1º Connect to the node2 2º Configure the eth5:cl virtual interface (not delete this configuration on node1) 3º From node2 follow the steps for configure the cluster on webgui 4º and please, send me the file /usr/local/zenloadbalancer/logs/zenloadbalancer.log of node1 and node2 for study the problem
I am waiting your test Regards! 2011/7/4 Chiesa Stefano <[email protected]>: > Hi Emilio. > OK, we did a step forward, but: > > Cluster IP 172.16.18.3 is active on s-dr-zen Permission denied, please try > again. Permission denied, please try again. Permission denied > (publickey,password). > Zen Inotify is running on Permission denied, please try again. Permission > denied, please try again. Permission denied (publickey,password). > > I don't know if it's a root password issue, but I'm quite confident that is > right because it's the same on the two zen server... > > Ciao. > Stefano. > > > -----Messaggio originale----- > Da: Emilio Campos [mailto:[email protected]] > Inviato: lunedì 4 luglio 2011 14.22 > A: [email protected] > Oggetto: Re: [Zenloadbalancer-support] Zen Cluster, try #2 > > Hi Stefano, on two nodes, delete all content of > > /root/.ssh/* > > Delete if exist: > > /usr/local/zenloadbalancer/config/cluster.conf > > on two nodes > > And try! > > > We are waiting your feedback! > Regard! > > 2011/7/4 Chiesa Stefano <[email protected]>: >> Hello Laura, Emilio. >> >> After checks on if and routing, I'm trying to set up the cluster again. >> When I try this are the messages: >> >> >> "Zen latency is DOWN on s-dr-zen 172.16.18.1 | Zen latency is DOWN on >> s-dr-zen2 172.16.18.2 >> >> Cluster IP 172.16.18.3 is active on s-dr-zen >> @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: >> REMOTE HOST IDENTIFICATION HAS CHANGED! @ >> @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE >> THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you >> right now (man-in-the-middle attack)! It is also possible that the RSA host >> key has just been changed. The fingerprint for the RSA key sent by the >> remote host is 04:0f:e7:24:98:4c:3a:19:80:38:c3:46:7b:d0:c5:14. Please >> contact your system administrator. Add correct host key in >> /root/.ssh/known_hosts to get rid of this message. Offending key in >> /root/.ssh/known_hosts:1 RSA host key for 172.16.18.2 has changed and you >> have requested strict checking. Host key verification failed. >> >> Zen Inotify is running on >> @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: >> REMOTE HOST IDENTIFICATION HAS CHANGED! @ >> @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE >> THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you >> right now (man-in-the-middle attack)! It is also possible that the RSA host >> key has just been changed. The fingerprint for the RSA key sent by the >> remote host is 04:0f:e7:24:98:4c:3a:19:80:38:c3:46:7b:d0:c5:14. Please >> contact your system administrator. Add correct host key in >> /root/.ssh/known_hosts to get rid of this message. Offending key in >> /root/.ssh/known_hosts:1 RSA host key for 172.16.18.2 has changed and you >> have requested strict checking. Host key verification failed. >> " >> >> Virtual IP for Cluster: eth5:cl 172.16.18.3 >> >> s-dr-zen 172.16.18.1 >> s-dr-zen2 172.16.18.2 >> >> I think It's only "garbage" coming from old test anche changes. >> How can I CLEANUP the RSA configuration to avoid this message? >> >> Thanks. >> >> Stefano. >> >> >> -----Messaggio originale----- >> Da: Emilio Campos [mailto:[email protected]] >> Inviato: lunedì 27 giugno 2011 0.38 >> A: [email protected] >> Oggetto: Re: [Zenloadbalancer-support] Zen Cluster >> >> on the other node, can you try the same configuration steps and >> attach screenshots with the output? >> >> after, can you attach the >> /usr/local/zenloadbalancer/logs/zenloadbalancer.log file (2 nodes) >> >> 2011/6/24 Chiesa Stefano <[email protected]>: >>> Hello Emilio. >>> >>> After some good tests with a single server, I'm trying to set up the >>> cluster. >>> I follewed the instructions but I have some problems (attached print >>> screens and errors). >>> >>> I set up an IF with a private address (172.16.18.x - s-dr-zen master >>> 172.16.18.1 - s-dr-zen2 - slave 172.16.18.2) on eth5. >>> I connected the two servers on eth5 with a cross cable. The two server >>> can ping each other. >>> >>> If you need other info don't hesitate to ask. >>> >>> Thanks in advance. >>> >>> Ciao. >>> Stefano. >>> >>> ---------------------------------------- >>> Stefano Chiesa >>> Wolters Kluwer Italia >>> Strada 1, Palazzo F6 >>> 20090 Milanofiori Assago (Mi) - Italia >>> Phone +39 0282476279 (20279 Voip) >>> Fax +39 0282476633 >>> >>> >>> ------------------------------------------------------------------------------ >>> All the data continuously generated in your IT infrastructure contains a >>> definitive record of customers, application performance, security >>> threats, fraudulent activity and more. Splunk takes this data and makes >>> sense of it. Business sense. IT sense. Common sense.. >>> http://p.sf.net/sfu/splunk-d2d-c1 >>> _______________________________________________ >>> Zenloadbalancer-support mailing list >>> [email protected] >>> https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support >>> >>> >> >> >> >> -- >> Load balancer distribution - Open Source Project >> http://zenloadbalancer.sourceforge.net >> Distribution list (subscribe): [email protected] >> >> ------------------------------------------------------------------------------ >> All of the data generated in your IT infrastructure is seriously valuable. >> Why? It contains a definitive record of application performance, security >> threats, fraudulent activity, and more. Splunk takes this data and makes >> sense of it. IT sense. And common sense. >> http://p.sf.net/sfu/splunk-d2d-c2 >> _______________________________________________ >> Zenloadbalancer-support mailing list >> [email protected] >> https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support >> >> ------------------------------------------------------------------------------ >> All of the data generated in your IT infrastructure is seriously valuable. >> Why? It contains a definitive record of application performance, security >> threats, fraudulent activity, and more. Splunk takes this data and makes >> sense of it. IT sense. And common sense. >> http://p.sf.net/sfu/splunk-d2d-c2 >> _______________________________________________ >> Zenloadbalancer-support mailing list >> [email protected] >> https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support >> > > > > -- > Load balancer distribution - Open Source Project > http://zenloadbalancer.sourceforge.net > Distribution list (subscribe): [email protected] > > ------------------------------------------------------------------------------ > All of the data generated in your IT infrastructure is seriously valuable. > Why? It contains a definitive record of application performance, security > threats, fraudulent activity, and more. Splunk takes this data and makes > sense of it. IT sense. And common sense. > http://p.sf.net/sfu/splunk-d2d-c2 > _______________________________________________ > Zenloadbalancer-support mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support > > ------------------------------------------------------------------------------ > All of the data generated in your IT infrastructure is seriously valuable. > Why? It contains a definitive record of application performance, security > threats, fraudulent activity, and more. Splunk takes this data and makes > sense of it. IT sense. And common sense. > http://p.sf.net/sfu/splunk-d2d-c2 > _______________________________________________ > Zenloadbalancer-support mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support > > -- Load balancer distribution - Open Source Project http://zenloadbalancer.sourceforge.net Distribution list (subscribe): [email protected] ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2d-c2 _______________________________________________ Zenloadbalancer-support mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support
