Hello Laura, Emilio. After checks on if and routing, I'm trying to set up the cluster again. When I try this are the messages:
"Zen latency is DOWN on s-dr-zen 172.16.18.1 | Zen latency is DOWN on s-dr-zen2 172.16.18.2 Cluster IP 172.16.18.3 is active on s-dr-zen @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that the RSA host key has just been changed. The fingerprint for the RSA key sent by the remote host is 04:0f:e7:24:98:4c:3a:19:80:38:c3:46:7b:d0:c5:14. Please contact your system administrator. Add correct host key in /root/.ssh/known_hosts to get rid of this message. Offending key in /root/.ssh/known_hosts:1 RSA host key for 172.16.18.2 has changed and you have requested strict checking. Host key verification failed. Zen Inotify is running on @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that the RSA host key has just been changed. The fingerprint for the RSA key sent by the remote host is 04:0f:e7:24:98:4c:3a:19:80:38:c3:46:7b:d0:c5:14. Please contact your system administrator. Add correct host key in /root/.ssh/known_hosts to get rid of this message. Offending key in /root/.ssh/known_hosts:1 RSA host key for 172.16.18.2 has changed and you have requested strict checking. Host key verification failed. " Virtual IP for Cluster: eth5:cl 172.16.18.3 s-dr-zen 172.16.18.1 s-dr-zen2 172.16.18.2 I think It's only "garbage" coming from old test anche changes. How can I CLEANUP the RSA configuration to avoid this message? Thanks. Stefano. -----Messaggio originale----- Da: Emilio Campos [mailto:[email protected]] Inviato: lunedì 27 giugno 2011 0.38 A: [email protected] Oggetto: Re: [Zenloadbalancer-support] Zen Cluster on the other node, can you try the same configuration steps and attach screenshots with the output? after, can you attach the /usr/local/zenloadbalancer/logs/zenloadbalancer.log file (2 nodes) 2011/6/24 Chiesa Stefano <[email protected]>: > Hello Emilio. > > After some good tests with a single server, I'm trying to set up the > cluster. > I follewed the instructions but I have some problems (attached print > screens and errors). > > I set up an IF with a private address (172.16.18.x - s-dr-zen master > 172.16.18.1 - s-dr-zen2 - slave 172.16.18.2) on eth5. > I connected the two servers on eth5 with a cross cable. The two server > can ping each other. > > If you need other info don't hesitate to ask. > > Thanks in advance. > > Ciao. > Stefano. > > ---------------------------------------- > Stefano Chiesa > Wolters Kluwer Italia > Strada 1, Palazzo F6 > 20090 Milanofiori Assago (Mi) - Italia > Phone +39 0282476279 (20279 Voip) > Fax +39 0282476633 > > > ------------------------------------------------------------------------------ > All the data continuously generated in your IT infrastructure contains a > definitive record of customers, application performance, security > threats, fraudulent activity and more. Splunk takes this data and makes > sense of it. Business sense. IT sense. Common sense.. > http://p.sf.net/sfu/splunk-d2d-c1 > _______________________________________________ > Zenloadbalancer-support mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support > > -- Load balancer distribution - Open Source Project http://zenloadbalancer.sourceforge.net Distribution list (subscribe): [email protected] ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2d-c2 _______________________________________________ Zenloadbalancer-support mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2d-c2 _______________________________________________ Zenloadbalancer-support mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support
