Sophie

Sophie

distrib > CentOS > 5 > x86_64 > by-pkgid > ada7a91e7696a27e886b893f27ee013e > files > 72

piranha-0.8.4-26.el5_10.1.x86_64.rpm

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<HTML>
<HEAD>
 <META NAME="GENERATOR" CONTENT="SGML-Tools 1.0.9">
 <TITLE>LVS-HOWTO: Install - General</TITLE>
 <LINK HREF="LVS-HOWTO-7.html" REL=next>
 <LINK HREF="LVS-HOWTO-5.html" REL=previous>
 <LINK HREF="LVS-HOWTO.html#toc6" REL=contents>
</HEAD>
<BODY>
<A HREF="LVS-HOWTO-7.html">Next</A>
<A HREF="LVS-HOWTO-5.html">Previous</A>
<A HREF="LVS-HOWTO.html#toc6">Contents</A>
<HR>
<H2><A NAME="s6">6. Install - General</A></H2>

<P>
<P>You can setup a working LVS from the LVS-mini-HOWTO. Presumably
it will be more upto date, clearer and simpler than this section.
<P>Abreviations/conventions for setup/testing/configuring
<P>
<PRE>
client:      client's IP         =CIP
gateway:     gateway/router's IP =DGW (router will be the client in most test setups)
director:    director's IP       =DIP on director   eth0
             virtual IP          =VIP on director   eth0:x (eg eth0:1)
real-server: real-server IP      =RIP on real-server eth0
             virtual IP          =VIP on real-server eth0:x/lo:0/tunl0/dummy0
             gateway             =SGW           
</PRE>
<P>
<H2><A NAME="ss6.1">6.1 Director</A>
</H2>

<P> 
<P>
<H3>2.2.x kernels</H3>

<P>
<P>(with suggestions from John Cronin <CODE>jsc3@havoc.gtf.org</CODE>)
<P>Get a fresh kernel from ftp.kernel.org and the matching
ipvs patch from the software page on www.linuxvirtualserver.org.
Apply the kernel patch 2.2.x using the instructions in the tarball. 
You'll do something like
<P>director:/usr/src/linux# patch -p1 &lt;../ipvs-0.9.8-2.2.14/ipvs-0.9.8-2.2.14.patch
<P>(Note: kernels from RedHat are not the standard kernels off
ftp.kernel.org. They are pre-patched with ipvs. 
If you are going to use RedHat files, follow RedHat's
instructions, not ours. If you follow our instructions 
and try to patch a RH kernel you'll get
<P>
<PRE>
> Hunk #1 succeeded at 121 with fuzz 2 (offset 18 lines).
> Hunk #2 FAILED at 153.
> Hunk #3 FAILED at 163.
> Hunk #4 FAILED at 177.
> 3 out of 4 hunks FAILED -- saving rejects to include/linux/ip_masq.h.rej
>
> patching file `include/net/ip_masq.h'
> Reversed (or previously applied) patch detected!  Assume -R? [n]
</PRE>
<P>The pre-applied patch on the 
RedHat kernel will likely be older than the one
on the LVS website.)
<P>Compile the 2.2.x kernel and reboot.
<P>The actual kernel compile instructions will vary with
kernel patch number. Here's what I used for ipvs-0.9.9 on
kernel 2.2.15pre9 in the Networking options. The relevant
options are marked. Some of the options are not explicitely
required for LVS to work, but you'll need them anyhow - e.g.
ip aliasing if you need to constuct a director with only
one NIC, or tunneling if you are going to run VS-Tun. Until
you know what you're doing activate all of the options with
an '*' at the start of the line.
<P>You need to turn on "Prompt for developmental code... " or 
whatever under the "Code Maturity" section.
In the "Networking" section, you have to turn on 
IP:masquerading before you get the ipvs option. 
<P>Do all the other kernel stuff - make modules, install the modules, 
copy the new kernel into / or /boot, edit lilo.conf and run lilo. 
Make sure you leave the old kernel config in lilo too, so you can
recover if all does not go well. When loading the new kernel,
make sure the ip_vs* modules get loaded. 
The README in the kernel source tree has all the necessary info in there. 
<P>
<BLOCKQUOTE><CODE>
<PRE>

