsing functions */ @@ -318,12 +359,16 @@ static int parse_netmask(char *buf, u_int32_t *addr); static int parse_timeout(char *buf, int min, int max); static unsigned int parse_fwmark(char *buf); static unsigned int parse_sched_flags(const char *sched, char *optarg); +static unsigned int parse_tun_type(const char *name); /* check the options based on the commands_v_options table */ static void generic_opt_check(int command, int options); static void set_command(int *cmd, const int newcmd); static void set_option(unsigned int *options, unsigned int option); +/* check the options based on the tunnel_types_v_options table */ +static void tunnel_opt_check(int tun_type, int options); + static void tryhelp_exit(const char *program, const int exit_status); static void usage_exit(const char *program, const int exit_status); static void version_exit(int exit_status); @@ -495,6 +540,12 @@ parse_options(int argc, char **argv, struct ipvs_command_entry *ce, TAG_MCAST_TTL, NULL, NULL }, { "sync-maxlen", '\0', POPT_ARG_STRING, &optarg, TAG_SYNC_MAXLEN, NULL, NULL }, + { "tun-info", '\0', POPT_ARG_NONE, NULL, TAG_TUN_INFO, + NULL, NULL }, + { "tun-type", '\0', POPT_ARG_STRING, &optarg, TAG_TUN_TYPE, + NULL, NULL }, + { "tun-port", '\0', POPT_ARG_STRING, &optarg, TAG_TUN_PORT, + NULL, NULL }, { NULL, 0, 0, NULL, 0, NULL, NULL } }; @@ -773,6 +824,24 @@ parse_options(int argc, char **argv, struct ipvs_command_entry *ce, fail(2, "illegal sync-maxlen specified"); ce->daemon.sync_maxlen = parse; break; + case TAG_TUN_INFO: + set_option(options, OPT_TUN_INFO); + *format |= FMT_TUN_INFO; + break; + case TAG_TUN_TYPE: + set_option(options, OPT_TUN_TYPE); + parse = parse_tun_type(optarg); + if (parse == -1) + fail(2, "illegal tunnel type specified"); + ce->dest.tun_type = parse; + break; + case TAG_TUN_PORT: + set_option(options, OPT_TUN_PORT); + parse = string_to_number(optarg, 1, 65535); + if (parse == -1) + fail(2, "illegal tunnel port specified"); + ce->dest.tun_port = parse; + break; default: fail(2, "invalid option `%s'", poptBadOption(context, POPT_BADOPTION_NOALIAS)); @@ -847,12 +916,17 @@ static int process_options(int argc, char **argv, int reading_stdin) struct ipvs_command_entry ce; unsigned int options = OPT_NONE; unsigned int format = FMT_NONE; + unsigned int fwd_method; int result = 0; memset(&ce, 0, sizeof(struct ipvs_command_entry)); ce.cmd = CMD_NONE; /* Set the default weight 1 */ ce.dest.weight = 1; + /* Set the default tunnel type 0(ipip) */ + ce.dest.tun_type = 0; + /* Set the default tunnel port 0(n/a) */ + ce.dest.tun_port = 0; /* Set direct routing as default forwarding method */ ce.dest.conn_flags = IP_VS_CONN_F_DROUTE; /* Set the default persistent granularity to /32 mask */ @@ -883,6 +957,8 @@ static int process_options(int argc, char **argv, int reading_stdin) if (ce.cmd == CMD_STARTDAEMON && strlen(ce.daemon.mcast_ifn) == 0) strcpy(ce.daemon.mcast_ifn, DEF_MCAST_IFN); + fwd_method = ce.dest.conn_flags & IP_VS_CONN_F_FWD_MASK; + if (ce.cmd == CMD_ADDDEST || ce.cmd == CMD_EDITDEST) { /* * The destination port must be equal to the service port @@ -890,15 +966,23 @@ static int process_options(int argc, char **argv, int reading_stdin) * Don't worry about this if fwmark is used. */ if (!ce.svc.fwmark && - (ce.dest.conn_flags == IP_VS_CONN_F_TUNNEL - || ce.dest.conn_flags == IP_VS_CONN_F_DROUTE)) + (fwd_method == IP_VS_CONN_F_TUNNEL + || fwd_method == IP_VS_CONN_F_DROUTE)) ce.dest.port = ce.svc.port; /* Tunneling allows different address