1º Connect to the node2
2º Configure the eth5:cl virtual interface (not delete this
configuration on node1)
3º From node2 follow the steps for configure the cluster on webgui
4º and please, send me the  file
/usr/local/zenloadbalancer/logs/zenloadbalancer.log of node1 and node2
for study the problem

I am waiting your test


Regards!

2011/7/4 Chiesa Stefano <[email protected]>:
> Hi Emilio.
> OK, we did a step forward, but:
>
> Cluster IP 172.16.18.3 is active on s-dr-zen Permission denied, please try 
> again. Permission denied, please try again. Permission denied 
> (publickey,password).
> Zen Inotify is running on Permission denied, please try again. Permission 
> denied, please try again. Permission denied (publickey,password).
>
> I don't know if it's a root password issue, but I'm quite confident that is 
> right because it's the same on the two zen server...
>
> Ciao.
> Stefano.
>
>
> -----Messaggio originale-----
> Da: Emilio Campos [mailto:[email protected]]
> Inviato: lunedì 4 luglio 2011 14.22
> A: [email protected]
> Oggetto: Re: [Zenloadbalancer-support] Zen Cluster, try #2
>
> Hi Stefano, on two nodes, delete all  content of
>
> /root/.ssh/*
>
> Delete if exist:
>
> /usr/local/zenloadbalancer/config/cluster.conf
>
> on two nodes
>
> And try!
>
>
> We are waiting your feedback!
> Regard!
>
> 2011/7/4 Chiesa Stefano <[email protected]>:
>> Hello Laura, Emilio.
>>
>> After checks on if and routing, I'm trying to set up the cluster again.
>> When I try this are the messages:
>>
>>
>> "Zen latency is DOWN on s-dr-zen 172.16.18.1 | Zen latency is DOWN on 
>> s-dr-zen2 172.16.18.2
>>
>> Cluster IP 172.16.18.3 is active on s-dr-zen 
>> @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: 
>> REMOTE HOST IDENTIFICATION HAS CHANGED! @ 
>> @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE 
>> THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you 
>> right now (man-in-the-middle attack)! It is also possible that the RSA host 
>> key has just been changed. The fingerprint for the RSA key sent by the 
>> remote host is 04:0f:e7:24:98:4c:3a:19:80:38:c3:46:7b:d0:c5:14. Please 
>> contact your system administrator. Add correct host key in 
>> /root/.ssh/known_hosts to get rid of this message. Offending key in 
>> /root/.ssh/known_hosts:1 RSA host key for 172.16.18.2 has changed and you 
>> have requested strict checking. Host key verification failed.
>>
>> Zen Inotify is running on 
>> @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: 
>> REMOTE HOST IDENTIFICATION HAS CHANGED! @ 
>> @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE 
>> THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you 
>> right now (man-in-the-middle attack)! It is also possible that the RSA host 
>> key has just been changed. The fingerprint for the RSA key sent by the 
>> remote host is 04:0f:e7:24:98:4c:3a:19:80:38:c3:46:7b:d0:c5:14. Please 
>> contact your system administrator. Add correct host key in 
>> /root/.ssh/known_hosts to get rid of this message. Offending key in 
>> /root/.ssh/known_hosts:1 RSA host key for 172.16.18.2 has changed and you 
>> have requested strict checking. Host key verification failed.
>> "
>>
>> Virtual IP for Cluster: eth5:cl 172.16.18.3
>>
>> s-dr-zen        172.16.18.1
>> s-dr-zen2       172.16.18.2
>>
>> I think It's only "garbage" coming from old test anche changes.
>> How can I CLEANUP the RSA configuration to avoid this message?
>>
>> Thanks.
>>
>> Stefano.
>>
>>
>> -----Messaggio originale-----
>> Da: Emilio Campos [mailto:[email protected]]
>> Inviato: lunedì 27 giugno 2011 0.38
>> A: [email protected]
>> Oggetto: Re: [Zenloadbalancer-support] Zen Cluster
>>
>> on the other node, can you try the same  configuration steps and
>> attach screenshots with the output?
>>
>> after, can you attach the
>> /usr/local/zenloadbalancer/logs/zenloadbalancer.log file (2 nodes)
>>
>> 2011/6/24 Chiesa Stefano <[email protected]>:
>>> Hello Emilio.
>>>
>>> After some good tests with a single server, I'm trying to set up the
>>> cluster.
>>> I follewed the instructions but I have some problems (attached print