           [*] Kernel/User netlink socket
           [*] Routing messages
           &lt; > Netlink device emulation
*          [*] Network firewalls
           [*] Socket Filtering
           &lt;*> Unix domain sockets
*          [*] TCP/IP networking
           [ ] IP: multicasting
           [*] IP: advanced router
           [ ] IP: policy routing
           [ ] IP: equal cost multipath
           [ ] IP: use TOS value as routing key
           [ ] IP: verbose route monitoring
           [ ] IP: large routing tables
           [ ] IP: kernel level autoconfiguration
*          [*] IP: firewalling
           [ ] IP: firewall packet netlink device
*          [*] IP: transparent proxy support
*          [*] IP: masquerading
           --- Protocol-specific masquerading support will be built as modules.
*          [*] IP: ICMP masquerading
           --- Protocol-specific masquerading support will be built as modules.
*          [*] IP: masquerading special modules support
*          &lt;M> IP: ipautofw masq support (EXPERIMENTAL)
*          &lt;M> IP: ipportfw masq support (EXPERIMENTAL)
*          &lt;M> IP: ip fwmark masq-forwarding support (EXPERIMENTAL)
*          [*] IP: masquerading virtual server support (EXPERIMENTAL)
*          (12) IP masquerading VS table size (the Nth power of 2)
*          &lt;M> IPVS: round-robin scheduling
*          &lt;M> IPVS: weighted round-robin scheduling
*          &lt;M> IPVS: least-connection scheduling
*          &lt;M> IPVS: weighted least-connection scheduling
*          [*] IP: optimize as router not host
*          &lt;M> IP: tunneling
           &lt;M> IP: GRE tunnels over IP
           [*] IP: broadcast GRE over IP
           [ ] IP: multicast routing
           [*] IP: PIM-SM version 1 support
           [*] IP: PIM-SM version 2 support
*          [*] IP: aliasing support
           [ ] IP: ARP daemon support (EXPERIMENTAL)
*          [*] IP: TCP syncookie support (not enabled per default)
           --- (it is safe to leave these untouched)
           &lt; > IP: Reverse ARP
           [*] IP: Allow large windows (not recommended if &lt;16Mb of memory)
           &lt; > The IPv6 protocol (EXPERIMENTAL)
</PRE>
</CODE></BLOCKQUOTE>
<P>The default LVS 
<A HREF="LVS-HOWTO-18.html#Hash_Table">hash table</A>
size (2^12 entries) originally meant 2^12 simultanous connections. 
If you are editing the .config by hand look for CONFIG_IP_MASQUERADE_VS_TAB_BITS. 
Each entry (for a connection to a client)
takes 128 bytes, 2^12 entries requires 512kbytes. 
If you have 128M spare memory you can have 10^6 entries 
if you set the table size to 2^20. 
(Note: not all connections are active - some are waiting to timeout). 
<P>Early versions of ipvs would crash your machine if you alloted too much 
memory to this table. This problem has been fixed in 0.9.9. (Note "top" 
reports memory allocated, not memory you are using. No matter how much 
memory you have, Linux will eventually allocate all of it as you continue to run
the machine and load programs.)
<P>As of ipvs-0.9.9 the hash table is different.
<P>
<BLOCKQUOTE>
From: Julian Anastasov <CODE>uli@linux.tu-varna.acad.bg</CODE><P>
<P>With CONFIG_IP_MASQUERADE_VS_TAB_BITS we specify not the max
number of the entries (connections in your case) but the number of the
rows in a hash table. This table has columns which are unlimited. You can
set your table to 256 rows and to have 1,800,000 connections in
7000 columns average. But the lookup is slower. The lookup function
chooses one row using hash function and starts to search all these
7000 entries for match. So, by increasing the number of rows we want
to speedup the lookup. There is _no_ connection limit. It depends on the
free memory. Try to tune the number of rows in this way that the
columns will not exceed 16 (average), for example. It is not fatal if
the columns are more (average) but if your CPU is fast enough this is not
a problem.
<P>
<P>All entries are included in a table with (1 &lt;&lt; IP_VS_TAB_BITS)
rows and unlimited number of columns. 2^16 rows is enough. Currently,
LVS 0.9.7 can eat all your memory for entries (using any number of rows).
The memory checks are planned in the next LVS versions (are in 0.9.9?).
<P>
</BLOCKQUOTE>
<P>
<PRE>
> How long are the connection entries held for ? (Column 8 of
> /proc/net/ip_masquerade ?)
</PRE>
<P>
<BLOCKQUOTE>
(Julian Anastasov <CODE>uli@linux.tu-varna.acad.bg</CODE>)
The default timeout value for TCP session is 15 minutes, TCP session after 
receiving FIN is 2 miniutes, and UDP session 5 minutes. You can use 
"ipchains -M -S tcp tcpfin udp" to set your own time values.
</BLOCKQUOTE>
<P>
<PRE>
> If we assume a clunky set of web servers being
> balanced that take 3s to serve an object, then if the connection entries
> are dropped immediately then we can balance about 20 million web requests
> per minute with 128M RAM. If however the connection entries are kept for a
> longer time period this puts a limit on the balancer.
</PRE>
<P>
<BLOCKQUOTE>
Yeah, it is true.
</BLOCKQUOTE>
<P>
<PRE>
> Eg (assuming column 8 is the thing I'm after!)
</PRE>
<P>
<BLOCKQUOTE>
Actually, the column 8 is the delta value in sequence numbers. The
timeout value is in column 10.
</BLOCKQUOTE>
<P>
<PRE>
> [zathras@consus /]$ head -n 1000 /proc/net/ip_masquerade |sed
> -e "s/  */ /g"|cut -d" " -f8|sort -nr|tail -n500|head -n1
> 8398
>
> ie Held for about 2.3 hours, which would limit a 128Mb machine to balance
> about 10.4 million requests per day. (Which is definitely on the low side
> knowing our throughput...)
</PRE>
<P>
<H3>2.4.x kernels</H3>