family */ if (ce.dest.af != ce.svc.af && - ce.dest.conn_flags != IP_VS_CONN_F_TUNNEL) + fwd_method != IP_VS_CONN_F_TUNNEL) fail(2, "Different address family is allowed only " "for tunneling servers"); + + /* Only tunneling allows encapsulation details */ + if ((options & (OPT_TUN_TYPE|OPT_TUN_PORT)) && + fwd_method != IP_VS_CONN_F_TUNNEL) + fail(2, + "Encapsulation details are allowed only for tunneling servers"); + + tunnel_opt_check(ce.dest.tun_type, options); } switch (ce.cmd) { @@ -1163,6 +1247,20 @@ static unsigned int parse_sched_flags(const char *sched, char *optarg) return flags; } +static unsigned int parse_tun_type(const char *tun_type) +{ + unsigned int type = -1; + + if (!strcmp(tun_type, "ipip")) + type = IP_VS_CONN_F_TUNNEL_TYPE_IPIP; + else if (!strcmp(tun_type, "gue")) + type = IP_VS_CONN_F_TUNNEL_TYPE_GUE; + else + type = -1; + + return type; +} + static void generic_opt_check(int command, int options) { @@ -1197,6 +1295,41 @@ generic_opt_check(int command, int options) } } +static void +tunnel_opt_check(int tun_type, int options) +{ + int i, j, k; + int last = 0, count = 0; + + /* Check that tunnel types are valid with options. */ + i = tun_type; + + for (j = 0; j < NUMBER_OF_TUN_OPT; j++) { + k = log(tunopts[j]) / log(2); + if (!(options & (1<<k))) { + if (tunnel_types_v_options[i][j] == '+') + fail(2, "You need to supply the '%s' " + "option for the '%s' tunnel type", + optnames[k], tunnames[i]); + } else { + if (tunnel_types_v_options[i][j] == 'x') + fail(2, "Illegal '%s' option with " + "the '%s' tunnel type", + optnames[k], tunnames[i]); + if (tunnel_types_v_options[i][j] == '1') { + count++; + if (count == 1) { + last = k; + continue; + } + fail(2, "The option '%s' conflicts with the " + "'%s' option in the '%s' tunnel type", + optnames[k], optnames[last], tunnames[i]); + } + } + } +} + static inline const char * opt2name(int option) { @@ -1301,6 +1434,9 @@ static void usage_exit(const char *program, const int exit_status) " --gatewaying -g gatewaying (direct routing) (default)\n" " --ipip -i ipip encapsulation (tunneling)\n" " --masquerading -m masquerading (NAT)\n" + " --tun-type type one of ipip|gue,\n" + " the default tunnel type is %s.\n" + " --tun-port port tunnel destination port\n" " --weight -w weight capacity of real server\n" " --u-threshold -x uthreshold upper threshold of connections\n" " --l-threshold -y lthreshold lower threshold of connections\n" @@ -1312,12 +1448,13 @@ static void usage_exit(const char *program, const int exit_status) " --exact expand numbers (display exact values)\n" " --thresholds output of thresholds information\n" " --persistent-conn output of persistent connection info\n" + " --tun-info output of tunnel information\n" " --nosort disable sorting output of service/server entries\n" " --sort does nothing, for backwards compatibility\n" " --ops -o one-packet scheduling\n" " --numeric -n numeric output of addresses and ports\n" " --sched-flags -b flags scheduler flags (comma-separated)\n", - DEF_SCHED); + DEF_SCHED, DEF_TUNNEL_TYPE); fprintf(stream, "Daemon Options:\n" @@ -1565,6 +1702,46 @@ static inline char *fwd_switch(unsigned flags) } +static inline char *fwd_tun_type(ipvs_dest_entry_t *e) +{ + char *type = malloc(8); + + if (!type) + return NA; + + switch (e->conn_flags & IP_VS_CONN_F_FWD_MASK) { + case IP_VS_CONN_F_TUNNEL: + snprintf(type, 8, "%s", tunnames[e->tun_type]); break; + default: + snprintf(type, 8, "%s", NA); break; + } + return type; +} + + +static inline char *fwd_tun_port(ipvs_dest_entry_t *e) +{ + char *port = malloc(8); + + if (!port) + return NA; + + switch (e->conn_flags & IP_VS_CONN_F_FWD_MASK) { + case IP_VS_CONN_F_TUNNEL: + switch (e->tun_type) { + case IP_VS_CONN_F_TUNNEL_TYPE_IPIP: + snprintf(port, 8, "%s", NA); break; + default: + snprintf(port, 8, "%d", e->tun_port); break; + } + break; + default: + snprintf(port, 8, "%s", NA); break; + } + return port; +} + + static void print_largenum(unsigned long long i, unsigned int format) { if (format & FMT_EXACT) { @@ -1641,6 +1818,9 @@ static void print_title(unsigned int format) " -> RemoteAddress:Port\n", "Prot LocalAddress:Port", "Weight", "PersistConn", "ActiveConn", "InActConn"); + else if ((format & FMT_TUN_INFO)) + printf("Prot LocalAddress:Port Scheduler Flags\n" + " -> RemoteAddress:Port Forward TunType TunPort Weight ActiveConn InActConn\n"); else if (!(format & FMT_RULE)) printf("Prot LocalAddress:Port Scheduler Flags\n" " -> RemoteAddress:Port Forward Weight ActiveConn InActConn\n"); @@ -1768,6 +1948,7 @@ print_service_entry(ipvs_service_entry_t *se, unsigned int format) for (i = 0; i < d->num_dests; i++) { char *dname; ipvs_dest_entry_t *e = &d->entrytable[i]; + unsigned int fwd_method = e->conn_flags & IP_VS_CONN_F_FWD_MASK; if (!(dname = addrport_to_anyname(e->af, &(e->addr), ntohs(e->port), se->protocol, format))) { @@ -1778,8 +1959,33 @@ print_service_entry(ipvs_service_entry_t *se, unsigned int format) dname[28] = '\0'; if (format & FMT_RULE) { - printf("-a %s -r %s %s -w %d\n", svc_name, dname, - fwd_switch(e->conn_flags), e->weight); + if (fwd_method == IP_VS_CONN_F_TUNNEL) { + switch (e->tun_type) { + case IP_VS_CONN_F_TUNNEL_TYPE_GUE: + printf("-a %s -r %s %s -w %d --tun-type %s --tun-port %d\n", + svc_name, + dname, + fwd_switch(e->conn_flags), + e->weight, + tunnames[e->tun_type], + e->tun_port); + break; + case IP_VS_CONN_F_TUNNEL_TYPE_IPIP: + printf("-a %s -r %s %s -w %d --tun-type %s\n", + svc_name, + dname, + fwd_switch(e->conn_flags), + e->weight, + tunnames[e->tun_type]); + break; + } + } else { + printf("-a %s -r %s %s -w %d\n", + svc_name, + dname, + fwd_switch(e->conn_flags), + e->weight); + } } else if (format & FMT_STATS) { printf(" -> %-28s", dname); print_largenum(e->stats64.conns, format); @@ -1804,6 +2010,12 @@ print_service_entry(ipvs_service_entry_t *se, unsigned int format) printf(" -> %-28s %-9u %-11u %-10u %-10u\n", dname, e->weight, e->persistconns, e->activeconns, e->inactconns); + } else if (format & FMT_TUN_INFO) { + printf(" -> %-28s %-7s %-7s %-7s %-6d %-10u %-10u\n", + dname, fwd_name(e->conn_flags), + fwd_tun_type(e), + fwd_tun_port(e), + e->weight, e->activeconns, e->inactconns); } else printf(" -> %-28s %-7s %-6d %-10u %-10u\n", dname, fwd_name(e->conn_flags), diff --git a/libipvs/ip_vs.h b/libipvs/ip_vs.h index ad0141c..209e9a4 100644 --- a/libipvs/ip_vs.h +++ b/libipvs/ip_vs.h @@ -107,6 +107,13 @@ #define IP_VS_PEDATA_MAXLEN 255 +/* Tunnel types */ +enum { + IP_VS_CONN_F_TUNNEL_TYPE_IPIP = 0, /* IPIP */ + IP_VS_CONN_F_TUNNEL_TYPE_GUE, /* GUE */ + IP_VS_CONN_F_TUNNEL_TYPE_MAX, +}; + union nf_inet_addr { __u32 all[4]; __be32 ip; @@ -162,6 +169,10 @@ struct ip_vs_dest_kern { /* thresholds for active connections */ u_int32_t u_threshold; /* upper threshold */ u_int32_t l_threshold; /* lower threshold */ + + /* tunnel info */ + u_int16_t tun_type; /* tunnel type */ + __be16 tun_port; /* tunnel port */ }; struct ip_vs_dest_user { @@ -178,6 +189,10 @@ struct ip_vs_dest_user { u_int32_t