>>> screens and errors).
>>>
>>> I set up an IF with a private address (172.16.18.x - s-dr-zen master
>>> 172.16.18.1 - s-dr-zen2 - slave 172.16.18.2) on eth5.
>>> I connected the two servers on eth5 with a cross cable. The two server
>>> can ping each other.
>>>
>>> If you need other info don't hesitate to ask.
>>>
>>> Thanks in advance.
>>>
>>> Ciao.
>>> Stefano.
>>>
>>> ----------------------------------------
>>> Stefano Chiesa
>>> Wolters Kluwer Italia
>>> Strada 1, Palazzo F6
>>> 20090 Milanofiori Assago (Mi) - Italia
>>> Phone +39 0282476279 (20279 Voip)
>>> Fax +39 0282476633
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> All the data continuously generated in your IT infrastructure contains a
>>> definitive record of customers, application performance, security
>>> threats, fraudulent activity and more. Splunk takes this data and makes
>>> sense of it. Business sense. IT sense. Common sense..
>>> http://p.sf.net/sfu/splunk-d2d-c1
>>> _______________________________________________
>>> Zenloadbalancer-support mailing list
>>> [email protected]
>>> https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support
>>>
>>>
>>
>>
>>
>> --
>> Load balancer distribution - Open Source Project
>> http://zenloadbalancer.sourceforge.net
>> Distribution list (subscribe): [email protected]
>>
>> ------------------------------------------------------------------------------
>> All of the data generated in your IT infrastructure is seriously valuable.
>> Why? It contains a definitive record of application performance, security
>> threats, fraudulent activity, and more. Splunk takes this data and makes
>> sense of it. IT sense. And common sense.
>> http://p.sf.net/sfu/splunk-d2d-c2
>> _______________________________________________
>> Zenloadbalancer-support mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support
>>
>> ------------------------------------------------------------------------------
>> All of the data generated in your IT infrastructure is seriously valuable.
>> Why? It contains a definitive record of application performance, security
>> threats, fraudulent activity, and more. Splunk takes this data and makes
>> sense of it. IT sense. And common sense.
>> http://p.sf.net/sfu/splunk-d2d-c2
>> _______________________________________________
>> Zenloadbalancer-support mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support
>>
>
>
>
> --
> Load balancer distribution - Open Source Project
> http://zenloadbalancer.sourceforge.net
> Distribution list (subscribe): [email protected]
>
> ------------------------------------------------------------------------------
> All of the data generated in your IT infrastructure is seriously valuable.
> Why? It contains a definitive record of application performance, security
> threats, fraudulent activity, and more. Splunk takes this data and makes
> sense of it. IT sense. And common sense.
> http://p.sf.net/sfu/splunk-d2d-c2
> _______________________________________________
> Zenloadbalancer-support mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support
>
> ------------------------------------------------------------------------------
> All of the data generated in your IT infrastructure is seriously valuable.
> Why? It contains a definitive record of application performance, security
> threats, fraudulent activity, and more. Splunk takes this data and makes
> sense of it. IT sense. And common sense.
> http://p.sf.net/sfu/splunk-d2d-c2
> _______________________________________________
> Zenloadbalancer-support mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support
>
>



-- 
Load balancer distribution - Open Source Project
http://zenloadbalancer.sourceforge.net
Distribution list (subscribe): [email protected]

------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security 
threats, fraudulent activity, and more. Splunk takes this data and makes 
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
Zenloadbalancer-support mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support

Reply via email to