<P>
<P>The patches to the early versions of the 2.4.x kernels were configured and
installed separately to the "make menuconfig" for the kernel. This
required moving files into the /lib/modules directories and loading
the modules by hand.
<P>To avoid this, you should start with 0.2.7-2.4.2 (there were two versions,
the hand install and the version which is configured by "make configure";
get the 2nd one).
<P>Here's the networking config
<P>
<PRE>
                 &lt;*> Packet socket                                                      
                 [ ]   Packet socket: mmapped IO                                        
                 [*] Kernel/User netlink socket                                         
                 [*]   Routing messages                                                 
                 &lt;*>   Netlink device emulation                                         
                 [*] Network packet filtering (replaces ipchains)                       
                 [*]   Network packet filtering debugging                               
                 [*] Socket Filtering                                                   
                 &lt;*> Unix domain sockets                                                
                 [*] TCP/IP networking                                                  
                 [ ]   IP: multicasting                                                 
                 [*]   IP: advanced router                                              
                 [*]     IP: policy routing                                             
                 [*]       IP: use netfilter MARK value as routing key                  
                 [*]       IP: fast network address translation                         
                 [*]     IP: equal cost multipath                                       
                 [*]     IP: use TOS value as routing key                               
                 [*]     IP: verbose route monitoring                                   
                 [*]     IP: large routing tables                                       
                 [*]   IP: kernel level autoconfiguration                               
                 [ ]     IP: BOOTP support                                              
                 [ ]     IP: RARP support                                               
                 &lt;M>   IP: tunneling                                                    
                 &lt; >   IP: GRE tunnels over IP                                          
                 [ ]   IP: multicast routing                                            
                 [ ]   IP: ARP daemon support (EXPERIMENTAL)                            
                 [ ]   IP: TCP Explicit Congestion Notification support                 
                 [ ]   IP: TCP syncookie support (disabled per default)                 
                   IP: Netfilter Configuration  --->                                    
                   IP: Virtual Server Configuration  --->                               
                 &lt; >   The IPv6 protocol (EXPERIMENTAL)                                 
                 &lt; >   Kernel httpd acceleration (EXPERIMENTAL)                         
                 [ ] Asynchronous Transfer Mode (ATM) (EXPERIMENTAL)                    
                 ---                                                 
</PRE>
<P>Here's my config for the IP: Virtual Server configuration (turn it all on)
<P>
<PRE>
           &lt;M> virtual server support (EXPERIMENTAL)                                       
           [*]   IP virtual server debugging (NEW)                                         
           (12)   IPVS connection table size (the Nth power of 2) (NEW)                    
           --- IPVS scheduler                                                              
           &lt;M>   round-robin scheduling (NEW)                                              
           &lt;M>   weighted round-robin scheduling (NEW)                                     
           &lt;M>   least-connection scheduling scheduling (NEW)                              
           &lt;M>   weighted least-connection scheduling (NEW)                                
           &lt;M>   locality-based least-connection scheduling (NEW)                          
           &lt;M>   locality-based least-connection with replication scheduling (NEW)         
           &lt;M>   destination hashing scheduling (NEW)                                      
           &lt;M>   source hashing scheduling (NEW)                                           
           --- IPVS application helper                                                     
           &lt;M>   FTP protocol helper (NEW)                                                 
</PRE>
<P>Here is my config for the netfilter section
<P>
<PRE>
                 &lt;M> Connection tracking (required for masq/NAT)
                 &lt;M>   FTP protocol support
                 &lt;M> Userspace queueing via NETLINK (EXPERIMENTAL)
                 &lt;M> IP tables support (required for filtering/masq/NAT)
                 &lt;M>   limit match support
                 &lt;M>   MAC address match support
                 &lt;M>   netfilter MARK match support
                 &lt;M>   Multiple port match support
                 &lt;M>   TOS match support
                 &lt;M>   Connection state match support
                 &lt;M>   Unclean match support (EXPERIMENTAL)
                 &lt;M>   Owner match support (EXPERIMENTAL)
                 &lt;M>   Packet filtering
                 &lt;M>     REJECT target support
                 &lt;M>     MIRROR target support (EXPERIMENTAL)
                 &lt;M>   Full NAT
                 &lt;M>     MASQUERADE target support
                 &lt;M>     REDIRECT target support
                 &lt;M>   Packet mangling
                 &lt;M>     TOS target support
                 &lt;M>     MARK target support
                 &lt;M>   LOG target support
                 &lt; > ipchains (2.2-style) support
                 &lt; > ipfwadm (2.0-style) support                                         
</PRE>
 
