Hello Laura, Emilio.

After checks on if and routing, I'm trying to set up the cluster again.
When I try this are the messages:


"Zen latency is DOWN on s-dr-zen 172.16.18.1 | Zen latency is DOWN on s-dr-zen2 
172.16.18.2 

Cluster IP 172.16.18.3 is active on s-dr-zen 
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE 
HOST IDENTIFICATION HAS CHANGED! @ 
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT 
SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right 
now (man-in-the-middle attack)! It is also possible that the RSA host key has 
just been changed. The fingerprint for the RSA key sent by the remote host is 
04:0f:e7:24:98:4c:3a:19:80:38:c3:46:7b:d0:c5:14. Please contact your system 
administrator. Add correct host key in /root/.ssh/known_hosts to get rid of 
this message. Offending key in /root/.ssh/known_hosts:1 RSA host key for 
172.16.18.2 has changed and you have requested strict checking. Host key 
verification failed. 

Zen Inotify is running on 
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE 
HOST IDENTIFICATION HAS CHANGED! @ 
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT 
SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right 
now (man-in-the-middle attack)! It is also possible that the RSA host key has 
just been changed. The fingerprint for the RSA key sent by the remote host is 
04:0f:e7:24:98:4c:3a:19:80:38:c3:46:7b:d0:c5:14. Please contact your system 
administrator. Add correct host key in /root/.ssh/known_hosts to get rid of 
this message. Offending key in /root/.ssh/known_hosts:1 RSA host key for 
172.16.18.2 has changed and you have requested strict checking. Host key 
verification failed. 
"

Virtual IP for Cluster: eth5:cl 172.16.18.3 

s-dr-zen        172.16.18.1
s-dr-zen2       172.16.18.2

I think It's only "garbage" coming from old test anche changes.
How can I CLEANUP the RSA configuration to avoid this message?

Thanks.

Stefano.
 

-----Messaggio originale-----
Da: Emilio Campos [mailto:[email protected]] 
Inviato: lunedì 27 giugno 2011 0.38
A: [email protected]
Oggetto: Re: [Zenloadbalancer-support] Zen Cluster

on the other node, can you try the same  configuration steps and
attach screenshots with the output?

after, can you attach the
/usr/local/zenloadbalancer/logs/zenloadbalancer.log file (2 nodes)

2011/6/24 Chiesa Stefano <[email protected]>:
> Hello Emilio.
>
> After some good tests with a single server, I'm trying to set up the
> cluster.
> I follewed the instructions but I have some problems (attached print
> screens and errors).
>
> I set up an IF with a private address (172.16.18.x - s-dr-zen master
> 172.16.18.1 - s-dr-zen2 - slave 172.16.18.2) on eth5.
> I connected the two servers on eth5 with a cross cable. The two server
> can ping each other.
>
> If you need other info don't hesitate to ask.
>
> Thanks in advance.
>
> Ciao.
> Stefano.
>
> ----------------------------------------
> Stefano Chiesa
> Wolters Kluwer Italia
> Strada 1, Palazzo F6
> 20090 Milanofiori Assago (Mi) - Italia
> Phone +39 0282476279 (20279 Voip)
> Fax +39 0282476633
>
>
> ------------------------------------------------------------------------------
> All the data continuously generated in your IT infrastructure contains a
> definitive record of customers, application performance, security
> threats, fraudulent activity and more. Splunk takes this data and makes
> sense of it. Business sense. IT sense. Common sense..
> http://p.sf.net/sfu/splunk-d2d-c1
> _______________________________________________
> Zenloadbalancer-support mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support
>
>



-- 
Load balancer distribution - Open Source Project
http://zenloadbalancer.sourceforge.net
Distribution list (subscribe): [email protected]

------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security 
threats, fraudulent activity, and more. Splunk takes this data and makes 
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
Zenloadbalancer-support mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support

------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security 
threats, fraudulent activity, and more. Splunk takes this data and makes 
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
Zenloadbalancer-support mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support

Reply via email to