l_threshold; /* lower threshold */ u_int16_t af; union nf_inet_addr addr; + + /* tunnel info */ + u_int16_t tun_type; /* tunnel type */ + __be16 tun_port; /* tunnel port */ }; /* @@ -291,6 +306,10 @@ struct ip_vs_dest_entry_kern { /* statistics */ struct ip_vs_stats_user stats; + + /* tunnel info */ + u_int16_t tun_type; /* tunnel type */ + __be16 tun_port; /* tunnel port */ }; struct ip_vs_dest_entry { @@ -313,6 +332,10 @@ struct ip_vs_dest_entry { /* statistics, 64-bit */ struct ip_vs_stats64 stats64; + + /* tunnel info */ + u_int16_t tun_type; /* tunnel type */ + __be16 tun_port; /* tunnel port */ }; /* The argument to IP_VS_SO_GET_DESTS */ @@ -527,6 +550,10 @@ enum { IPVS_DEST_ATTR_STATS64, /* nested attribute for dest stats */ + IPVS_DEST_ATTR_TUN_TYPE, /* tunnel type */ + + IPVS_DEST_ATTR_TUN_PORT, /* tunnel port */ + __IPVS_DEST_ATTR_MAX, }; diff --git a/libipvs/libipvs.c b/libipvs/libipvs.c index 9be7700..d3cadaa 100644 --- a/libipvs/libipvs.c +++ b/libipvs/libipvs.c @@ -390,6 +390,8 @@ static int ipvs_nl_fill_dest_attr(struct nl_msg *msg, ipvs_dest_t *dst) NLA_PUT_U16(msg, IPVS_DEST_ATTR_PORT, dst->port); NLA_PUT_U32(msg, IPVS_DEST_ATTR_FWD_METHOD, dst->conn_flags & IP_VS_CONN_F_FWD_MASK); NLA_PUT_U32(msg, IPVS_DEST_ATTR_WEIGHT, dst->weight); + NLA_PUT_U8(msg, IPVS_DEST_ATTR_TUN_TYPE, dst->tun_type); + NLA_PUT_U16(msg, IPVS_DEST_ATTR_TUN_PORT, dst->tun_port); NLA_PUT_U32(msg, IPVS_DEST_ATTR_U_THRESH, dst->u_threshold); NLA_PUT_U32(msg, IPVS_DEST_ATTR_L_THRESH, dst->l_threshold); @@ -856,6 +858,8 @@ static int ipvs_dests_parse_cb(struct nl_msg *msg, void *arg) struct nlattr *attrs[IPVS_CMD_ATTR_MAX + 1]; struct nlattr *dest_attrs[IPVS_DEST_ATTR_MAX + 1]; struct nlattr *attr_addr_family = NULL; + struct nlattr *attr_tun_type = NULL; + struct nlattr *attr_tun_port = NULL; struct ip_vs_get_dests **dp = (struct ip_vs_get_dests **)arg; struct ip_vs_get_dests *d = (struct ip_vs_get_dests *)*dp; int i = d->num_dests; @@ -888,6 +892,12 @@ static int ipvs_dests_parse_cb(struct nl_msg *msg, void *arg) d->entrytable[i].port = nla_get_u16(dest_attrs[IPVS_DEST_ATTR_PORT]); d->entrytable[i].conn_flags = nla_get_u32(dest_attrs[IPVS_DEST_ATTR_FWD_METHOD]); d->entrytable[i].weight = nla_get_u32(dest_attrs[IPVS_DEST_ATTR_WEIGHT]); + attr_tun_type = dest_attrs[IPVS_DEST_ATTR_TUN_TYPE]; + if (attr_tun_type) + d->entrytable[i].tun_type = nla_get_u8(attr_tun_type); + attr_tun_port = dest_attrs[IPVS_DEST_ATTR_TUN_PORT]; + if (attr_tun_port) + d->entrytable[i].tun_port = nla_get_u16(attr_tun_port); d->entrytable[i].u_threshold = nla_get_u32(dest_attrs[IPVS_DEST_ATTR_U_THRESH]); d->entrytable[i].l_threshold = nla_get_u32(dest_attrs[IPVS_DEST_ATTR_L_THRESH]); d->entrytable[i].activeconns = nla_get_u32(dest_attrs[IPVS_DEST_ATTR_ACTIVE_CONNS]); -- 2.21.0 _______________________________________________ lvs-users mailing list lvs-users@linuxvirtualserver.org https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.graemef.net_mailman_listinfo_lvs-2Dusers&d=DwICAg&c=jf_iaSHvJObTbx-siA1ZOg&r=fFxFdgcVIYgphlxPbbJeBaYNmmBz9XS2jKupGnk9mcY&m=0Z3EmhKu_IHnmdd2wt_dD97Fiyeepl9K4Xd2vdCFH2s&s=SzDaVssPs2FKK0auLzEmjAHkAhDnOvX1Kdth5ei8vZE&e= _______________________________________________ Please read the documentation before posting - it's available at: http://www.linuxvirtualserver.org/ LinuxVirtualServer.org mailing list - lvs-users@LinuxVirtualServer.org Send requests to lvs-users-requ...@linuxvirtualserver.org or go to http://lists.graemef.net/mailman/listinfo/lvs-users