<P>Note I have removed the ipchains option here. This was &lt;M&gt; 
in the last version of the HOWTO. However this raised problems
as some people didn't understand the 
<A HREF="#ipchains_compatability">ipchains compatability problems</A>.
<P>
<H3>The LVS code does not swap</H3>

<P>
<P>Joe Feb 2001: 
With sufficient number of connections, a director could
start to swap out its tables (is this true?)
<P>In this case, throughput could slow to a crawl. I presume
the kernel would have to retrieve parts of the table to find
the real-server associated with incoming packets. I would
think in this case it would be better to drop connect
requests than to accept them.
<P>In earlier verions of LVS, you could set the amount of
memory for the tables (in bytes). Now you allocate a number
of hashes, whose size could (in the worst case) grow without limit.
<P>Julian
<P>
<PRE>
> IMO, this is not true. LVS uses GFP_ATOMIC kind of allocations
> and as I know such allocations can't be swapped out.
</PRE>
<P>If it's possible for LVS to start the director to swap,
is there some way to stop this?
<P>
<PRE>
> You can try with testlvs whether the LVS uses swap.
> Start the kernel with LILO option mem=8M and with large swap area.
> Then check whether more than 8MB swap is used.
</PRE>
<P>
<H2><A NAME="ss6.2">6.2 Real-servers</A>
</H2>

<P> 
<P>In general, nothing specific is done for the real-servers.
You can have any OS running on them 
(except VS-Tun, which runs only on Linux real-servers). 
You plug them in to the network, startup the services on the 
VIP (for VS-DR, VS-Tun) or the RIP (VS-NAT), setup the default
gw (the router and the director respectively in the usual setups) 
and you're ready to go.
<P><EM>Except:</EM> You have to handle the 
<A HREF="LVS-HOWTO-3.html#arp_problem">arp problem</A>
with VS-DR (and possibly VS-Tun). 
Unfortunately this turns what would be a trivial installation into
one that requires clear thinking. 
If you don't want to deal with the arp problem for your first installation,
then setup a VS-NAT LVS.
<P>Eventually you'll want the higher throughput and lower latency of VS-DR,
in which case you'll need to understand the arp problem.
The simplest approach is to use the NOARP option of ifconfig to setup lo:0 on
non-linux unix real-servers. 
For linux, 
<UL>
<LI>2.0.x kernels: the NOARP option to ifconfig works as for other unices</LI>
<LI>2.2.x recent (<EM>i.e.</EM>x&gt;12) kernels; activate arp hiding </LI>
<LI>2.4.x kernels; patch the kernel with Julian's "hidden patch"
and then activate the arp hiding</LI>
</UL>
<P>For non-unix (ie Windows) real-servers, look below for further instructions. 
<P>
<H3>Linux Real-servers</H3>

<P>
<P>If you are handling the arp problem by hiding the VIP device on the real-servers,
then you need to patch the real-servers if
<UL>
<LI>2.2.x (where x&lt;12) </LI>
<LI>2.4.x (all versions, see info about 
<A HREF="LVS-HOWTO-3.html#2.4_arp">patching 2.4 real-servers</A>).</LI>
</UL>
<P>The current version(s) of 2.2.x, <EM>e.g.</EM> 2.2.19 
are already patched with the arp hiding code 
<EM>i.e.</EM> you don't have to patch the current 2.2.x kernels.
For Linux-2.0.x real-servers, you can use the NOARP option when 
setting up a device for the VIP.
<P>
<H3>Other unices</H3>

<P>
<P>If you are running non-Linux unix real-servers, 
you can handle the arp problem by configuring the device 
carrying the VIP with the -arp switch.  
This list of real-servers is from Ratz <CODE>ratz@tac.ch</CODE>
About the only thing he hasn't tried yet is Plan 9. 
<P>
<PRE>
Solaris 2.5.1, 2.6, 2.7
Linux (of course): 2.0.36, 2.2.9, 2.2.10, 2.2.12
FreeBSD 3.1, 3.2, 3.3
NT (although Webserver would crash): 4.0 no SP
IRIX 6.5 (Indigo2)
HPUX 11
</PRE>
<P>Ratz's code is now in the configure script.
This part of the script has not been well tested
(you might find that it doesn't setup your non-linux
unix box properly yet, please contact me - Joe).
<P>Here's the information for non-Linux unices.
On some Unixes you have to plumb the interface before assigning an IP. 
The plumb instruction is not included here.
<P>
<PRE>
#uname      : FreeBSD
#uname -r   : 3.2-RELEASE
#&lt;command>  : ifconfig lo0 alias &lt;VIP> netmask 0xffffffff -arp up 
#ifconfig -a: lo0: flags=80c9&lt;UP,LOOPBACK,RUNNING,NOARP,MULTICAST>mtu 16837
#                  inet 127.0.0.1 netmask 0xff000000
#                  inet &lt;VIP> netmask 0xffffffff

#uname      : IRIX
#uname -r   : 6.5
#&lt;command>  : ifconfig lo0 alias &lt;VIP> netmask 0xffffffff -arp up
#ifconfig -a: lo0: flags=18c9&lt;UP,LOOPBACK,RUNNING,NOARP,MULTICAST,CKSUM>
#                  inet 127.0.0.1 netmask 0xff000000
#                  inet &lt;VIP> netmask 0xffffffff

#uname      : SunOS
#uname -r   : 5.7
#&lt;command>  : ifconfig lo0:1 &lt;VIP> netmask 255.255.255.255 up
#ifconfig -a: lo0:  flags=849&lt;UP,LOOPBACK,RUNNING,MULTICAST>mtu 8232
#                   inet 127.0.0.1 netmask ff000000
#             lo0:1 flags=849&lt;UP,LOOPBACK,RUNNING,MULTICAST>mtu 8232
#                   inet &lt;VIP> netmask ffffffff

#uname      : HP-UX
#uname -r   : B.11.00
#&lt;command>  : ifconfig lan1:1 10.10.10.10 netmask 0xffffff00 -arp up
#ifconfig -a: lan0:   flags=842&lt;BROADCAST,RUNNING,MULTICAST>
#                     inet &lt;some IP> netmask ffffff00
#             lan0:1: flags=8c2&lt;BROADCAST,RUNNING,NOARP,MULTICAST>
#                     inet &lt;VIP> netmask ffffff00
#
</PRE>
<P>Some unices aren't very cooperative and other methods (<EM>e.g.</EM>
adding an extra NIC) should do it.
<P>
<P>Ratz 16 Apr 2001 
<P>
<BLOCKQUOTE>
in most cases (when using the NOARP option) 
you need alias support.
Some Unices have no support for aliased interfaces or only
limited, such as QNX, Aegis or Amoeba for example. Others
have interface flag inheritance problems like HP-UX where
it is impossible to give an aliased interface a different
flag vector as for the underlying physical interface
(as happens with Linux 2.2 and 2.4 - Joe). So 
for HP/UX you need a special setup because with the standard
depicted setup for DR it will NOT work.
I've done most
Unices as Realserver and was negatively astonished by all 
the different implementation variations of the different
Unix flavours. This maybe resulted from unclear statements
from the RFC's.
</BLOCKQUOTE>
<P>
<H3>NT</H3>

<P>
<P>(This is not handled by the configure script).
<P>Here's Wensong's recipe for setting up the lo device on a NT real-server.
<P>If you don't have MS Lookback Adapter Driver installed on
your NT boxes, enter Network Control Panel, click the
Adapter section, click to add a new adapter, select the
MS Loopback Adapter. Your NT cdrom is needed here.
<P>Then add your VIP (Virtual IP) address on the MS Loopback
Adapter, do not enter a gateway address on the Loopback
Adapter. Since the netmask 255.255.255.255 is considered
invalid in M$ NT, you just accept the default netmask,
then enter MS-DOS prompt, remove the extra routing entry.
<P>
<PRE>
         
        c:route delete &lt;VIP's network> &lt;VIP's netmask>
</PRE>
<P>This will make the packets destined for this network will
go through the other network interface, not this MS Loopback
interface.
<P>As I remember, setting its netmask to 255.0.0.0 also works.
<P>alternatively (Jerome RICHARD <CODE>jrichard@virtual-net.fr</CODE>)
<P>On Windows NT Server, you just have to install a network adapter
called "MS Loopback" (Provided on the Windows NT CDROM in new
network section) and then you setup the VIP on this interface.
<P>
<H3>W2K</H3>

<P>
<P>from o1004g <CODE>o1004g@nbuster.com</CODE> 
<P>
<OL>
<LI>Click Start, point to Settings, click Control Panel, and then double-click Add/Remove Hardware.</LI>
<LI>Click Add/Troubleshoot a device, and then click Next.</LI>
<LI>Click Add a new device, and then click Next.</LI>
<LI>Click No, I want to select the hardware from a list, and then click Next.</LI>
<LI>Click Network adapters, and then click Next.</LI>
<LI>In the Manufacturers box, click Microsoft.</LI>
<LI>In the Network Adapter box, click Microsoft Loopback Adapter, and then click Next.</LI>
<LI>Click Finish.</LI>
</OL>
<P>
<H2><A NAME="ipchains_compatability"></A> <A NAME="ss6.3">6.3 iptables/ipchains compatability problems</A>
</H2>

<P>
<P>ipchains in 2.2.x kernels has been replaced by iptables in 2.4.x kernels.
For 2.4 kernels, ipchains is available for backwards compatibility.
However ipchains and iptables can't be used at the same time.
<P><EM>The ip_tables module is incompatible with ipchains. 
If present, the ip_tables module must be unloaded for ipchains to work.</EM> 
<P>If you have ip_tables loaded, 
you'll get uninformative errors when you try to run ipchains commands with 2.4.
Rather than saying that ipchains under 2.4 is there for compatibility,
it would be more accurate to say that the ipchains commands available with 2.4 kernels
will only cause you grief and it will be faster to rewrite your scripts to 
iptables, than to fall into all the holes you'll find using the compatibility.
It won't take long before some script/program expects to run ip_tables on your
2.4 machine and as soon as that happens one or both (I don't know which) 
of your iptables or ipchains are hosed.
<P>
<HR>
<A HREF="LVS-HOWTO-7.html">Next</A>
<A HREF="LVS-HOWTO-5.html">Previous</A>
<A HREF="LVS-HOWTO.html#toc6">Contents</A>
</BODY>
</HTML>